What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Christopher W. Fletcher
Google Scholar
ORCID:
0000-0002-9995-5995
29
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Peek-a-Walk: Leaking Secrets via Page Walk Side Channels.
Alan Wang
Boru Chen
Yingchen Wang
Christopher W. Fletcher
Daniel Genkin
David Kohlbrenner
Riccardo Paccagnella
2025
conf/host
Termite Attacks: Gnawing on Logs to Extract Secret Information.
Hyun Bin Lee
Tushar M. Jois
Christopher W. Fletcher
Carl A. Gunter
2024
conf/uss
GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers.
Boru Chen
Yingchen Wang
Pradyumna Shome
Christopher W. Fletcher
David Kohlbrenner
Riccardo Paccagnella
Daniel Genkin
2024
conf/sp
GPU.zip: On the Side-Channel Implications of Hardware-Based Graphical Data Compression.
Yingchen Wang
Riccardo Paccagnella
Zhao Gang
Willy R. Vasquez
David Kohlbrenner
Hovav Shacham
Christopher W. Fletcher
2024
conf/sp
ConjunCT: Learning Inductive Invariants to Prove Unbounded Instruction Safety Against Microarchitectural Timing Attacks.
Sushant Dinesh
Madhusudan Parthasarathy
Christopher W. Fletcher
2023
conf/ccs
Declassiflow: A Static Analysis for Modeling Non-Speculative Knowledge to Relax Speculative Execution Security Measures.
Rutvik Choudhary
Alan Wang
Zirui Neil Zhao
Adam Morrison
Christopher W. Fletcher
2023
conf/uss
Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions.
Jiyong Yu
Aishani Dutta
Trent Jaeger
David Kohlbrenner
Christopher W. Fletcher
2023
conf/sp
DVFS Frequently Leaks Secrets: Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data.
Yingchen Wang
Riccardo Paccagnella
Alan Wandke
Zhao Gang
Grant Garrett-Grossman
Christopher W. Fletcher
David Kohlbrenner
Hovav Shacham
2022
conf/uss
Binoculars: Contention-Based Side-Channel Attacks Exploiting the Page Walker.
Zirui Neil Zhao
Adam Morrison
Christopher W. Fletcher
Josep Torrellas
2022
conf/uss
Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.
Yingchen Wang
Riccardo Paccagnella
Elizabeth Tang He
Hovav Shacham
Christopher W. Fletcher
David Kohlbrenner
2022
conf/sp
Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest.
Jose Rodrigo Sanchez Vicarte
Michael Flanders
Riccardo Paccagnella
Grant Garrett-Grossman
Adam Morrison
Christopher W. Fletcher
David Kohlbrenner
2022
conf/ndss
SynthCT: Towards Portable Constant-Time Code.
Sushant Dinesh
Grant Garrett-Grossman
Christopher W. Fletcher
2021
conf/uss
Double-Cross Attacks: Subverting Active Learning Systems.
Jose Rodrigo Sanchez Vicarte
Gang Wang
Christopher W. Fletcher
2021
conf/uss
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical.
Riccardo Paccagnella
Licheng Luo
Christopher W. Fletcher
2021
conf/ndss
DOVE: A Data-Oblivious Virtual Environment.
Hyun Bin Lee
Tushar M. Jois
Christopher W. Fletcher
Carl A. Gunter
2020
conf/uss
Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures.
Mengjia Yan
Christopher W. Fletcher
Josep Torrellas
2020
conf/ndss
Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution.
Riccardo Paccagnella
Pubali Datta
Wajih Ul Hassan
Adam Bates
Christopher W. Fletcher
Andrew Miller
Dave Tian
2020
conf/dsn
PyTorchFI: A Runtime Perturbation Tool for DNNs.
Abdulrahman Mahmoud
Neeraj Aggarwal
Alex Nobbe
Jose Rodrigo Sanchez Vicarte
Sarita V. Adve
Christopher W. Fletcher
Iuri Frosio
Siva Kumar Sastry Hari
2019
conf/sp
Attack Directories, Not Caches: Side Channel Attacks in a Non-Inclusive World.
Mengjia Yan
Read Sprabery
Bhargava Gopireddy
Christopher W. Fletcher
Roy H. Campbell
Josep Torrellas
2019
conf/ndss
Data Oblivious ISA Extensions for Side Channel-Resistant and High Performance Computing.
