Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Daniel Genkin
@article{DBLP:journals/corr/abs-2402-00641, author = {Gilles Barthe and Marcel B{\"{o}}hme and Sunjay Cauligi and Chitchanok Chuengsatiansup and Daniel Genkin and Marco Guarnieri and David Mateos Romero and Peter Schwabe and David Wu and Yuval Yarom}, title = {Testing side-channel security of cryptographic implementations against future microarchitectures}, journal = {CoRR}, volume = {abs/2402.00641}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.00641}, doi = {10.48550/ARXIV.2402.00641}, eprinttype = {arXiv}, eprint = {2402.00641}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-00641.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengCGMMYZ24, author = {Shing Hing William Cheng and Chitchanok Chuengsatiansup and Daniel Genkin and Dallas McNeil and Toby Murray and Yuval Yarom and Zhiyuan Zhang}, title = {Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {149}, year = {2024}, url = {https://eprint.iacr.org/2024/149}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChengCGMMYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ChidaHIKGLN23, author = {Koji Chida and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Daniel Genkin and Yehuda Lindell and Ariel Nof}, title = {Fast Large-Scale Honest-Majority {MPC} for Malicious Adversaries}, journal = {J. Cryptol.}, volume = {36}, number = {3}, pages = {15}, year = {2023}, url = {https://doi.org/10.1007/s00145-023-09453-7}, doi = {10.1007/S00145-023-09453-7}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ChidaHIKGLN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/KuepperEGCSTWCC23, author = {Joel Kuepper and Andres Erbsen and Jason Gross and Owen Conoly and Chuyue Sun and Samuel Tian and David Wu and Adam Chlipala and Chitchanok Chuengsatiansup and Daniel Genkin and Markus Wagner and Yuval Yarom}, title = {CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives}, journal = {Proc. {ACM} Program. Lang.}, volume = {7}, number = {{PLDI}}, pages = {1268--1292}, year = {2023}, url = {https://doi.org/10.1145/3591272}, doi = {10.1145/3591272}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pacmpl/KuepperEGCSTWCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/GenkinKLTUY23, author = {Daniel Genkin and William Kosasih and Fangfei Liu and Anna Trikalinou and Thomas Unterluggauer and Yuval Yarom}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {CacheFX: {A} Framework for Evaluating Cache Security}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {163--176}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3595794}, doi = {10.1145/3579856.3595794}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/GenkinKLTUY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NassiVINJGTZE23, author = {Ben Nassi and Ofek Vayner and Etay Iluz and Dudi Nassi and Jan Jancar and Daniel Genkin and Eran Tromer and Boris Zadov and Yuval Elovici}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Optical Cryptanalysis: Recovering Cryptographic Keys from Power {LED} Light Fluctuations}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {268--280}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3616620}, doi = {10.1145/3576915.3616620}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NassiVINJGTZE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0007SGY23, author = {Jason Kim and Stephan van Schaik and Daniel Genkin and Yuval Yarom}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {2038--2052}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3616611}, doi = {10.1145/3576915.3616611}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0007SGY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/KuepperWEGCSTCC23, author = {Joel Kuepper and David Wu and Andres Erbsen and Jason Gross and Owen Conoly and Chuyue Sun and Samuel Tian and Adam Chlipala and Chitchanok Chuengsatiansup and Daniel Genkin and Markus Wagner and Yuval Yarom}, title = {CryptOpt: Automatic Optimization of Straightline Code}, booktitle = {45th {IEEE/ACM} International Conference on Software Engineering: {ICSE} 2023 Companion Proceedings, Melbourne, Australia, May 14-20, 2023}, pages = {141--145}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICSE-Companion58688.2023.00042}, doi = {10.1109/ICSE-COMPANION58688.2023.00042}, timestamp = {Tue, 18 Jul 2023 09:25:31 +0200}, biburl = {https://dblp.org/rec/conf/icse/KuepperWEGCSTCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwpc/KimGL23, author = {Jason Kim and Daniel Genkin and Kevin Leach}, title = {Revisiting Lightweight Compiler Provenance Recovery on {ARM} Binaries}, booktitle = {31st {IEEE/ACM} International Conference on Program Comprehension, {ICPC} 2023, Melbourne, Australia, May 15-16, 2023}, pages = {292--303}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICPC58990.2023.00044}, doi = {10.1109/ICPC58990.2023.00044}, timestamp = {Thu, 20 Jul 2023 21:02:45 +0200}, biburl = {https://dblp.org/rec/conf/iwpc/KimGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ShivakumarBBCCGOSSY23, author = {Basavesh Ammanaghatta Shivakumar and Jack Barnes and Gilles Barthe and Sunjay Cauligi and Chitchanok Chuengsatiansup and Daniel Genkin and Sioli O'Connell and Peter Schwabe and Rui Qi Sim and Yuval Yarom}, title = {Spectre Declassified: Reading from the Right Place at the Wrong Time}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1753--1770}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179355}, doi = {10.1109/SP46215.2023.10179355}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/ShivakumarBBCCGOSSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0002GWY23, author = {Robert Dumitru and Daniel Genkin and Andrew Wabnitz and Yuval Yarom}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {The Impostor Among {US(B):} Off-Path Injection Attacks on {USB} Communications}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {5863--5880}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/dumitru}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/0002GWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Taneja0XSGY23, author = {Hritvik Taneja and Jason Kim and Jie Jeff Xu and Stephan van Schaik and Daniel Genkin and Yuval Yarom}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {6275--6292}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/taneja}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/Taneja0XSGY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/KwongW0BGRSWY23, author = {Andrew Kwong and Walter Wang and Jason Kim and Jonathan Berger and Daniel Genkin and Eyal Ronen and Hovav Shacham and Riad S. Wahby and Yuval Yarom}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Checking Passwords on Leaky Computers: {A} Side Channel Analysis of Chrome's Password Leak Detect Protocol}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {7107--7124}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/kwong}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/KwongW0BGRSWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangTOCGY23, author = {Zhiyuan Zhang and Mingtian Tao and Sioli O'Connell and Chitchanok Chuengsatiansup and Daniel Genkin and Yuval Yarom}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {BunnyHop: Exploiting the Instruction Prefetcher}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {7321--7337}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-zhiyuan-bunnyhop}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZhangTOCGY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-03934, author = {Jason Kim and Daniel Genkin and Kevin Leach}, title = {Revisiting Lightweight Compiler Provenance Recovery on {ARM} Binaries}, journal = {CoRR}, volume = {abs/2305.03934}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.03934}, doi = {10.48550/ARXIV.2305.03934}, eprinttype = {arXiv}, eprint = {2305.03934}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-03934.