default search action
Daniel Genkin
Person information
- affiliation: Georgia Tech, Atlanta, GA, USA
- affiliation: University of Pennsylvania, Philadelphia, PA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j16]Shing Hing William Cheng, Chitchanok Chuengsatiansup, Daniel Genkin, Dallas McNeil, Toby Murray, Yuval Yarom, Zhiyuan Zhang:
Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 224-248 (2024) - [c60]Hosein Yavarzadeh, Archit Agarwal, Max Christman, Christina Garman, Daniel Genkin, Andrew Kwong, Daniel Moghimi, Deian Stefan, Kazem Taram, Dean M. Tullsen:
Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor. ASPLOS (3) 2024: 770-784 - [c59]Boru Chen, Yingchen Wang, Pradyumna Shome, Christopher W. Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin:
GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers. USENIX Security Symposium 2024 - [c58]Ingab Kang, Walter Wang, Jason Kim, Stephan van Schaik, Youssef Tobah, Daniel Genkin, Andrew Kwong, Yuval Yarom:
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism. USENIX Security Symposium 2024 - [c57]Sioli O'Connell, Lishay Aben Sour, Ron Magen, Daniel Genkin, Yossi Oren, Hovav Shacham, Yuval Yarom:
Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome. USENIX Security Symposium 2024 - [c56]Youssef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, Kang G. Shin:
Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage. USENIX Security Symposium 2024 - [i43]Gilles Barthe, Marcel Böhme, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Marco Guarnieri, David Mateos Romero, Peter Schwabe, David Wu, Yuval Yarom:
Testing side-channel security of cryptographic implementations against future microarchitectures. CoRR abs/2402.00641 (2024) - [i42]Shing Hing William Cheng, Chitchanok Chuengsatiansup, Daniel Genkin, Dallas McNeil, Toby Murray, Yuval Yarom, Zhiyuan Zhang:
Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks. IACR Cryptol. ePrint Arch. 2024: 149 (2024) - 2023
- [j15]Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Daniel Genkin, Yehuda Lindell, Ariel Nof:
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries. J. Cryptol. 36(3): 15 (2023) - [j14]Joel Kuepper, Andres Erbsen, Jason Gross, Owen Conoly, Chuyue Sun, Samuel Tian, David Wu, Adam Chlipala, Chitchanok Chuengsatiansup, Daniel Genkin, Markus Wagner, Yuval Yarom:
CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives. Proc. ACM Program. Lang. 7(PLDI): 1268-1292 (2023) - [c55]Daniel Genkin, William Kosasih, Fangfei Liu, Anna Trikalinou, Thomas Unterluggauer, Yuval Yarom:
CacheFX: A Framework for Evaluating Cache Security. AsiaCCS 2023: 163-176 - [c54]Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici:
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. CCS 2023: 268-280 - [c53]Jason Kim, Stephan van Schaik, Daniel Genkin, Yuval Yarom:
iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices. CCS 2023: 2038-2052 - [c52]Joel Kuepper, David Wu, Andres Erbsen, Jason Gross, Owen Conoly, Chuyue Sun, Samuel Tian, Adam Chlipala, Chitchanok Chuengsatiansup, Daniel Genkin, Markus Wagner, Yuval Yarom:
CryptOpt: Automatic Optimization of Straightline Code. ICSE Companion 2023: 141-145 - [c51]Jason Kim, Daniel Genkin, Kevin Leach:
Revisiting Lightweight Compiler Provenance Recovery on ARM Binaries. ICPC 2023: 292-303 - [c50]Basavesh Ammanaghatta Shivakumar, Jack Barnes, Gilles Barthe, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Sioli O'Connell, Peter Schwabe, Rui Qi Sim, Yuval Yarom:
Spectre Declassified: Reading from the Right Place at the Wrong Time. SP 2023: 1753-1770 - [c49]Robert Dumitru, Daniel Genkin, Andrew Wabnitz, Yuval Yarom:
The Impostor Among US(B): Off-Path Injection Attacks on USB Communications. USENIX Security Symposium 2023: 5863-5880 - [c48]Hritvik Taneja, Jason Kim, Jie Jeff Xu, Stephan van Schaik, Daniel Genkin, Yuval Yarom:
Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs. USENIX Security Symposium 2023: 6275-6292 - [c47]Andrew Kwong, Walter Wang, Jason Kim, Jonathan Berger, Daniel Genkin, Eyal Ronen, Hovav Shacham, Riad S. Wahby, Yuval Yarom:
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol. USENIX Security Symposium 2023: 7107-7124 - [c46]Zhiyuan Zhang, Mingtian Tao, Sioli O'Connell, Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom:
BunnyHop: Exploiting the Instruction Prefetcher. USENIX Security Symposium 2023: 7321-7337 - [i41]Jason Kim, Daniel Genkin, Kevin Leach:
Revisiting Lightweight Compiler Provenance Recovery on ARM Binaries. CoRR abs/2305.03934 (2023) - [i40]Hritvik Taneja, Jason Kim, Jie Jeff Xu, Stephan van Schaik, Daniel Genkin, Yuval Yarom:
Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs. CoRR abs/2305.12784 (2023) - [i39]Joel Kuepper, Andres Erbsen, Jason Gross, Owen Conoly, Chuyue Sun, Samuel Tian, David Wu, Adam Chlipala, Chitchanok Chuengsatiansup, Daniel Genkin, Markus Wagner, Yuval Yarom:
CryptOpt: Automatic Optimization of Straightline Code. CoRR abs/2305.19586 (2023) - [i38]Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Or Hai Cohen, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici:
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. IACR Cryptol. ePrint Arch. 2023: 1068 (2023) - 2022
- [c45]Yaakov Cohen, Kevin Sam Tharayil, Arie Haenel, Daniel Genkin, Angelos D. Keromytis, Yossi Oren, Yuval Yarom:
HammerScope: Observing DRAM Power Consumption Using Rowhammer. CCS 2022: 547-561 - [c44]Michael Fahr, Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray A. Perlner, Arkady Yerukhimovich, Daniel Apon:
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer. CCS 2022: 979-993 - [c43]Yang Du, Daniel Genkin, Paul Grubbs:
Snapshot-Oblivious RAMs: Sub-logarithmic Efficiency for Short Transcripts. CRYPTO (4) 2022: 152-181 - [c42]Chitchanok Chuengsatiansup, Daniel Genkin, Yuval Yarom, Zhiyuan Zhang:
Side-Channeling the Kalyna Key Expansion. CT-RSA 2022: 272-296 - [c41]Youssef Tobah, Andrew Kwong, Ingab Kang, Daniel Genkin, Kang G. Shin:
SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks. SP 2022: 681-698 - [c40]Ayush Agarwal, Sioli O'Connell, Jason Kim, Shaked Yehezkel, Daniel Genkin, Eyal Ronen, Yuval Yarom:
Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution. SP 2022: 699-715 - [c39]Daniel Genkin, Noam Nissan, Roei Schuster, Eran Tromer:
Lend Me Your Ear: Passive Remote Physical Side Channels on PCs. USENIX Security Symposium 2022: 4437-4454 - [i37]Daniel Genkin, William Kosasih, Fangfei Liu, Anna Trikalinou, Thomas Unterluggauer, Yuval Yarom:
CacheFX: A Framework for Evaluating Cache Security. CoRR abs/2201.11377 (2022) - [i36]Robert Dumitru, Daniel Genkin, Andrew Wabnitz, Yuval Yarom:
The Impostor Among US(B): Off-Path Injection Attacks on USB Communications. CoRR abs/2211.01109 (2022) - [i35]Joel Kuepper, Andres Erbsen, Jason Gross, Owen Conoly, Chuyue Sun, Samuel Tian, David Wu, Adam Chlipala, Chitchanok Chuengsatiansup, Daniel Genkin, Markus Wagner, Yuval Yarom:
CryptOpt: Verified Compilation with Random Program Search for Cryptographic Primitives. CoRR abs/2211.10665 (2022) - [i34]Basavesh Ammanaghatta Shivakumar, Jack Barnes, Gilles Barthe, Sunjay Cauligi, Chitchanok Chuengsatiansup, Daniel Genkin, Sioli O'Connell, Peter Schwabe, Rui Qi Sim, Yuval Yarom:
Spectre Declassified: Reading from the Right Place at the Wrong Time. IACR Cryptol. ePrint Arch. 2022: 426 (2022) - [i33]Yang Du, Daniel Genkin, Paul Grubbs:
Snapshot-Oblivious RAMs: Sub-Logarithmic Efficiency for Short Transcripts. IACR Cryptol. ePrint Arch. 2022: 858 (2022) - [i32]Michael Fahr, Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray A. Perlner, Arkady Yerukhimovich, Daniel Apon:
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer. IACR Cryptol. ePrint Arch. 2022: 952 (2022) - 2021
- [j13]Daniel Genkin, Yuval Yarom:
Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses]. IEEE Secur. Priv. 19(1): 95-98 (2021) - [c38]Monjur Alam, Baki Berkay Yilmaz, Frank Werner, Niels Samwel, Alenka G. Zajic, Daniel Genkin, Yuval Yarom, Milos Prvulovic:
Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms. EuroS&P 2021: 507-522 - [c37]Stephan van Schaik, Marina Minkin, Andrew Kwong, Daniel Genkin, Yuval Yarom:
CacheOut: Leaking Data on Intel CPUs via Cache Evictions. SP 2021: 339-354 - [c36]Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom:
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses. USENIX Security Symposium 2021: 2863-2880 - [d1]Anatoly Shusterman, Ayush Agrawal, Giorgio Maone, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom:
Browser Based Side-Channel Defenses Datasets. IEEE DataPort, 2021 - [i31]Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom:
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses. CoRR abs/2103.04952 (2021) - 2020
- [j12]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, Raoul Strackx:
Meltdown: reading kernel memory from user space. Commun. ACM 63(6): 46-56 (2020) - [j11]Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre attacks: exploiting speculative execution. Commun. ACM 63(7): 93-101 (2020) - [j10]Daniel Genkin, Romain Poussier, Rui Qi Sim, Yuval Yarom, Yuanjing Zhao:
Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(1): 231-255 (2020) - [c35]Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss, Frank Piessens:
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. SP 2020: 54-72 - [c34]Andrew Kwong, Daniel Genkin, Daniel Gruss, Yuval Yarom:
RAMBleed: Reading Bits in Memory Without Accessing Them. SP 2020: 695-711 - [c33]Shaanan Cohney, Andrew Kwong, Shahar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom:
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG. SP 2020: 1241-1258 - [c32]Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu:
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. USENIX Security Symposium 2020: 2631-2648 - [i30]Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu:
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems. CoRR abs/2006.11946 (2020) - [i29]Stephan van Schaik, Marina Minkin, Andrew Kwong, Daniel Genkin, Yuval Yarom:
CacheOut: Leaking Data on Intel CPUs via Cache Evictions. CoRR abs/2006.13353 (2020)
2010 – 2019
- 2019
- [j9]Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, Raoul Strackx:
Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow. IEEE Micro 39(3): 66-74 (2019) - [c31]Claudio Canella, Daniel Genkin, Lukas Giner, Daniel Gruss, Moritz Lipp, Marina Minkin, Daniel Moghimi, Frank Piessens, Michael Schwarz, Berk Sunar, Jo Van Bulck, Yuval Yarom:
Fallout: Leaking Data on Meltdown-resistant CPUs. CCS 2019: 769-784 - [c30]Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. IEEE Symposium on Security and Privacy 2019: 1-19 - [c29]Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom:
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations. IEEE Symposium on Security and Privacy 2019: 435-452 - [c28]Daniel Genkin, Mihir Pattani, Roei Schuster, Eran Tromer:
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels. IEEE Symposium on Security and Privacy 2019: 853-869 - [i28]Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Frank Piessens, Berk Sunar, Yuval Yarom:
Fallout: Reading Kernel Writes From User Space. CoRR abs/1905.12701 (2019) - [i27]Shaanan Cohney, Andrew Kwong, Shahar Paz, Daniel Genkin, Nadia Heninger, Eyal Ronen, Yuval Yarom:
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG. IACR Cryptol. ePrint Arch. 2019: 996 (2019) - 2018
- [j8]Daniel Genkin, Dimitrios Papadopoulos, Charalampos Papamanthou:
