Anil Kurmus

According to our database1, Anil Kurmus authored at least 25 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
GhostRace: Exploiting and Mitigating Speculative Race Conditions.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
Go or No Go: Differential Fuzzing of Native and C Libraries.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

2021
GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021

Bypassing memory safety mechanisms through speculative control flow hijacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

2019
Two methods for exploiting speculative control flow hijacks.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

Memory Categorization: Separating Attacker-Controlled Data.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

SMoTherSpectre: Exploiting Speculative Execution through Port Contention.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Speculator: a tool to analyze speculative execution attacks and mitigations.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2017
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

2016
A transparent defense against USB eavesdropping attacks.
Proceedings of the 9th European Workshop on System Security, 2016

AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves.
Proceedings of the Computer Security - ESORICS 2016, 2016

2014
Kernel Self-Protection through Quantified Attack Surface Reduction.
PhD thesis, 2014

Quantifiable Run-Time Kernel Attack Surface Reduction.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014

A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split Kernel.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
PSP: Private and secure payment with RFID.
Comput. Commun., 2013

Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Secure Logical Isolation for Multi-tenancy in cloud storage.
Proceedings of the IEEE 29th Symposium on Mass Storage Systems and Technologies, 2013

Implementation and implications of a stealth hard-drive backdoor.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Automatic OS Kernel TCB Reduction by Leveraging Compile-Time Configurability.
Proceedings of the Eighth Workshop on Hot Topics in System Dependability, HotDep 2012, 2012

Secure cloud maintenance: protecting workloads against insider attacks.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
The F_f-Family of Protocols for RFID-Privacy and Authentication.
IEEE Trans. Dependable Secur. Comput., 2011

A Comparison of Secure Multi-Tenancy Architectures for Filesystem Storage Clouds.
Proceedings of the Middleware 2011, 2011

Attack surface reduction for commodity OS kernels: trimmed garden plants may attract less bugs.
Proceedings of the Fourth European Workshop on System Security, 2011

2010
Design and Implementation of a Key-Lifecycle Management System.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2008
The F<sub>f</sub>-Family of Protocols for RFID-Privacy and Authentication.
IACR Cryptol. ePrint Arch., 2008


  Loading...