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-12784, author = {Hritvik Taneja and Jason Kim and Jie Jeff Xu and Stephan van Schaik and Daniel Genkin and Yuval Yarom}, title = {Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and {ARM} SoCs}, journal = {CoRR}, volume = {abs/2305.12784}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.12784}, doi = {10.48550/ARXIV.2305.12784}, eprinttype = {arXiv}, eprint = {2305.12784}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-12784.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-19586, author = {Joel Kuepper and Andres Erbsen and Jason Gross and Owen Conoly and Chuyue Sun and Samuel Tian and David Wu and Adam Chlipala and Chitchanok Chuengsatiansup and Daniel Genkin and Markus Wagner and Yuval Yarom}, title = {CryptOpt: Automatic Optimization of Straightline Code}, journal = {CoRR}, volume = {abs/2305.19586}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.19586}, doi = {10.48550/ARXIV.2305.19586}, eprinttype = {arXiv}, eprint = {2305.19586}, timestamp = {Wed, 07 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-19586.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NassiVINCJGTZE23, author = {Ben Nassi and Ofek Vayner and Etay Iluz and Dudi Nassi and Or Hai Cohen and Jan Jancar and Daniel Genkin and Eran Tromer and Boris Zadov and Yuval Elovici}, title = {Optical Cryptanalysis: Recovering Cryptographic Keys from Power {LED} Light Fluctuations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1068}, year = {2023}, url = {https://eprint.iacr.org/2023/1068}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NassiVINCJGTZE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CohenTHGKOY22, author = {Yaakov Cohen and Kevin Sam Tharayil and Arie Haenel and Daniel Genkin and Angelos D. Keromytis and Yossi Oren and Yuval Yarom}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {HammerScope: Observing {DRAM} Power Consumption Using Rowhammer}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {547--561}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560688}, doi = {10.1145/3548606.3560688}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CohenTHGKOY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FahrKKDLDGNPYA22, author = {Michael Fahr and Hunter Kippen and Andrew Kwong and Thinh Dang and Jacob Lichtinger and Dana Dachman{-}Soled and Daniel Genkin and Alexander Nelson and Ray A. Perlner and Arkady Yerukhimovich and Daniel Apon}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {979--993}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560673}, doi = {10.1145/3548606.3560673}, timestamp = {Tue, 08 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FahrKKDLDGNPYA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DuGG22, author = {Yang Du and Daniel Genkin and Paul Grubbs}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Snapshot-Oblivious RAMs: Sub-logarithmic Efficiency for Short Transcripts}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13510}, pages = {152--181}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15985-5\_6}, doi = {10.1007/978-3-031-15985-5\_6}, timestamp = {Wed, 19 Oct 2022 17:37:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DuGG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Chuengsatiansup22, author = {Chitchanok Chuengsatiansup and Daniel Genkin and Yuval Yarom and Zhiyuan Zhang}, editor = {Steven D. Galbraith}, title = {Side-Channeling the Kalyna Key Expansion}, booktitle = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13161}, pages = {272--296}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-95312-6\_12}, doi = {10.1007/978-3-030-95312-6\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Chuengsatiansup22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/TobahKKGS22, author = {Youssef Tobah and Andrew Kwong and Ingab Kang and Daniel Genkin and Kang G. Shin}, title = {SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {681--698}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833802}, doi = {10.1109/SP46214.2022.9833802}, timestamp = {Thu, 21 Sep 2023 15:57:27 +0200}, biburl = {https://dblp.org/rec/conf/sp/TobahKKGS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AgarwalOKYGRY22, author = {Ayush Agarwal and Sioli O'Connell and Jason Kim and Shaked Yehezkel and Daniel Genkin and Eyal Ronen and Yuval Yarom}, title = {Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {699--715}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833711}, doi = {10.1109/SP46214.2022.9833711}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/AgarwalOKYGRY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/GenkinNST22, author = {Daniel Genkin and Noam Nissan and Roei Schuster and Eran Tromer}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Lend Me Your Ear: Passive Remote Physical Side Channels on PCs}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {4437--4454}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/genkin}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/GenkinNST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-11377, author = {Daniel Genkin and William Kosasih and Fangfei Liu and Anna Trikalinou and Thomas Unterluggauer and Yuval Yarom}, title = {CacheFX: {A} Framework for Evaluating Cache Security}, journal = {CoRR}, volume = {abs/2201.11377}, year = {2022}, url = {https://arxiv.org/abs/2201.11377}, eprinttype = {arXiv}, eprint = {2201.11377}, timestamp = {Tue, 01 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-11377.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-01109, author = {Robert Dumitru and Daniel Genkin and Andrew Wabnitz and Yuval Yarom}, title = {The Impostor Among {US(B):} Off-Path Injection Attacks on {USB} Communications}, journal = {CoRR}, volume = {abs/2211.01109}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.01109}, doi = {10.48550/ARXIV.2211.01109}, eprinttype = {arXiv}, eprint = {2211.01109}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-01109.