2024
GhostRace: Exploiting and Mitigating Speculative Race Conditions.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
Go or No Go: Differential Fuzzing of Native and C Libraries.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023
2021
GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021
Bypassing memory safety mechanisms through speculative control flow hijacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2019
Two methods for exploiting speculative control flow hijacks.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019
Memory Categorization: Separating Attacker-Controlled Data.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019
SMoTherSpectre: Exploiting Speculative Execution through Port Contention.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Speculator: a tool to analyze speculative execution attacks and mitigations.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2017
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
2016
A transparent defense against USB eavesdropping attacks.
Proceedings of the 9th European Workshop on System Security, 2016
AsyncShock: Exploiting Synchronisation Bugs in Intel SGX Enclaves.
Proceedings of the Computer Security - ESORICS 2016, 2016
2014
Kernel Self-Protection through Quantified Attack Surface Reduction.
PhD thesis, 2014
Quantifiable Run-Time Kernel Attack Surface Reduction.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2014
A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split Kernel.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
PSP: Private and secure payment with RFID.
Comput. Commun., 2013
Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Secure Logical Isolation for Multi-tenancy in cloud storage.
Proceedings of the IEEE 29th Symposium on Mass Storage Systems and Technologies, 2013
Implementation and implications of a stealth hard-drive backdoor.
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Automatic OS Kernel TCB Reduction by Leveraging Compile-Time Configurability.
Proceedings of the Eighth Workshop on Hot Topics in System Dependability, HotDep 2012, 2012
Secure cloud maintenance: protecting workloads against insider attacks.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
The F_f-Family of Protocols for RFID-Privacy and Authentication.
IEEE Trans. Dependable Secur. Comput., 2011
A Comparison of Secure Multi-Tenancy Architectures for Filesystem Storage Clouds.
Proceedings of the Middleware 2011, 2011
Attack surface reduction for commodity OS kernels: trimmed garden plants may attract less bugs.
Proceedings of the Fourth European Workshop on System Security, 2011
2010
Design and Implementation of a Key-Lifecycle Management System.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
2008
The F<sub>f</sub>-Family of Protocols for RFID-Privacy and Authentication.
IACR Cryptol. ePrint Arch., 2008