default search action
Berk Gülmezoglu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c12]Debopriya Roy Dipta, Thore Tiemann, Berk Gülmezoglu, Eduard Marin, Thomas Eisenbarth:
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments. EuroS&P 2024: 327-344 - [d1]Debopriya Roy Dipta, Berk Gülmezoglu:
MAD-EN: Microarchitectural Attack Detection through System-wide Energy Consumption. IEEE DataPort, 2024 - [i13]Debopriya Roy Dipta, Thore Tiemann, Berk Gülmezoglu, Eduard Marin, Thomas Eisenbarth:
Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments. CoRR abs/2404.10715 (2024) - [i12]Seth Barrett, Calvin Idom, German Zavala Villafuerte, Andrew Byers, Berk Gülmezoglu:
Ain't How You Deploy: An Analysis of BGP Security Policies Performance Against Various Attack Scenarios with Differing Deployment Strategies. CoRR abs/2408.15970 (2024) - 2023
- [j3]Debopriya Roy Dipta, Berk Gülmezoglu:
MAD-EN: Microarchitectural Attack Detection Through System-Wide Energy Consumption. IEEE Trans. Inf. Forensics Secur. 18: 3006-3017 (2023) - [c11]Son Seonghun, Debopriya Roy Dipta, Berk Gülmezoglu:
DefWeb: Defending User Privacy against Cache-based Website Fingerprinting Attacks with Intelligent Noise Injection. ACSAC 2023: 379-393 - [c10]Claudius Pott, Berk Gülmezoglu, Thomas Eisenbarth:
Overcoming the Pitfalls of HPC-based Cryptojacking Detection in Presence of GPUs. CODASPY 2023: 177-188 - 2022
- [j2]Berk Gülmezoglu:
XAI-Based Microarchitectural Side-Channel Analysis for Website Fingerprinting Attacks and Defenses. IEEE Trans. Dependable Secur. Comput. 19(6): 4039-4051 (2022) - [c9]Debopriya Roy Dipta, Berk Gülmezoglu:
DF-SCA: Dynamic Frequency Side Channel Attacks are Practical. ACSAC 2022: 841-853 - [i11]Debopriya Roy Dipta, Berk Gülmezoglu:
MAD-EN: Microarchitectural Attack Detection through System-wide Energy Consumption. CoRR abs/2206.00101 (2022) - [i10]Debopriya Roy Dipta, Berk Gülmezoglu:
DF-SCA: Dynamic Frequency Side Channel Attacks are Practical. CoRR abs/2206.13660 (2022) - 2021
- [c8]M. Caner Tol, Berk Gülmezoglu, Koray Yurtseven, Berk Sunar:
FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings. EuroS&P 2021: 616-632 - 2020
- [i9]M. Caner Tol, Koray Yurtseven, Berk Gülmezoglu, Berk Sunar:
FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings. CoRR abs/2006.14147 (2020)
2010 – 2019
- 2019
- [c7]Berk Gülmezoglu, Andreas Zankl, M. Caner Tol, Saad Islam, Thomas Eisenbarth, Berk Sunar:
Undermining User Privacy on Mobile Devices Using AI. AsiaCCS 2019: 214-227 - [c6]Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks. USENIX Security Symposium 2019: 621-637 - [i8]Saad Islam, Ahmad Moghimi, Ida Bruhns, Moritz Krebbel, Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks. CoRR abs/1903.00446 (2019) - [i7]Berk Gülmezoglu, Ahmad Moghimi, Thomas Eisenbarth, Berk Sunar:
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning. CoRR abs/1907.03651 (2019) - 2018
- [i6]Berk Gülmezoglu, Andreas Zankl, Caner Tol, Saad Islam, Thomas Eisenbarth, Berk Sunar:
Undermining User Privacy on Mobile Devices Using AI. CoRR abs/1811.11218 (2018) - 2017
- [c5]Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
Cache-Based Application Detection in the Cloud Using Machine Learning. AsiaCCS 2017: 288-300 - [c4]Berk Gülmezoglu, Andreas Zankl, Thomas Eisenbarth, Berk Sunar:
PerfWeb: How to Violate Web Privacy with Hardware Performance Events. ESORICS (2) 2017: 80-97 - [i5]Berk Gülmezoglu, Andreas Zankl, Thomas Eisenbarth, Berk Sunar:
PerfWeb: How to Violate Web Privacy with Hardware Performance Events. CoRR abs/1705.04437 (2017) - [i4]Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
Cache-Base Application Detection in the Cloud Using Machine Learning. IACR Cryptol. ePrint Arch. 2017: 245 (2017) - 2016
- [j1]Berk Gülmezoglu, Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar:
Cross-VM Cache Attacks on AES. IEEE Trans. Multi Scale Comput. Syst. 2(3): 211-222 (2016) - [c3]Mehmet Sinan Inci, Berk Gülmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar:
Cache Attacks Enable Bulk Key Recovery on the Cloud. CHES 2016: 368-388 - [c2]Mehmet Sinan Inci, Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
Co-location Detection on the Cloud. COSADE 2016: 19-34 - [i3]Mehmet Sinan Inci, Berk Gülmezoglu, Thomas Eisenbarth, Berk Sunar:
Co-location detection on the Cloud. IACR Cryptol. ePrint Arch. 2016: 284 (2016) - [i2]Mehmet Sinan Inci, Berk Gülmezoglu, Gorka Irazoqui, Thomas Eisenbarth, Berk Sunar:
Cache Attacks Enable Bulk Key Recovery on the Cloud. IACR Cryptol. ePrint Arch. 2016: 596 (2016) - 2015
- [c1]Berk Gülmezoglu, Mehmet Sinan Inci, Gorka Irazoqui Apecechea, Thomas Eisenbarth, Berk Sunar:
A Faster and More Realistic Flush+Reload Attack on AES. COSADE 2015: 111-126 - [i1]Mehmet Sinan Inci, Berk Gülmezoglu, Gorka Irazoqui Apecechea, Thomas Eisenbarth, Berk Sunar:
Seriously, get off my cloud! Cross-VM RSA Key Recovery in a Public Cloud. IACR Cryptol. ePrint Arch. 2015: 898 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint