Daniel Genkin
Daniel Genkin
כתובת אימייל מאומתת בדומיין umich.edu - דף הבית
כותרתצוטט על ידישנה
Spectre Attacks: Exploiting Speculative Execution
P Kocher, D Genkin, D Gruss, W Haas, M Hamburg, M Lipp, S Mangard, ...
arXiv preprint arXiv:1801.01203, 2018
4182018
Meltdown: Reading Kernel Memory from User Space
M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, A Fogh, J Horn, ...
27th USENIX Security Symposium (USENIX Security 18), 2018
366*2018
RSA key extraction via low-bandwidth acoustic cryptanalysis
D Genkin, A Shamir, E Tromer
Advances in Cryptology–CRYPTO 2014, 444-461, 2014
3152014
SNARKs for C: Verifying program executions succinctly and in zero knowledge
E Ben-Sasson, A Chiesa, D Genkin, E Tromer, M Virza
Annual Cryptology Conference, 90-108, 2013
2802013
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs
D Genkin, I Pipman, E Tromer
Cryptographic Hardware and Embedded Systems–CHES 2014, 242-260, 2014
1032014
CacheBleed: A timing attack on OpenSSL constant time RSA
Y Yarom, D Genkin, N Heninger
International Conference on Cryptographic Hardware and Embedded Systems, 346-367, 2016
982016
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
J Van Bulck, M Minkin, O Weisse, D Genkin, B Kasikci, F Piessens, ...
27th USENIX Security Symposium (USENIX Security 18), 2018
942018
Stealing Keys from PCs using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation
D Genkin, L Pachmanov, I Pipman, E Tromer
Cryptographic Hardware and Embedded Systems--CHES 2015: 17th International …, 2015
922015
ECDSA key extraction from mobile devices via nonintrusive physical side channels
D Genkin, L Pachmanov, I Pipman, E Tromer, Y Yarom
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
762016
On the concrete efficiency of probabilistically-checkable proofs
E Ben-Sasson, A Chiesa, D Genkin, E Tromer
Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013
61*2013
Fast reductions from RAMs to delegatable succinct constraint satisfaction problems
E Ben-Sasson, A Chiesa, D Genkin, E Tromer
Proceedings of the 4th conference on Innovations in Theoretical Computer …, 2013
612013
Physical key extraction attacks on PCs
D Genkin, L Pachmanov, I Pipman, A Shamir, E Tromer
Communications of the ACM 59 (6), 70-79, 2016
59*2016
ECDH key-extraction via low-bandwidth electromagnetic attacks on PCs
D Genkin, L Pachmanov, I Pipman, E Tromer
Cryptographers’ Track at the RSA Conference, 219-235, 2016
402016
Circuits resilient to additive attacks with applications to secure computation
D Genkin, Y Ishai, MM Prabhakaran, A Sahai, E Tromer
Proceedings of the 46th Annual ACM Symposium on Theory of Computing, 495-504, 2014
352014
Computational integrity with a public random string from quasi-linear PCPs
E Ben-Sasson, I Ben-Tov, A Chiesa, A Gabizon, D Genkin, M Hamilis, ...
EUROCRYPT, 2017
332017
Another flip in the wall of rowhammer defenses
D Gruss, M Lipp, M Schwarz, D Genkin, J Juffinger, S O'Connell, ...
2018 IEEE Symposium on Security and Privacy (SP), 245-261, 2018
322018
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou
Security and Privacy (SP), 2017 IEEE Symposium on, 863-880, 2017
322017
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519
D Genkin, L Valenta, Y Yarom
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
302017
Acoustic Cryptanalysis
D Genkin, A Shamir, E Tromer
Journal of Cryptology, 1-52, 2016
242016
Foreshadow-NG: Breaking the Virtual Memory Abstraction with Transient Out-of-Order Execution
O Weisse, J Van Bulck, M Minkin, D Genkin, B Kasikci, F Piessens, ...
Technical Report, 2018
192018
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20