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-10665, author = {Joel Kuepper and Andres Erbsen and Jason Gross and Owen Conoly and Chuyue Sun and Samuel Tian and David Wu and Adam Chlipala and Chitchanok Chuengsatiansup and Daniel Genkin and Markus Wagner and Yuval Yarom}, title = {CryptOpt: Verified Compilation with Random Program Search for Cryptographic Primitives}, journal = {CoRR}, volume = {abs/2211.10665}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.10665}, doi = {10.48550/ARXIV.2211.10665}, eprinttype = {arXiv}, eprint = {2211.10665}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-10665.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShivakumarBBCCG22, author = {Basavesh Ammanaghatta Shivakumar and Jack Barnes and Gilles Barthe and Sunjay Cauligi and Chitchanok Chuengsatiansup and Daniel Genkin and Sioli O'Connell and Peter Schwabe and Rui Qi Sim and Yuval Yarom}, title = {Spectre Declassified: Reading from the Right Place at the Wrong Time}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {426}, year = {2022}, url = {https://eprint.iacr.org/2022/426}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShivakumarBBCCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuGG22, author = {Yang Du and Daniel Genkin and Paul Grubbs}, title = {Snapshot-Oblivious RAMs: Sub-Logarithmic Efficiency for Short Transcripts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {858}, year = {2022}, url = {https://eprint.iacr.org/2022/858}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuGG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FahrKKDLDGNPYA22, author = {Michael Fahr and Hunter Kippen and Andrew Kwong and Thinh Dang and Jacob Lichtinger and Dana Dachman{-}Soled and Daniel Genkin and Alexander Nelson and Ray A. Perlner and Arkady Yerukhimovich and Daniel Apon}, title = {When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {952}, year = {2022}, url = {https://eprint.iacr.org/2022/952}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FahrKKDLDGNPYA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GenkinY21, author = {Daniel Genkin and Yuval Yarom}, title = {Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses]}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {1}, pages = {95--98}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2020.3036146}, doi = {10.1109/MSEC.2020.3036146}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GenkinY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/AlamYWSZGYP21, author = {Monjur Alam and Baki Berkay Yilmaz and Frank Werner and Niels Samwel and Alenka G. Zajic and Daniel Genkin and Yuval Yarom and Milos Prvulovic}, title = {Nonce@Once: {A} Single-Trace {EM} Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {507--522}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00041}, doi = {10.1109/EUROSP51992.2021.00041}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/AlamYWSZGYP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SchaikMKGY21, author = {Stephan van Schaik and Marina Minkin and Andrew Kwong and Daniel Genkin and Yuval Yarom}, title = {CacheOut: Leaking Data on Intel CPUs via Cache Evictions}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {339--354}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00064}, doi = {10.1109/SP40001.2021.00064}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/SchaikMKGY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ShustermanAOGOY21, author = {Anatoly Shusterman and Ayush Agarwal and Sioli O'Connell and Daniel Genkin and Yossi Oren and Yuval Yarom}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {2863--2880}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/shusterman}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/ShustermanAOGOY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/ShustermanAMOGOY21, author = {Anatoly Shusterman and Ayush Agrawal and Giorgio Maone and Sioli O'Connell and Daniel Genkin and Yossi Oren and Yuval Yarom}, title = {Browser Based Side-Channel Defenses Datasets}, publisher = {{IEEE} DataPort}, year = {2021}, month = oct, howpublished = {\url{https://doi.org/10.21227/f8kk-xq86}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/f8kk-xq86}, doi = {10.21227/F8KK-XQ86}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/ShustermanAMOGOY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-04952, author = {Anatoly Shusterman and Ayush Agarwal and Sioli O'Connell and Daniel Genkin and Yossi Oren and Yuval Yarom}, title = {Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses}, journal = {CoRR}, volume = {abs/2103.04952}, year = {2021}, url = {https://arxiv.org/abs/2103.04952}, eprinttype = {arXiv}, eprint = {2103.04952}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-04952.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/LippSGPHHMKGYHS20, author = {Moritz Lipp and Michael Schwarz and Daniel Gruss and Thomas Prescher and Werner Haas and Jann Horn and Stefan Mangard and Paul Kocher and Daniel Genkin and Yuval Yarom and Mike Hamburg and Raoul Strackx}, title = {Meltdown: reading kernel memory from user space}, journal = {Commun. {ACM}}, volume = {63}, number = {6}, pages = {46--56}, year = {2020}, url = {https://doi.org/10.1145/3357033}, doi = {10.1145/3357033}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/LippSGPHHMKGYHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/KocherHFGGHHLMP20, author = {Paul Kocher and Jann Horn and Anders Fogh and Daniel Genkin and Daniel Gruss and Werner Haas and Mike Hamburg and Moritz Lipp and Stefan Mangard and Thomas Prescher and Michael Schwarz and Yuval Yarom}, title = {Spectre attacks: exploiting speculative execution}, journal = {Commun. {ACM}}, volume = {63}, number = {7}, pages = {93--101}, year = {2020}, url = {https://doi.org/10.1145/3399742}, doi = {10.1145/3399742}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/KocherHFGGHHLMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/GenkinPSYZ20, author = {Daniel Genkin and Romain Poussier and Rui Qi Sim and Yuval Yarom and Yuanjing Zhao}, title = {Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2020}, number = {1}, pages = {231--255}, year = {2020}, url = {https://doi.org/10.13154/tches.v2020.i1.231-255}, doi = {10.13154/TCHES.V2020.I1.231-255}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/GenkinPSYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BulckM0LMGYSGP20, author = {Jo Van Bulck and Daniel Moghimi and Michael Schwarz and Moritz Lipp and Marina Minkin and Daniel Genkin and Yuval Yarom and Berk Sunar and Daniel Gruss and Frank Piessens}, title = {{LVI:} Hijacking Transient Execution through Microarchitectural Load Value Injection}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {54--72}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00089}, doi = {10.1109/SP40000.2020.00089}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/BulckM0LMGYSGP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KwongGGY20, author = {Andrew Kwong and Daniel Genkin and Daniel Gruss and Yuval Yarom}, title = {RAMBleed: Reading Bits in Memory Without Accessing Them}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {695--711}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00020}, doi = {10.1109/SP40000.2020.00020}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/KwongGGY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CohneyKPGHRY20, author = {Shaanan Cohney and Andrew Kwong and Shahar Paz and Daniel Genkin and Nadia Heninger and Eyal Ronen and Yuval Yarom}, title = {Pseudorandom Black Swans: Cache Attacks on CTR{\_}DRBG}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {1241--1258}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00046}, doi = {10.1109/SP40000.2020.00046}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/CohneyKPGHRY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SugawaraCRGF20, author = {Takeshi Sugawara and Benjamin Cyr and Sara Rampazzi and Daniel Genkin and Kevin Fu}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2631--2648}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/sugawara}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/SugawaraCRGF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-11946, author = {Takeshi Sugawara and Benjamin Cyr and Sara Rampazzi and Daniel Genkin and Kevin Fu}, title = {Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems}, journal = {CoRR}, volume = {abs/2006.11946}, year = {2020}, url = {https://arxiv.org/abs/2006.11946}, eprinttype = {arXiv}, eprint = {2006.11946}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-11946.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-13353, author = {Stephan van Schaik and Marina Minkin and Andrew Kwong and Daniel Genkin and Yuval Yarom}, title = {CacheOut: Leaking Data on Intel CPUs via Cache Evictions}, journal = {CoRR}, volume = {abs/2006.13353}, year = {2020}, url = {https://arxiv.org/abs/2006.13353}, eprinttype = {arXiv}, eprint = {2006.13353}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-13353.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/micro/BulckMWGKPSWYS19, author = {Jo Van Bulck and Marina Minkin and Ofir Weisse and Daniel Genkin and Baris Kasikci and Frank Piessens and Mark Silberstein and Thomas F. Wenisch and Yuval Yarom and Raoul Strackx}, title = {Breaking Virtual Memory Protection and the {SGX} Ecosystem with Foreshadow}, journal = {{IEEE} Micro}, volume = {39}, number = {3}, pages = {66--74}, year = {2019}, url = {https://doi.org/10.1109/MM.2019.2910104}, doi = {10.1109/MM.2019.2910104}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/micro/BulckMWGKPSWYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CanellaGGGLMMP019, author = {Claudio Canella and Daniel Genkin and Lukas Giner and Daniel Gruss and Moritz Lipp and Marina Minkin and Daniel Moghimi and Frank Piessens and Michael Schwarz and Berk Sunar and Jo Van Bulck and Yuval Yarom}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Fallout: Leaking Data on Meltdown-resistant CPUs}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {769--784}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363219}, doi = {10.1145/3319535.3363219}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CanellaGGGLMMP019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/KocherHFGGHHLM019, author = {Paul Kocher and Jann Horn and Anders Fogh and Daniel Genkin and Daniel Gruss and Werner Haas and Mike Hamburg and Moritz Lipp and Stefan Mangard and Thomas Prescher and Michael Schwarz and Yuval Yarom}, title = {Spectre Attacks: Exploiting Speculative Execution}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {1--19}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00002}, doi = {10.1109/SP.2019.00002}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/KocherHFGGHHLM019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RonenGGSWY19, author = {Eyal Ronen and Robert Gillham and Daniel Genkin and Adi Shamir and David Wong and Yuval Yarom}, title = {The 9 Lives of Bleichenbacher's {CAT:} New Cache ATtacks on {TLS} Implementations}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {435--452}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00062}, doi = {10.1109/SP.2019.00062}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/RonenGGSWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GenkinPST19, author = {Daniel Genkin and Mihir Pattani and Roei Schuster and Eran Tromer}, title = {Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {853--869}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00074}, doi = {10.1109/SP.2019.00074}, timestamp = {Tue, 24 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GenkinPST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-12701, author = {Marina Minkin and Daniel Moghimi and Moritz Lipp and Michael Schwarz and Jo Van Bulck and Daniel Genkin and Daniel Gruss and Frank Piessens and Berk Sunar and Yuval Yarom}, title = {Fallout: Reading Kernel Writes From User Space}, journal = {CoRR}, volume = {abs/1905.12701}, year = {2019}, url = {http://arxiv.org/abs/1905.12701}, eprinttype = {arXiv}, eprint = {1905.12701}, timestamp = {Mon, 03 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-12701.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohneyKPGHRY19, author = {Shaanan Cohney and Andrew Kwong and Shahar Paz and Daniel Genkin and Nadia Heninger and Eyal Ronen and Yuval Yarom}, title = {Pseudorandom Black Swans: Cache Attacks on CTR{\_}DRBG}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {996}, year = {2019}, url = {https://eprint.iacr.org/2019/996}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohneyKPGHRY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/GenkinPP18, author = {Daniel Genkin and Dimitrios Papadopoulos and Charalampos Papamanthou}, title = {Privacy in decentralized cryptocurrencies}, journal = {Commun. {ACM}}, volume = {61}, number = {6}, pages = {78--88}, year = {2018}, url = {https://doi.org/10.1145/3132696}, doi = {10.1145/3132696}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/GenkinPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/DallMEGHMY18, author = {Fergus Dall and Gabrielle De Micheli and Thomas Eisenbarth and Daniel Genkin and Nadia Heninger and Ahmad Moghimi and Yuval Yarom}, title = {CacheQuote: Efficiently Recovering Long-term Secrets of {SGX} {EPID} via Cache Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {171--191}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.171-191}, doi = {10.13154/TCHES.V2018.I2.171-191}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/DallMEGHMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GenkinPTY18, author = {Daniel Genkin and Lev Pachmanov and Eran Tromer and Yuval Yarom}, editor = {Bart Preneel and