What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Andrew Kwong
Google Scholar
11
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
PQ-Hammer: End-to-End Key Recovery Attacks on Post-Quantum Cryptography Using Rowhammer.
Samy Amer
Yingchen Wang
Hunter Kippen
Thinh Dang
Daniel Genkin
Andrew Kwong
Alexander Nelson
Arkady Yerukhimovich
2024
conf/uss
Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage.
Youssef Tobah
Andrew Kwong
Ingab Kang
Daniel Genkin
Kang G. Shin
2024
conf/uss
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism.
Ingab Kang
Walter Wang
Jason Kim
Stephan van Schaik
Youssef Tobah
Daniel Genkin
Andrew Kwong
Yuval Yarom
2023
conf/uss
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol.
Andrew Kwong
Walter Wang
Jason Kim
Jonathan Berger
Daniel Genkin
Eyal Ronen
Hovav Shacham
Riad S. Wahby
Yuval Yarom
2022
conf/ccs
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer.
Michael Fahr
Hunter Kippen
Andrew Kwong
Thinh Dang
Jacob Lichtinger
Dana Dachman-Soled
Daniel Genkin
Alexander Nelson
Ray A. Perlner
Arkady Yerukhimovich
Daniel Apon
2022
conf/sp
SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks.
Youssef Tobah
Andrew Kwong
Ingab Kang
Daniel Genkin
Kang G. Shin
2021
conf/sp
CacheOut: Leaking Data on Intel CPUs via Cache Evictions.
Stephan van Schaik
Marina Minkin
Andrew Kwong
Daniel Genkin
Yuval Yarom
2020
conf/sp
RAMBleed: Reading Bits in Memory Without Accessing Them.
Andrew Kwong
Daniel Genkin
Daniel Gruss
Yuval Yarom
2020
conf/sp
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG.
Shaanan Cohney
Andrew Kwong
Shahar Paz
Daniel Genkin
Nadia Heninger
Eyal Ronen
Yuval Yarom
2019
conf/sp
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone.
Andrew Kwong
Wenyuan Xu
Kevin Fu
2018
conf/sp
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems.
Connor Bolton
Sara Rampazzi
Chaohao Li
Andrew Kwong
Wenyuan Xu
Kevin Fu
Coauthors
Alexander Nelson
(2)
Andrew Kwong
(11)
Arkady Yerukhimovich
(2)
Chaohao Li
(1)
Connor Bolton
(1)
Dana Dachman-Soled
(1)
Daniel Apon
(1)
Daniel Genkin
(9)
Daniel Gruss
(1)
Eyal Ronen
(2)
Hovav Shacham
(1)
Hunter Kippen
(2)
Ingab Kang
(3)
Jacob Lichtinger
(1)
Jason Kim
(2)
Jonathan Berger
(1)
Kang G. Shin
(2)
Kevin Fu
(2)
Marina Minkin
(1)
Michael Fahr
(1)
Nadia Heninger
(1)
Ray A. Perlner
(1)
Riad S. Wahby
(1)
Samy Amer
(1)
Sara Rampazzi
(1)
Shaanan Cohney
(1)
Shahar Paz
(1)
Stephan van Schaik
(2)
Thinh Dang
(2)
Walter Wang
(2)
Wenyuan Xu
(2)
Yingchen Wang
(1)
Youssef Tobah
(3)
Yuval Yarom
(5)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to