Jo Van Bulck
Jo Van Bulck
imec-DistriNet, KU Leuven
Verified email at cs.kuleuven.be - Homepage
TitleCited byYear
Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution
J Van Bulck, M Minkin, O Weisse, D Genkin, B Kasikci, F Piessens, ...
Proceedings of the 27th USENIX Security Symposium. USENIX Association, 2018
2582018
Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution
J Van Bulck, N Weichbrodt, R Kapitza, F Piessens, R Strackx
26th {USENIX} Security Symposium ({USENIX} Security 17), 1041-1056, 2017
872017
Foreshadow-NG: Breaking the virtual memory abstraction with transient out-of-order execution
O Weisse, J Van Bulck, M Minkin, D Genkin, B Kasikci, F Piessens, ...
Technical report, 2018, see also USENIX Security paper Foreshadow [7](https …, 2018
582018
A systematic evaluation of transient execution attacks and defenses
C Canella, J Van Bulck, M Schwarz, M Lipp, B Von Berg, P Ortner, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 249-266, 2019
562019
SGX-Step: A practical attack framework for precise enclave execution control
J Van Bulck, F Piessens, R Strackx
Proceedings of the 2nd Workshop on System Software for Trusted Execution, 4, 2017
432017
Sancus 2.0: A Low-Cost Security Architecture for IoT Devices
J Noorman, J Van Bulck, JT Mühlberg, F Piessens, P Maene, B Preneel, ...
ACM Transactions on Privacy and Security (TOPS) 20 (3), 7:1 - 7:33, 2017
422017
ZombieLoad: Cross-privilege-boundary data sampling
M Schwarz, M Lipp, D Moghimi, J Van Bulck, J Stecklina, T Prescher, ...
arXiv preprint arXiv:1905.05726, 2019
272019
VulCAN: Efficient component authentication and software isolation for automotive control networks
J Van Bulck, JT Mühlberg, F Piessens
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
202017
Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic
J Van Bulck, F Piessens, R Strackx
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
192018
Fallout: Reading Kernel Writes From User Space
M Minkin, D Moghimi, M Lipp, M Schwarz, J Van Bulck, D Genkin, D Gruss, ...
arXiv preprint arXiv:1905.12701, 2019
142019
Towards availability and real-time guarantees for protected module architectures
J Van Bulck, J Noorman, JT Mühlberg, F Piessens
Companion Proceedings of the 15th International Conference on Modularity …, 2016
122016
An implementation of a high assurance smart meter using protected module architectures
JT Mühlberg, S Cleemput, MA Mustafa, J Van Bulck, B Preneel, ...
IFIP International Conference on Information Security Theory and Practice, 53-69, 2016
112016
Secure resource sharing for embedded protected module architectures
J Van Bulck, J Noorman, JT Mühlberg, F Piessens
IFIP International Conference on Information Security Theory and Practice, 71-87, 2015
92015
Off-limits: Abusing legacy x86 memory segmentation to spy on enclaved execution
J Gyselinck, J Van Bulck, F Piessens, R Strackx
International Symposium on Engineering Secure Software and Systems, 44-60, 2018
62018
A tale of two worlds: Assessing the vulnerability of enclave shielding runtimes
J Van Bulck, D Oswald, E Marin, A Aldoseri, FD Garcia, F Piessens
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
22019
Fallout: Leaking data on meltdown-resistant cpus
C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
22019
Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow
J Van Bulck, M Minkin, O Weisse, D Genkin, B Kasikci, F Piessens, ...
IEEE Micro 39 (3), 66-74, 2019
12019
Reflections on Post-Meltdown Trusted Computing: A Case for Open Security Processors
JT Mühlberg, J Van Bulck
;login: the USENIX magazine 43 (3), 2018
2018
Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves
J Van Bulck, F Piessens
Proceedings of the 8th International Conference on Security, Privacy, and …, 2018
2018
Plundervolt: Software-based Fault Injection Attacks against Intel SGX
K Murdock, D Oswald, FD Garcia, J Van Bulck, D Gruss, F Piessens
The system can't perform the operation now. Try again later.
Articles 1–20