Privacy in decentralized cryptocurrencies. Commun. ACM 61(6): 78-88 (2018) - [j7]Fergus Dall, Gabrielle De Micheli, Thomas Eisenbarth, Daniel Genkin, Nadia Heninger, Ahmad Moghimi, Yuval Yarom:
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2): 171-191 (2018) - [c27]Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom:
Drive-By Key-Extraction Cache Attacks from Portable Code. ACNS 2018: 83-102 - [c26]Daniel Genkin, S. Dov Gordon, Samuel Ranellucci:
Best of Both Worlds in Secure Computation, with Low Communication Overhead. ACNS 2018: 340-359 - [c25]Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell, Ariel Nof:
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries. CRYPTO (3) 2018: 34-64 - [c24]Daniel Genkin, Michael Kaminski, Liat Peterfreund:
Closure Under Reversal of Languages over Infinite Alphabets. CSR 2018: 145-156 - [c23]Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom:
Another Flip in the Wall of Rowhammer Defenses. IEEE Symposium on Security and Privacy 2018: 245-261 - [c22]Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou:
vRAM: Faster Verifiable RAM with Program-Independent Preprocessing. IEEE Symposium on Security and Privacy 2018: 908-925 - [c21]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown: Reading Kernel Memory from User Space. USENIX Security Symposium 2018: 973-990 - [c20]Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, Raoul Strackx:
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. USENIX Security Symposium 2018: 991-1008 - [i26]Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. CoRR abs/1801.01203 (2018) - [i25]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown. CoRR abs/1801.01207 (2018) - [i24]Daniel Genkin, Mihir Pattani, Roei Schuster, Eran Tromer:
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels. CoRR abs/1809.02629 (2018) - [i23]Daniel Genkin, Lev Pachmanov, Eran Tromer, Yuval Yarom:
Drive-by Key-Extraction Cache Attacks from Portable Code. IACR Cryptol. ePrint Arch. 2018: 119 (2018) - [i22]Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell, Ariel Nof:
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries. IACR Cryptol. ePrint Arch. 2018: 570 (2018) - [i21]Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong, Yuval Yarom:
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations. IACR Cryptol. ePrint Arch. 2018: 1173 (2018) - [i20]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown. meltdownattack.com (2018) - [i19]Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. meltdownattack.com (2018) - 2017
- [j6]Yuval Yarom, Daniel Genkin, Nadia Heninger:
CacheBleed: a timing attack on OpenSSL constant-time RSA. J. Cryptogr. Eng. 7(2): 99-112 (2017) - [j5]Daniel Genkin, Adi Shamir, Eran Tromer:
Acoustic Cryptanalysis. J. Cryptol. 30(2): 392-443 (2017) - [c19]Daniel Genkin, Luke Valenta, Yuval Yarom:
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519. CCS 2017: 845-858 - [c18]Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom:
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak. CHES 2017: 555-576 - [c17]Eli Ben-Sasson, Iddo Bentov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza:
Computational Integrity with a Public Random String from Quasi-Linear PCPs. EUROCRYPT (3) 2017: 551-579 - [c16]Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou:
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases. IEEE Symposium on Security and Privacy 2017: 863-880 - [c15]Daniel Genkin, Yuval Ishai, Mor Weiss:
How to Construct a Leakage-Resilient (Stateless) Trusted Party. TCC (2) 2017: 209-244 - [c14]Yang Su, Daniel Genkin, Damith Chinthana Ranasinghe, Yuval Yarom:
USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs. USENIX Security Symposium 2017: 1145-1161 - [i18]Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom:
Another Flip in the Wall of Rowhammer Defenses. CoRR abs/1710.00551 (2017) - [i17]Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal, Yuval Yarom:
Sliding right into disaster: Left-to-right sliding windows leak. IACR Cryptol. ePrint Arch. 2017: 627 (2017) - [i16]Daniel Genkin, Luke Valenta, Yuval Yarom:
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519. IACR Cryptol. ePrint Arch. 2017: 806 (2017) - [i15]Daniel Genkin, Yuval Ishai, Mor Weiss:
How to Construct a Leakage-Resilient (Stateless) Trusted Party. IACR Cryptol. ePrint Arch. 2017: 926 (2017) - [i14]Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou:
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases. IACR Cryptol. ePrint Arch. 2017: 1145 (2017) - [i13]Yupeng Zhang, Daniel Genkin, Jonathan Katz, Dimitrios Papadopoulos, Charalampos Papamanthou:
A Zero-Knowledge Version of vSQL. IACR Cryptol. ePrint Arch. 2017: 1146 (2017) - 2016
- [b1]Daniel Genkin:
Secure Computation in Hostile Environments. Technion - Israel Institute of Technology, Israel, 2016 - [j4]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, Eran Tromer:
Physical key extraction attacks on PCs. Commun. ACM 59(6): 70-79 (2016) - [c13]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom:
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels. CCS 2016: 1626-1638 - [c12]Yuval Yarom, Daniel Genkin, Nadia Heninger:
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. CHES 2016: 346-367 - [c11]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. CT-RSA 2016: 219-235 - [c10]Daniel Genkin, Yuval Ishai, Mor Weiss:
Binary AMD Circuits from Secure Multiparty Computation. TCC (B1) 2016: 336-366 - [i12]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs. IACR Cryptol. ePrint Arch. 2016: 129 (2016) - [i11]Yuval Yarom, Daniel Genkin, Nadia Heninger:
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA. IACR Cryptol. ePrint Arch. 2016: 224 (2016) - [i10]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer, Yuval Yarom:
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels. IACR Cryptol. ePrint Arch. 2016: 230 (2016) - [i9]Eli Ben-Sasson, Iddo Bentov, Alessandro Chiesa, Ariel Gabizon, Daniel Genkin, Matan Hamilis, Evgenya Pergament, Michael Riabzev, Mark Silberstein, Eran Tromer, Madars Virza:
Computational integrity with a public random string from quasi-linear PCPs. IACR Cryptol. ePrint Arch. 2016: 646 (2016) - [i8]Daniel Genkin, Yuval Ishai, Mor Weiss:
Binary AMD Circuits from Secure Multiparty Computation. IACR Cryptol. ePrint Arch. 2016: 809 (2016) - 2015
- [j3]Daniel Genkin, Itamar Pipman, Eran Tromer:
Get your hands off my laptop: physical side-channel key-extraction attacks on PCs - Extended version. J. Cryptogr. Eng. 5(2): 95-112 (2015) - [c9]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. CHES 2015: 207-228 - [c8]Daniel Genkin, Yuval Ishai, Antigoni Polychroniadou:
Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits. CRYPTO (2) 2015: 721-741 - [i7]Daniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer:
Circuits Resilient to Additive Attacks with Applications to Secure Computation. IACR Cryptol. ePrint Arch. 2015: 154 (2015) - [i6]Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer:
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation. IACR Cryptol. ePrint Arch. 2015: 170 (2015) - 2014
- [j2]Daniel Genkin, Michael Kaminski, Liat Peterfreund:
A note on the emptiness problem for alternating finite-memory automata. Theor. Comput. Sci. 526: 97-107 (2014) - [c7]Daniel Genkin, Itamar Pipman, Eran Tromer:
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs. CHES 2014: 242-260 - [c6]Daniel Genkin, Adi Shamir, Eran Tromer:
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis. CRYPTO (1) 2014: 444-461 - [c5]Daniel Genkin, Yuval Ishai, Manoj Prabhakaran, Amit Sahai, Eran Tromer:
Circuits resilient to additive attacks with applications to secure computation. STOC 2014: 495-504 - [i5]