Jiyong Yu
Lucas Hsiung
Mohamad El Hajj
Christopher W. Fletcher
2019
conf/dsn
gem5-Approxilyzer: An Open-Source Tool for Application-Level Soft Error Analysis.
Radha Venkatagiri
Khalique Ahmed
Abdulrahman Mahmoud
Sasa Misailovic
Darko Marinov
Christopher W. Fletcher
Sarita V. Adve
2018
conf/ndss
ZeroTrace : Oblivious Memory Primitives from Intel SGX.
Sajin Sasy
Sergey Gorbunov
Christopher W. Fletcher
2017
conf/ndss
HOP: Hardware makes Obfuscation Practical.
Kartik Nayak
Christopher W. Fletcher
Ling Ren
Nishanth Chandran
Satya V. Lokam
Elaine Shi
Vipul Goyal
2017
conf/pkc
Asymptotically Tight Bounds for Composing ORAM with PIR.
Ittai Abraham
Christopher W. Fletcher
Kartik Nayak
Benny Pinkas
Ling Ren
2016
conf/tcc
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM.
Srinivas Devadas
Marten van Dijk
Christopher W. Fletcher
Ling Ren
Elaine Shi
Daniel Wichs
2015
conf/uss
Constants Count: Practical Improvements to Oblivious RAM.
Ling Ren
Christopher W. Fletcher
Albert Kwon
Emil Stefanov
Elaine Shi
Marten van Dijk
Srinivas Devadas
2013
conf/ccs
Path ORAM: an extremely simple oblivious RAM protocol.
Emil Stefanov
Marten van Dijk
Elaine Shi
Christopher W. Fletcher
Ling Ren
Xiangyao Yu
Srinivas Devadas
2013
conf/ccs
Generalized external interaction with tamper-resistant hardware with bounded information leakage.
Xiangyao Yu
Christopher W. Fletcher
Ling Ren
Marten van Dijk
Srinivas Devadas
2012
conf/ccs
Towards an interpreter for efficient encrypted computation.
Christopher W. Fletcher
Marten van Dijk
Srinivas Devadas
Coauthors
Abdulrahman Mahmoud
(2)
Adam Bates
(1)
Adam Morrison
(3)
Aishani Dutta
(1)
Alan Wandke
(1)
Alan Wang
(2)
Albert Kwon
(1)
Alex Nobbe
(1)
Andrew Miller
(1)
Benny Pinkas
(1)
Bhargava Gopireddy
(1)
Boru Chen
(2)
Carl A. Gunter
(2)
Christopher W. Fletcher
(29)
Daniel Genkin
(2)
Daniel Wichs
(1)
Darko Marinov
(1)
Dave Tian
(1)
David Kohlbrenner
(7)
Elaine Shi
(4)
Elizabeth Tang He
(1)
Emil Stefanov
(2)
Gang Wang
(1)
Grant Garrett-Grossman
(3)
Hovav Shacham
(3)
Hyun Bin Lee
(2)
Ittai Abraham
(1)
Iuri Frosio
(1)
Jiyong Yu
(2)
Jose Rodrigo Sanchez Vicarte
(3)
Josep Torrellas
(3)
Kartik Nayak
(2)
Khalique Ahmed
(1)
Licheng Luo
(1)
Ling Ren
(6)
Lucas Hsiung
(1)
Madhusudan Parthasarathy
(1)
Marten van Dijk
(5)
Mengjia Yan
(2)
Michael Flanders
(1)
Mohamad El Hajj
(1)
Neeraj Aggarwal
(1)
Nishanth Chandran
(1)
Pradyumna Shome
(1)
Pubali Datta
(1)
Radha Venkatagiri
(1)
Read Sprabery
(1)
Riccardo Paccagnella
(8)
Roy H. Campbell
(1)
Rutvik Choudhary
(1)
Sajin Sasy
(1)
Sarita V. Adve
(2)
Sasa Misailovic
(1)
Satya V. Lokam
(1)
Sergey Gorbunov
(1)
Siva Kumar Sastry Hari
(1)
Srinivas Devadas
(5)
Sushant Dinesh
(2)
Trent Jaeger
(1)
Tushar M. Jois
(2)
Vipul Goyal
(1)
Wajih Ul Hassan
(1)
Willy R. Vasquez
(1)
Xiangyao Yu
(2)
Yingchen Wang
(5)
Zhao Gang
(2)
Zirui Neil Zhao
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to