Frederik Vercauteren}, title = {Drive-By Key-Extraction Cache Attacks from Portable Code}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {83--102}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_5}, doi = {10.1007/978-3-319-93387-0\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GenkinPTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GenkinGR18, author = {Daniel Genkin and S. Dov Gordon and Samuel Ranellucci}, editor = {Bart Preneel and Frederik Vercauteren}, title = {Best of Both Worlds in Secure Computation, with Low Communication Overhead}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {340--359}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_18}, doi = {10.1007/978-3-319-93387-0\_18}, timestamp = {Wed, 13 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GenkinGR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChidaGHIKLN18, author = {Koji Chida and Daniel Genkin and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Yehuda Lindell and Ariel Nof}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Fast Large-Scale Honest-Majority {MPC} for Malicious Adversaries}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {34--64}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_2}, doi = {10.1007/978-3-319-96878-0\_2}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChidaGHIKLN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csr/GenkinKP18, author = {Daniel Genkin and Michael Kaminski and Liat Peterfreund}, editor = {Fedor V. Fomin and Vladimir V. Podolskii}, title = {Closure Under Reversal of Languages over Infinite Alphabets}, booktitle = {Computer Science - Theory and Applications - 13th International Computer Science Symposium in Russia, {CSR} 2018, Moscow, Russia, June 6-10, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10846}, pages = {145--156}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-90530-3\_13}, doi = {10.1007/978-3-319-90530-3\_13}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/csr/GenkinKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GrussLSGJOSY18, author = {Daniel Gruss and Moritz Lipp and Michael Schwarz and Daniel Genkin and Jonas Juffinger and Sioli O'Connell and Wolfgang Schoechl and Yuval Yarom}, title = {Another Flip in the Wall of Rowhammer Defenses}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {245--261}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00031}, doi = {10.1109/SP.2018.00031}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GrussLSGJOSY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhangGKPP18, author = {Yupeng Zhang and Daniel Genkin and Jonathan Katz and Dimitrios Papadopoulos and Charalampos Papamanthou}, title = {vRAM: Faster Verifiable {RAM} with Program-Independent Preprocessing}, booktitle = {2018 {IEEE} Symposium on Security and Privacy, {SP} 2018, Proceedings, 21-23 May 2018, San Francisco, California, {USA}}, pages = {908--925}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SP.2018.00013}, doi = {10.1109/SP.2018.00013}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ZhangGKPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Lipp0G0HFHMKGYH18, author = {Moritz Lipp and Michael Schwarz and Daniel Gruss and Thomas Prescher and Werner Haas and Anders Fogh and Jann Horn and Stefan Mangard and Paul Kocher and Daniel Genkin and Yuval Yarom and Mike Hamburg}, editor = {William Enck and Adrienne Porter Felt}, title = {Meltdown: Reading Kernel Memory from User Space}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {973--990}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/lipp}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/Lipp0G0HFHMKGYH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BulckMWGKPSWYS18, author = {Jo Van Bulck and Marina Minkin and Ofir Weisse and Daniel Genkin and Baris Kasikci and Frank Piessens and Mark Silberstein and Thomas F. Wenisch and Yuval Yarom and Raoul Strackx}, editor = {William Enck and Adrienne Porter Felt}, title = {Foreshadow: Extracting the Keys to the Intel {SGX} Kingdom with Transient Out-of-Order Execution}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {991--1008}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/bulck}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/BulckMWGKPSWYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-01203, author = {Paul Kocher and Daniel Genkin and Daniel Gruss and Werner Haas and Mike Hamburg and Moritz Lipp and Stefan Mangard and Thomas Prescher and Michael Schwarz and Yuval Yarom}, title = {Spectre Attacks: Exploiting Speculative Execution}, journal = {CoRR}, volume = {abs/1801.01203}, year = {2018}, url = {http://arxiv.org/abs/1801.01203}, eprinttype = {arXiv}, eprint = {1801.01203}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-01203.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1801-01207, author = {Moritz Lipp and Michael Schwarz and Daniel Gruss and Thomas Prescher and Werner Haas and Stefan Mangard and Paul Kocher and Daniel Genkin and Yuval Yarom and Mike Hamburg}, title = {Meltdown}, journal = {CoRR}, volume = {abs/1801.01207}, year = {2018}, url = {http://arxiv.org/abs/1801.01207}, eprinttype = {arXiv}, eprint = {1801.01207}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1801-01207.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1809-02629, author = {Daniel Genkin and Mihir Pattani and Roei Schuster and Eran Tromer}, title = {Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels}, journal = {CoRR}, volume = {abs/1809.02629}, year = {2018}, url = {http://arxiv.org/abs/1809.02629}, eprinttype = {arXiv}, eprint = {1809.02629}, timestamp = {Fri, 05 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1809-02629.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinPTY18, author = {Daniel Genkin and Lev Pachmanov and Eran Tromer and Yuval Yarom}, title = {Drive-by Key-Extraction Cache Attacks from Portable Code}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2018}, url = {http://eprint.iacr.org/2018/119}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinPTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChidaGHIKLN18, author = {Koji Chida and Daniel Genkin and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Yehuda Lindell and Ariel Nof}, title = {Fast Large-Scale Honest-Majority {MPC} for Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {570}, year = {2018}, url = {https://eprint.iacr.org/2018/570}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChidaGHIKLN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RonenGGSWY18, author = {Eyal Ronen and Robert Gillham and Daniel Genkin and Adi Shamir and David Wong and Yuval Yarom}, title = {The 9 Lives of Bleichenbacher's {CAT:} New Cache ATtacks on {TLS} Implementations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1173}, year = {2018}, url = {https://eprint.iacr.org/2018/1173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RonenGGSWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:tr/meltdown/m18, author = {Moritz Lipp and Michael Schwarz and Daniel Gruss and Thomas Prescher and Werner Haas and Stefan Mangard and Paul Kocher and Daniel Genkin and Yuval Yarom and Mike Hamburg}, title = {Meltdown}, journal = {meltdownattack.com}, year = {2018}, url = {https://meltdownattack.com/meltdown.pdf}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/tr/meltdown/m18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:tr/meltdown/s18, author = {Paul Kocher and Daniel Genkin and Daniel Gruss and Werner Haas and Mike Hamburg and Moritz Lipp and Stefan Mangard and Thomas Prescher and Michael Schwarz and Yuval Yarom}, title = {Spectre Attacks: Exploiting Speculative Execution}, journal = {meltdownattack.com}, year = {2018}, url = {https://spectreattack.com/spectre.pdf}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/tr/meltdown/s18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/YaromGH17, author = {Yuval Yarom and Daniel Genkin and Nadia Heninger}, title = {CacheBleed: a timing attack on OpenSSL constant-time {RSA}}, journal = {J. Cryptogr. Eng.}, volume = {7}, number = {2}, pages = {99--112}, year = {2017}, url = {https://doi.org/10.1007/s13389-017-0152-y}, doi = {10.1007/S13389-017-0152-Y}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/YaromGH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GenkinST17, author = {Daniel Genkin and Adi Shamir and Eran Tromer}, title = {Acoustic Cryptanalysis}, journal = {J. Cryptol.}, volume = {30}, number = {2}, pages = {392--443}, year = {2017}, url = {https://doi.org/10.1007/s00145-015-9224-2}, doi = {10.1007/S00145-015-9224-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GenkinST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GenkinVY17, author = {Daniel Genkin and Luke Valenta and Yuval Yarom}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {May the Fourth Be With You: {A} Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {845--858}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134029}, doi = {10.1145/3133956.3134029}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GenkinVY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BernsteinBGBHLV17, author = {Daniel J. Bernstein and Joachim Breitner and Daniel Genkin and Leon Groot Bruinderink and Nadia Heninger and Tanja Lange and Christine van Vredendaal and Yuval Yarom}, editor = {Wieland Fischer and Naofumi Homma}, title = {Sliding Right into Disaster: Left-to-Right Sliding Windows Leak}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {555--576}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_27}, doi = {10.1007/978-3-319-66787-4\_27}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BernsteinBGBHLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Ben-SassonBCGGH17, author = {Eli Ben{-}Sasson and Iddo Bentov and Alessandro Chiesa and Ariel Gabizon and Daniel Genkin and Matan Hamilis and Evgenya Pergament and Michael Riabzev and Mark Silberstein and Eran Tromer and Madars Virza}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Computational Integrity with a Public Random String from Quasi-Linear PCPs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {551--579}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_19}, doi = {10.1007/978-3-319-56617-7\_19}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Ben-SassonBCGGH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhangGKPP17, author = {Yupeng Zhang and Daniel Genkin and Jonathan Katz and Dimitrios Papadopoulos and Charalampos Papamanthou}, title = {vSQL: Verifying Arbitrary {SQL} Queries over Dynamic Outsourced Databases}, booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose, CA, USA, May 22-26, 2017}, pages = {863--880}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/SP.2017.43}, doi = {10.1109/SP.2017.43}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ZhangGKPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GenkinIW17, author = {Daniel Genkin and Yuval Ishai and Mor Weiss}, editor = {Yael Kalai and Leonid Reyzin}, title = {How to Construct a Leakage-Resilient (Stateless) Trusted Party}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10678}, pages = {209--244}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70503-3\_7}, doi = {10.1007/978-3-319-70503-3\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GenkinIW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SuGRY17, author = {Yang Su and Daniel Genkin and Damith Chinthana Ranasinghe and Yuval Yarom}, editor = {Engin Kirda and Thomas Ristenpart}, title = {{USB} Snooping Made Easy: Crosstalk Leakage Attacks on {USB} Hubs}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1145--1161}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/su}, timestamp = {Mon, 01 Feb 2021 08:42:59 +0100}, biburl = {https://dblp.org/rec/conf/uss/SuGRY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1710-00551, author = {Daniel Gruss and Moritz Lipp and Michael Schwarz and Daniel Genkin and Jonas Juffinger and Sioli O'Connell and Wolfgang Schoechl and Yuval Yarom}, title = {Another Flip in the Wall of Rowhammer Defenses}, journal = {CoRR}, volume = {abs/1710.00551}, year = {2017}, url = {http://arxiv.org/abs/1710.00551}, eprinttype = {arXiv}, eprint = {1710.00551}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1710-00551.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BernsteinBGBHLV17, author = {Daniel J. Bernstein and Joachim Breitner and Daniel Genkin and Leon Groot Bruinderink and Nadia Heninger and Tanja Lange and Christine van Vredendaal and Yuval Yarom}, title = {Sliding right into disaster: Left-to-right sliding windows leak}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {627}, year = {2017}, url = {http://eprint.iacr.org/2017/627}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BernsteinBGBHLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinVY17, author = {Daniel Genkin and Luke Valenta and Yuval Yarom}, title = {May the Fourth Be With You: {A} Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {806}, year = {2017}, url = {http://eprint.iacr.org/2017/806}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinVY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinIW17, author = {Daniel Genkin and Yuval Ishai and Mor Weiss}, title = {How to Construct a Leakage-Resilient (Stateless) Trusted Party}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {926}, year = {2017}, url = {http://eprint.iacr.org/2017/926}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinIW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangGKPP17, author = {Yupeng Zhang and Daniel Genkin and Jonathan Katz and Dimitrios Papadopoulos and Charalampos Papamanthou}, title = {vSQL: Verifying Arbitrary {SQL} Queries over Dynamic Outsourced Databases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1145}, year = {2017}, url = {http://eprint.iacr.org/2017/1145}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhangGKPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangGKPP17a, author = {Yupeng Zhang and Daniel Genkin and Jonathan Katz and Dimitrios Papadopoulos and Charalampos Papamanthou}, title = {A Zero-Knowledge Version of vSQL}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1146}, year = {2017}, url = {http://eprint.iacr.org/2017/1146}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhangGKPP17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/il/Genkin16, author = {Daniel Genkin}, title = {Secure Computation in Hostile Environments}, school = {Technion - Israel Institute of Technology, Israel}, year = {2016}, url = {https://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-info.cgi/2016/PHD/PHD-2016-08}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/il/Genkin16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/GenkinPST16, author = {Daniel Genkin and Lev Pachmanov and Itamar Pipman and Adi Shamir and Eran Tromer}, title = {Physical key extraction attacks on PCs}, journal = {Commun. {ACM}}, volume = {59}, number = {6}, pages = {70--79}, year = {2016}, url = {https://doi.org/10.1145/2851486}, doi = {10.1145/2851486}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/GenkinPST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GenkinPPTY16, author = {Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer and Yuval Yarom}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {{ECDSA} Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1626--1638}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978353}, doi = {10.1145/2976749.2978353}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GenkinPPTY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/YaromGH16, author = {Yuval Yarom and Daniel Genkin and Nadia Heninger}, editor = {Benedikt Gierlichs and Axel Y. Poschmann}, title = {CacheBleed: {A} Timing Attack on OpenSSL Constant Time {RSA}}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2016 - 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9813}, pages = {346--367}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53140-2\_17}, doi = {10.1007/978-3-662-53140-2\_17}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/YaromGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GenkinPPT16, author = {Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer}, editor = {Kazue Sako}, title = {{ECDH} Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs}, booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9610}, pages = {219--235}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29485-8\_13}, doi = {10.1007/978-3-319-29485-8\_13}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/GenkinPPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GenkinIW16, author = {Daniel Genkin and Yuval Ishai and Mor Weiss}, editor = {Martin Hirt and Adam D. Smith}, title = {Binary {AMD} Circuits from Secure Multiparty Computation}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {336--366}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_14}, doi = {10.1007/978-3-662-53641-4\_14}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GenkinIW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinPPT16, author = {Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer}, title = {{ECDH} Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {129}, year = {2016}, url = {http://eprint.iacr.org/2016/129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinPPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaromGH16, author = {Yuval Yarom and Daniel Genkin and Nadia Heninger}, title = {CacheBleed: {A} Timing Attack on OpenSSL Constant Time {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {224}, year = {2016}, url = {http://eprint.iacr.org/2016/224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaromGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinPPTY16, author = {Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer and Yuval Yarom}, title = {{ECDSA} Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {230}, year = {2016}, url = {http://eprint.iacr.org/2016/230}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinPPTY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-SassonBCGGH16, author = {Eli Ben{-}Sasson and Iddo Bentov and Alessandro Chiesa and Ariel Gabizon and Daniel Genkin and Matan Hamilis and Evgenya Pergament and Michael Riabzev and Mark Silberstein and Eran Tromer and Madars Virza}, title = {Computational integrity with a public random string from quasi-linear PCPs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {646}, year = {2016}, url = {http://eprint.iacr.org/2016/646}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-SassonBCGGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinIW16, author = {Daniel Genkin and Yuval Ishai and Mor Weiss}, title = {Binary {AMD} Circuits from Secure Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {809}, year = {2016}, url = {http://eprint.iacr.org/2016/809}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinIW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/GenkinPT15, author = {Daniel Genkin and Itamar Pipman and Eran Tromer}, title = {Get your hands off my laptop: physical side-channel key-extraction attacks on PCs - Extended version}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {2}, pages = {95--112}, year = {2015}, url = {https://doi.org/10.1007/s13389-015-0100-7}, doi = {10.1007/S13389-015-0100-7}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/GenkinPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GenkinPPT15, author = {Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer}, editor = {Tim G{\"{u}}neysu and Helena Handschuh}, title = {Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2015 - 17th International Workshop, Saint-Malo, France, September 13-16, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9293}, pages = {207--228}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48324-4\_11}, doi = {10.1007/978-3-662-48324-4\_11}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/GenkinPPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GenkinIP15, author = {Daniel Genkin and Yuval Ishai and Antigoni Polychroniadou}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Efficient Multi-party Computation: From Passive to Active Security via Secure {SIMD} Circuits}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {721--741}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_35}, doi = {10.1007/978-3-662-48000-7\_35}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GenkinIP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinIPST15, author = {Daniel Genkin and Yuval Ishai and Manoj Prabhakaran and Amit Sahai and Eran Tromer}, title = {Circuits Resilient to Additive Attacks with Applications to Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2015}, url = {http://eprint.iacr.org/2015/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinIPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinPPT15, author = {Daniel Genkin and Lev Pachmanov and Itamar Pipman and Eran Tromer}, title = {Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {170}, year = {2015}, url = {http://eprint.iacr.org/2015/170}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinPPT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/GenkinKP14, author = {Daniel Genkin and Michael Kaminski and Liat Peterfreund}, title = {A note on the emptiness problem for alternating finite-memory automata}, journal = {Theor. Comput. Sci.