Yuval Yarom
Yuval Yarom
Verified email at cs.adelaide.edu.au
TitleCited byYear
Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack.
Y Yarom, KE Falkner
USENIX Security Symposium 2014, 719-732, 2014
6962014
Spectre attacks: Exploiting speculative execution
P Kocher, J Horn, A Fogh, D Genkin, D Gruss, W Haas, M Hamburg, ...
IEEE Symposium on Security and Privacy (S&P), 2019
6482019
Meltdown: Reading Kernel Memory from User Space
M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, A Fogh, J Horn, ...
27th USENIX Security Symposium (USENIX Security 18), 973-990, 2018
591*2018
Last-Level Cache Side-Channel Attacks are Practical
F Liu, Y Yarom, Q Ge, G Heiser, RB Lee
IEEE Symposium on Security and Privacy (S&P), 2015
4962015
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
J Van Bulck, M Minkin, O Weisse, D Genkin, B Kasicki, F Piessens, ...
27th USENIX Security Symposium (USENIX Security 18), 991-1008, 2018
2242018
CATalyst: Defeating Last-Level Cache Side Channel Attacks in Cloud Computing
F Liu, Q Ge, Y Yarom, F Mckeen, C Rozas, G Heiser, RB Lee
22nd IEEE Symposium on High Performance Computer Architecture (HPCA 2016), 2016
1632016
“Ooh Aah... Just a Little Bit”: A small amount of side channel can go a long way
N Benger, J van de Pol, NP Smart, Y Yarom
Cryptographic Hardware and Embedded Systems (CHES 2014), 75-92, 2014
1542014
A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware
Q Ge, Y Yarom, D Cock, G Heiser
Journal of Cryptographic Engineering 8 (1), 1-27, 2018
1522018
CacheBleed: A timing attack on OpenSSL constant time RSA
Y Yarom, D Genkin, N Heninger
Journal of Cryptographic Engineering 7 (2), 99-112, 2017
1342017
Recovering OpenSSL ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack.
Y Yarom, N Benger
IACR Cryptology ePrint Archive 2014/140, 2014
1132014
Flush, Gauss, and reload–a cache attack on the BLISS lattice-based signature scheme
L Groot Bruinderink, A Hülsing, T Lange, Y Yarom
Cryptographic Hardware and Embedded Systems (CHES 2016), 2016
112*2016
ECDSA key extraction from mobile devices via nonintrusive physical side channels
D Genkin, L Pachmanov, I Pipman, E Tromer, Y Yarom
23rd ACM Conference on Computer and Communications Security (CCS 2016), 2016
942016
Framework for providing visual context to www hyperlinks
S Ran, E Barnoon, Y Yarom
US Patent 6,864,904, 2005
80*2005
Method of relocating the stack in a computer system for preventing overrate by an exploit program
Y Yarom
US Patent 5,949,973, 1999
751999
The NOW MOSIX and its preemptive process migration scheme
A Barak, O Laden, Y Yarom
Bulletin of the IEEE Technical Committee on Operating Systems and …, 1995
66*1995
Mapping the Intel Last-Level Cache
Y Yarom, Q Ge, F Liu, RB Lee, G Heiser
IACR Cryptology ePrint Archive 2015-905, 2015
652015
Foreshadow-NG: Breaking the virtual memory abstraction with transient out-of-order execution
O Weisse, J Van Bulck, M Minkin, D Genkin, B Kasikci, F Piessens, ...
542018
Another flip in the wall of rowhammer defenses
D Gruss, M Lipp, M Schwarz, D Genkin, J Juffinger, S O'Connell, ...
IEEE Symposium on Security and Privacy (S&P), 2018
522018
Just a Little Bit More
J van de Pol, NP Smart, Y Yarom
Topics in Cryptology –- CT-RSA 2015, 3--21, 2015
52*2015
Amplifying Side Channels Through Performance Degradation
T Allan, BB Brumley, K Falkner, J van de Pol, Y Yarom
Annual Computer Security Applications Conference (ACSAC) 2016, 2016
492016
The system can't perform the operation now. Try again later.
Articles 1–20