Billy Bob Brumley

Orcid: 0000-0001-9160-0463

Affiliations:
  • Rochester Institute of Technology, NY, USA
  • Tampere University, Finland (former)


According to our database1, Billy Bob Brumley authored at least 45 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Investigating child sexual abuse material availability, searches, and users on the anonymous Tor network for a public health intervention strategy.
CoRR, 2024

2023
SoK: A Systematic Review of TEE Usage for Developing Trusted Applications.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
HyperDegrade: From GHz to MHz Effective CPU Frequencies.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Online Template Attacks: Revisited.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

A formula for disaster: a unified approach to elliptic curve special-point-based attacks.
IACR Cryptol. ePrint Arch., 2021

SoK: Remote Power Analysis.
IACR Cryptol. ePrint Arch., 2021

OpenSSLNTRU: Faster post-quantum TLS key exchange.
IACR Cryptol. ePrint Arch., 2021

Attestation Waves: Platform Trust via Remote Power Analysis.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
From A to Z: Projective coordinates leakage in the wild.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

When one vulnerable primitive turns viral: Novel single-trace attacks on ECDSA and RSA.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Certified Side Channels.
Proceedings of the 29th USENIX Security Symposium, 2020

Déjà Vu: Side-Channel Analysis of Mozilla's NSS.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Set It and Forget It! Turnkey ECC for Instant Integration.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Cache-Timing Attacks on RSA Key Generation.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Memory Tampering Attack on Binary GCD Based Inversion Algorithms.
Int. J. Parallel Program., 2019

Triggerflow: Regression Testing by Advanced Execution Path Inspection.
IACR Cryptol. ePrint Arch., 2019

Batch Binary Weierstrass.
IACR Cryptol. ePrint Arch., 2019

2018
Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study.
IACR Cryptol. ePrint Arch., 2018

Start your ENGINEs: dynamically loadable contemporary crypto.
IACR Cryptol. ePrint Arch., 2018

Port Contention for Fun and Profit.
IACR Cryptol. ePrint Arch., 2018

2016
"Make Sure DSA Signing Exponentiations Really are Constant-Time".
IACR Cryptol. ePrint Arch., 2016

Constant-Time Callees with Variable-Time Callers.
IACR Cryptol. ePrint Arch., 2016

2015
Faster software for fast endomorphisms.
IACR Cryptol. ePrint Arch., 2015

Amplifying Side Channels Through Performance Degradation.
IACR Cryptol. ePrint Arch., 2015

WHIRLBOB, the Whirlpool Based Variant of STRIBOB.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

Faster Binary Curve Software: A Case Study.
Proceedings of the Secure IT Systems, 20th Nordic Conference, 2015

Cache Storage Attacks.
Proceedings of the Topics in Cryptology, 2015

2014
Lighter, Faster, and Constant-Time: WhirlBob, the Whirlpool variant of StriBob.
IACR Cryptol. ePrint Arch., 2014

2013
Faster 128-EEA3 and 128-EIA3 Software.
IACR Cryptol. ePrint Arch., 2013

2011
Covert timing channels, caching, and cryptography.
PhD thesis, 2011

Remote Timing Attacks are Still Practical.
IACR Cryptol. ePrint Arch., 2011

Practical realisation and elimination of an ECC-related software bug attack.
IACR Cryptol. ePrint Arch., 2011

Bit-Sliced Binary Normal Basis Multiplication.
Proceedings of the 20th IEEE Symposium on Computer Arithmetic, 2011

2010
Conversion Algorithms and Implementations for Koblitz Curve Cryptography.
IEEE Trans. Computers, 2010

Secure and Fast Implementations of Two Involution Ciphers.
IACR Cryptol. ePrint Arch., 2010

Consecutive S-box Lookups: A Timing Attack on SNOW 3G.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

New Results on Instruction Cache Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Cache-Timing Template Attacks.
Proceedings of the Advances in Cryptology, 2009

On Modular Decomposition of Integers.
Proceedings of the Progress in Cryptology, 2009

2008
Fast Point Decompression for Standard Elliptic Curves.
Proceedings of the Public Key Infrastructure, 2008

Implementing Cryptography for Packet Level Authentication.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
Koblitz Curves and Integer Equivalents of Frobenius Expansions.
Proceedings of the Selected Areas in Cryptography, 14th International Workshop, 2007

Differential Properties of Elliptic Curves and Blind Signatures.
Proceedings of the Information Security, 10th International Conference, 2007

2006
Left-to-Right Signed-Bit <i>tau</i>-Adic Representations of <i>n</i> Integers (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006


  Loading...