
Daniel Genkin
Person information
- affiliation: University of Pennsylvania, Philadelphia, PA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j13]Daniel Genkin, Yuval Yarom:
Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses]. IEEE Secur. Priv. 19(1): 95-98 (2021) - 2020
- [j12]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, Raoul Strackx:
Meltdown: reading kernel memory from user space. Commun. ACM 63(6): 46-56 (2020) - [j11]Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre attacks: exploiting speculative execution. Commun. ACM 63(7): 93-101 (2020) - [j10]Daniel Genkin, Romain Poussier, Rui Qi Sim, Yuval Yarom, Yuanjing Zhao:
Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 231-255 (2020) - [c35]Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss, Frank Piessens:
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. IEEE Symposium on Security and Privacy 2020: 54-72 - [c34]Andrew Kwong, Daniel Genkin, Daniel Gruss, Yuval Yarom:
RAMBleed: Reading Bits in Memory Without Accessing Them. IEEE Symposium on Security and Privacy 2020: 695-711 - [c33]Shaanan Cohney, Andrew Kwong, Shahar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom:
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG. IEEE Symposium on Security and Privacy 2020: 1241-1258 - [c32]Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu:
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. USENIX Security Symposium 2020: 2631-2648 - [i30]Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu:
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. CoRR abs/2006.11946 (2020) - [i29]Stephan van Schaik, Marina Minkin, Andrew Kwong, Daniel Genkin, Yuval Yarom:
CacheOut: Leaking Data on Intel CPUs via Cache Evictions. CoRR abs/2006.13353 (2020)
2010 – 2019
- 2019
- [j9]Jo Van Bulck
, Marina Minkin, Ofir Weisse
, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch
, Yuval Yarom, Raoul Strackx:
Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow. IEEE Micro 39(3): 66-74 (2019) - [c31]Claudio Canella, Daniel Genkin, Lukas Giner, Daniel Gruss, Moritz Lipp, Marina Minkin, Daniel Moghimi, Frank Piessens, Michael Schwarz, Berk Sunar, Jo Van Bulck
, Yuval Yarom:
Fallout: Leaking Data on Meltdown-resistant CPUs. CCS 2019: 769-784 - [c30]Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom
:
Spectre Attacks: Exploiting Speculative Execution. IEEE Symposium on Security and Privacy 2019: 1-19 - [c29]Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom
:
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations. IEEE Symposium on Security and Privacy 2019: 435-452 - [c28]Daniel Genkin, Mihir Pattani, Roei Schuster, Eran Tromer:
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels. IEEE Symposium on Security and Privacy 2019: 853-869 - [i28]Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Frank Piessens, Berk Sunar, Yuval Yarom:
Fallout: Reading Kernel Writes From User Space. CoRR abs/1905.12701 (2019) - [i27]Shaanan Cohney, Andrew Kwong, Shahar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom:
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG. IACR Cryptol. ePrint Arch. 2019: 996 (2019) - 2018
- [j8]Daniel Genkin, Dimitrios Papadopoulos, Charalampos Papamanthou:
Privacy in decentralized cryptocurrencies. Commun. ACM 61(6): 78-88 (2018) - [j7]Fergus Dall, Gabrielle De Micheli
, Thomas Eisenbarth
, Daniel Genkin, Nadia Heninger, Ahmad Moghimi, Yuval Yarom:
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 171-191 (2018) - [c27]Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom:
Drive-By Key-Extraction Cache Attacks from Portable Code. ACNS 2018: 83-102 - [c26]Daniel Genkin, S. Dov Gordon, Samuel Ranellucci:
Best of Both Worlds in Secure Computation, with Low Communication Overhead. ACNS 2018: 340-359 - [c25]Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell
, Ariel Nof:
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries. CRYPTO (3) 2018: 34-64 - [c24]Daniel Genkin, Michael Kaminski, Liat Peterfreund:
Closure Under Reversal of Languages over Infinite Alphabets. CSR 2018: 145-156 - [c23]Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom:
