Boris Köpf

Orcid: 0009-0005-8004-0743

According to our database1, Boris Köpf authored at least 56 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Permissive Information-Flow Analysis for Large Language Models.
CoRR, 2024

Closed-Form Bounds for DP-SGD against Record-level Inference.
Proceedings of the 33rd USENIX Security Symposium, 2024

Principled Microarchitectural Isolation on Cloud CPUs.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Gaussian Elimination of Side-Channels: Linear Algebra for Memory Coloring.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Revizor: Testing Black-Box CPUs Against Speculation Contracts.
IEEE Micro, 2023

Maatphor: Automated Variant Analysis for Prompt Injection Attacks.
CoRR, 2023

Rethinking Privacy in Machine Learning Pipelines from an Information Flow Control Perspective.
CoRR, 2023

Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions.
Proceedings of the 32nd USENIX Security Symposium, 2023

SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Bayesian Estimation of Differential Privacy.
Proceedings of the International Conference on Machine Learning, 2023

2021
Revizor: Fuzzing for Leaks in Black-box CPUs.
CoRR, 2021

Hardware-Software Contracts for Secure Speculation.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Grey-box Extraction of Natural Language Models.
Proceedings of the 38th International Conference on Machine Learning, 2021

2020
Flushgeist: Cache Leaks from Beyond the Flush.
CoRR, 2020

Spectector: Principled Detection of Speculative Information Flows.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

CacheQuery: learning replacement policies from hardware caches.
Proceedings of the 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2020

Analyzing Information Leakage of Updates to Natural Language Models.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
On the Incomparability of Cache Algorithms in Terms of Timing Leakage.
Log. Methods Comput. Sci., 2019

Analyzing Privacy Loss in Updates of Natural Language Models.
CoRR, 2019

Theory and Practice of Finding Eviction Sets.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

On Aggregation of Information in Timing Attacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Timing Leaks and Coarse-Grained Clocks.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

2017
Loophole: Timing Attacks on Shared Event Loops in Chrome.
Proceedings of the 26th USENIX Security Symposium, 2017

Security Analysis of Cache Replacement Policies.
Proceedings of the Principles of Security and Trust - 6th International Conference, 2017

Rigorous analysis of software countermeasures against cache attacks.
Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2017

A Systematic Study of Cache Side Channels Across AES Implementations.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

A Language-Theoretic View on Network Protocols.
Proceedings of the Automated Technology for Verification and Analysis, 2017

2015
CacheAudit: A Tool for the Static Analysis of Cache Side Channels.
ACM Trans. Inf. Syst. Secur., 2015

Quantifying information flow in cryptographic systems.
Math. Struct. Comput. Sci., 2015

Rational Protection against Timing Attacks.
Proceedings of the IEEE 28th Computer Security Foundations Symposium, 2015

Symbolic Polytopes for Quantitative Interpolation and Verification.
Proceedings of the Computer Aided Verification - 27th International Conference, 2015

2014
Leakage Resilience against Concurrent Cache Attacks.
Proceedings of the Principles of Security and Trust - Third International Conference, 2014

2013
Probabilistic Relational Reasoning for Differential Privacy.
ACM Trans. Program. Lang. Syst., 2013

CacheAudit: A Tool for the Static Analysis of Cache Side Channels.
IACR Cryptol. ePrint Arch., 2013

Automation of Quantitative Information-Flow Analysis.
Proceedings of the Formal Methods for Dynamical Systems, 2013

Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Verifying information flow properties of hybrid systems.
Proceedings of the 2nd ACM International Conference on High Confidence Networked Systems (part of CPS Week), 2013

2012
Automatic Quantification of Cache Side-Channels.
IACR Cryptol. ePrint Arch., 2012

Quantitative Security Analysis (Dagstuhl Seminar 12481).
Dagstuhl Reports, 2012

2011
Automatically deriving information-theoretic bounds for adaptive side-channel attacks.
J. Comput. Secur., 2011

Information-theoretic Bounds for Differentially Private Mechanisms.
IACR Cryptol. ePrint Arch., 2011

Non-uniform distributions in quantitative information-flow.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Speaker Recognition in Encrypted Voice Streams.
Proceedings of the Computer Security, 2010

Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

Approximation and Randomization for Quantitative Information-Flow Analysis.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

2009
A Provably Secure And Efficient Countermeasure Against Timing Attacks.
IACR Cryptol. ePrint Arch., 2009

Automatic Discovery and Quantification of Information Leaks.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

2008
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks.
IACR Cryptol. ePrint Arch., 2008

2007
Formal approaches to countering side-channel attacks.
PhD thesis, 2007

Transformational typing and unification for automatically correcting insecure programs.
Int. J. Inf. Sec., 2007

An information-theoretic model for adaptive side-channel attacks.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Timing-Sensitive Information Flow Analysis for Synchronous Systems.
Proceedings of the Computer Security, 2006

2005
Eliminating Implicit Information Leaks by Transformational Typing and Unification.
Proceedings of the Formal Aspects in Security and Trust, Third International Workshop, 2005

2001
Fast and Simple Horizontal Coordinate Assignment.
Proceedings of the Graph Drawing, 9th International Symposium, 2001

Visone.
Proceedings of the Graph Drawing, 9th International Symposium, 2001


  Loading...