}, volume = {526}, pages = {97--107}, year = {2014}, url = {https://doi.org/10.1016/j.tcs.2014.01.020}, doi = {10.1016/J.TCS.2014.01.020}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/GenkinKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GenkinPT14, author = {Daniel Genkin and Itamar Pipman and Eran Tromer}, editor = {Lejla Batina and Matthew Robshaw}, title = {Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {242--260}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_14}, doi = {10.1007/978-3-662-44709-3\_14}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/GenkinPT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GenkinST14, author = {Daniel Genkin and Adi Shamir and Eran Tromer}, editor = {Juan A. Garay and Rosario Gennaro}, title = {{RSA} Key Extraction via Low-Bandwidth Acoustic Cryptanalysis}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8616}, pages = {444--461}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44371-2\_25}, doi = {10.1007/978-3-662-44371-2\_25}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GenkinST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/GenkinIPST14, author = {Daniel Genkin and Yuval Ishai and Manoj Prabhakaran and Amit Sahai and Eran Tromer}, editor = {David B. Shmoys}, title = {Circuits resilient to additive attacks with applications to secure computation}, booktitle = {Symposium on Theory of Computing, {STOC} 2014, New York, NY, USA, May 31 - June 03, 2014}, pages = {495--504}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2591796.2591861}, doi = {10.1145/2591796.2591861}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/GenkinIPST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinPT14a, author = {Daniel Genkin and Itamar Pipman and Eran Tromer}, title = {Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {626}, year = {2014}, url = {http://eprint.iacr.org/2014/626}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinPT14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Ben-SassonCGTV13, author = {Eli Ben{-}Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer and Madars Virza}, editor = {Ran Canetti and Juan A. Garay}, title = {SNARKs for {C:} Verifying Program Executions Succinctly and in Zero Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {90--108}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_6}, doi = {10.1007/978-3-642-40084-1\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Ben-SassonCGTV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/Ben-SassonCGT13, author = {Eli Ben{-}Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer}, editor = {Robert D. Kleinberg}, title = {Fast reductions from RAMs to delegatable succinct constraint satisfaction problems: extended abstract}, booktitle = {Innovations in Theoretical Computer Science, {ITCS} '13, Berkeley, CA, USA, January 9-12, 2013}, pages = {401--414}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2422436.2422481}, doi = {10.1145/2422436.2422481}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/Ben-SassonCGT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/Ben-SassonCGT13, author = {Eli Ben{-}Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer}, editor = {Dan Boneh and Tim Roughgarden and Joan Feigenbaum}, title = {On the concrete efficiency of probabilistically-checkable proofs}, booktitle = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA, USA, June 1-4, 2013}, pages = {585--594}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488608.2488681}, doi = {10.1145/2488608.2488681}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/Ben-SassonCGT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-SassonCGTV13, author = {Eli Ben{-}Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer and Madars Virza}, title = {SNARKs for {C:} Verifying Program Executions Succinctly and in Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {507}, year = {2013}, url = {http://eprint.iacr.org/2013/507}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-SassonCGTV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GenkinST13, author = {Daniel Genkin and Adi Shamir and Eran Tromer}, title = {{RSA} Key Extraction via Low-Bandwidth Acoustic Cryptanalysis}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {857}, year = {2013}, url = {http://eprint.iacr.org/2013/857}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GenkinST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/Ben-SassonCGT12, author = {Eli Ben{-}Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer}, title = {On the Concrete-Efficiency Threshold of Probabilistically-Checkable Proofs}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR12-045}}, year = {2012}, url = {https://eccc.weizmann.ac.il/report/2012/045}, eprinttype = {ECCC}, eprint = {TR12-045}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/Ben-SassonCGT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Ben-SassonCGT12, author = {Eli Ben{-}Sasson and Alessandro Chiesa and Daniel Genkin and Eran Tromer}, title = {Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2012}, url = {http://eprint.iacr.org/2012/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Ben-SassonCGT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sLogica/AizikowitzFGK10, author = {Tamar Aizikowitz and Nissim Francez and Daniel Genkin and Michael Kaminski}, title = {Extending Free Pregroups with Lower Bounds}, journal = {Stud Logica}, volume = {95}, number = {3}, pages = {417--441}, year = {2010}, url = {https://doi.org/10.1007/s11225-010-9264-4}, doi = {10.1007/S11225-010-9264-4}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sLogica/AizikowitzFGK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/GenkinFK10, author = {Daniel Genkin and Nissim Francez and Michael Kaminski}, editor = {Zohar Manna and Doron A. Peled}, title = {Mildly Context-Sensitive Languages via Buffer Augmented Pregroup Grammars}, booktitle = {Time for Verification, Essays in Memory of Amir Pnueli}, series = {Lecture Notes in Computer Science}, volume = {6200}, pages = {144--166}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13754-9\_7}, doi = {10.1007/978-3-642-13754-9\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/GenkinFK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.