Another Flip in the Wall of Rowhammer Defenses. IEEE Symposium on Security and Privacy 2018: 245-261 - [c22]Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou:
vRAM: Faster Verifiable RAM with Program-Independent Preprocessing. IEEE Symposium on Security and Privacy 2018: 908-925 - [c21]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown: Reading Kernel Memory from User Space. USENIX Security Symposium 2018: 973-990 - [c20]Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, Raoul Strackx:
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. USENIX Security Symposium 2018: 991-1008 - [i26]Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. CoRR abs/1801.01203 (2018) - [i25]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown. CoRR abs/1801.01207 (2018) - [i24]Daniel Genkin, Mihir Pattani, Roei Schuster, Eran Tromer:
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels. CoRR abs/1809.02629 (2018) - [i23]Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom:
Drive-by Key-Extraction Cache Attacks from Portable Code. IACR Cryptol. ePrint Arch. 2018: 119 (2018) - [i22]Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell, Ariel Nof:
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries. IACR Cryptol. ePrint Arch. 2018: 570 (2018) - [i21]Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom:
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations. IACR Cryptol. ePrint Arch. 2018: 1173 (2018) - [i20]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown. meltdownattack.com (2018) - [i19]Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. meltdownattack.com (2018) - 2017
- [j6]Yuval Yarom, Daniel Genkin, Nadia Heninger:
CacheBleed: a timing attack on OpenSSL constant-time RSA. J. Cryptogr. Eng. 7(2): 99-112 (2017) - [j5]Daniel Genkin, Adi Shamir, Eran Tromer:
Acoustic Cryptanalysis. J. Cryptol. 30(2): 392-443 (2017) - [c19]Daniel Genkin, Luke Valenta, Yuval Yarom:
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519. CCS 2017: 845-858 - [c18]Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom:
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak. CHES 2017: 555-576 - [c17]Eli Ben-Sasson, Iddo Bentov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza:
Computational Integrity with a Public Random String from Quasi-Linear PCPs. EUROCRYPT (3) 2017: 551-579 - [c16]Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos
, Charalampos Papamanthou:
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases. IEEE Symposium on Security and Privacy 2017: 863-880 - [c15]Daniel Genkin, Yuval Ishai, Mor Weiss:
How to Construct a Leakage-Resilient (Stateless) Trusted Party. TCC (2) 2017: 209-244 - [c14]Yang Su, Daniel Genkin, Damith Chinthana Ranasinghe, Yuval Yarom:
USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs. USENIX Security Symposium 2017: 1145-1161 - [i18]Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom:
Another Flip in the Wall of Rowhammer Defenses. CoRR abs/1710.00551 (2017) - [i17]Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom:
Sliding right into disaster: Left-to-right sliding windows leak. IACR Cryptol. ePrint Arch. 2017: 627 (2017) - [i16]Daniel Genkin, Luke Valenta, Yuval Yarom:
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519. IACR Cryptol. ePrint Arch. 2017: 806 (2017) - [i15]Daniel Genkin, Yuval Ishai, Mor Weiss:
How to Construct a Leakage-Resilient (Stateless) Trusted Party. IACR Cryptol. ePrint Arch. 2017: 926 (2017) - [i14]Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou:
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases. IACR Cryptol. ePrint Arch. 2017: 1145 (2017) - [i13]Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou:
A Zero-Knowledge Version of vSQL. IACR Cryptol. ePrint Arch. 2017: 1146 (2017) - 2016
- [j4]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, Eran Tromer:
Physical key extraction attacks on PCs. Commun. ACM 59(6): 70-79 (2016) - [c13]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom
:
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels. CCS 2016: 1626-1638 - [c12]Yuval Yarom
, Daniel Genkin, Nadia Heninger:
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. CHES 2016: 346-367 - [c11]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. CT-RSA 2016: 219-235 - [c10]Daniel Genkin, Yuval Ishai, Mor Weiss:
Binary AMD Circuits from Secure Multiparty Computation. TCC (B1) 2016: 336-366 - [i12]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. IACR Cryptol. ePrint Arch. 2016: 129 (2016) - [i11]Yuval Yarom, Daniel Genkin, Nadia Heninger:
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. IACR Cryptol. ePrint Arch. 2016: 224 (2016) - [i10]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom:
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels. IACR Cryptol. ePrint Arch. 2016: 230 (2016) - [i9]Eli Ben-Sasson, Iddo Bentov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza:
Computational integrity with a public random string from quasi-linear PCPs. IACR Cryptol. ePrint Arch. 2016: 646 (2016) - [i8]Daniel Genkin, Yuval Ishai, Mor Weiss:
Binary AMD Circuits from Secure Multiparty Computation. IACR Cryptol. ePrint Arch. 2016: 809 (2016) - 2015
- [j3]Daniel Genkin, Itamar Pipman, Eran Tromer:
Get your hands off my laptop: physical side-channel key-extraction attacks on PCs - Extended version. J. Cryptogr. Eng. 5(2): 95-112 (2015) - [c9]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. CHES 2015: 207-228 - [c8]Daniel Genkin, Yuval Ishai, Antigoni Polychroniadou:
Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits. CRYPTO (2) 2015: 721-741 - [i7]Daniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer:
Circuits Resilient to Additive Attacks with Applications to Secure Computation. IACR Cryptol. ePrint Arch. 2015: 154 (2015) - [i6]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. IACR Cryptol. ePrint Arch. 2015: 170 (2015) - 2014
- [j2]Daniel Genkin, Michael Kaminski, Liat Peterfreund:
A note on the emptiness problem for alternating finite-memory automata. Theor. Comput. Sci. 526: 97-107 (2014) - [c7]Daniel Genkin, Itamar Pipman, Eran Tromer:
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs. CHES 2014: 242-260 - [c6]Daniel Genkin, Adi Shamir, Eran Tromer:
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. CRYPTO (1) 2014: 444-461 - [c5]Daniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer:
Circuits resilient to additive attacks with applications to secure computation. STOC 2014: 495-504 - [i5]Daniel Genkin, Itamar Pipman, Eran Tromer:
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs. IACR Cryptol. ePrint Arch. 2014: 626 (2014) - 2013
- [c4]Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza:
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. CRYPTO (2) 2013: 90-108 - [c3]Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer:
Fast reductions from RAMs to delegatable succinct constraint satisfaction problems: extended abstract. ITCS 2013: 401-414 - [c2]Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer:
On the concrete efficiency of probabilistically-checkable proofs. STOC 2013: 585-594 - [i4]Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, Madars Virza:
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge. IACR Cryptol. ePrint Arch. 2013: 507 (2013) - [i3]Daniel Genkin, Adi Shamir, Eran Tromer:
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. IACR Cryptol. ePrint Arch. 2013: 857 (2013) - 2012
- [i2]Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer:
On the Concrete-Efficiency Threshold of Probabilistically-Checkable Proofs. Electron. Colloquium Comput. Complex. 19: 45 (2012) - [i1]Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer:
Fast Reductions from RAMs to Delegatable Succinct Constraint Satisfaction Problems. IACR Cryptol. ePrint Arch. 2012: 71 (2012) - 2010
- [j1]Tamar Aizikowitz, Nissim Francez, Daniel Genkin, Michael Kaminski:
Extending Free Pregroups with Lower Bounds. Stud Logica 95(3): 417-441 (2010) - [c1]Daniel Genkin, Nissim Francez, Michael Kaminski:
Mildly Context-Sensitive Languages via Buffer Augmented Pregroup Grammars. Essays in Memory of Amir Pnueli 2010: 144-166
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-02-18 23:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint