Jakub Szefer
Orcid: 0000-0001-9721-3640Affiliations:
- Yale University, New Haven, CT, USA
According to our database1,
Jakub Szefer
authored at least 129 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ACM Trans. Reconfigurable Technol. Syst., June, 2024
Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
CoRR, 2024
Time Traveling to Defend Against Adversarial Example Attacks in Image Classification.
CoRR, 2024
Proceedings of the International Symposium on Secure and Private Execution Environment Design, 2024
Proceedings of the International Symposium on Secure and Private Execution Environment Design, 2024
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024
All Your Base Are Belong To Us: Stealing VRP Secrets from Quantum Circuit Structures.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
ACM Trans. Reconfigurable Technol. Syst., March, 2023
ACM Trans. Embed. Comput. Syst., March, 2023
ACM J. Emerg. Technol. Comput. Syst., January, 2023
IEEE Trans. Inf. Forensics Secur., 2023
CoRR, 2023
CoRR, 2023
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023
Proceedings of the Great Lakes Symposium on VLSI 2023, 2023
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
ACM Trans. Reconfigurable Technol. Syst., 2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IEEE Trans. Computers, 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2022
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Leaking Information Through Cache LRU States in Commercial Processors and Secure Caches.
IEEE Trans. Computers, 2021
Understanding the Insecurity of Processor Caches Due to Cache Timing-Based Vulnerabilities.
IEEE Secur. Priv., 2021
IEEE J. Emerg. Sel. Topics Circuits Syst., 2021
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021
Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers.
Proceedings of the HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, 2021
Proceedings of the HASP '21: Workshop on Hardware and Architectural Support for Security and Privacy, 2021
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2021
Proceedings of the International Conference on Field-Programmable Technology, 2021
Modular Inverse for Integers using Fast Constant Time GCD Algorithm and its Applications.
Proceedings of the 31st International Conference on Field-Programmable Logic and Applications, 2021
Proceedings of the 29th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2021
Proceedings of the 29th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2021
Proceedings of the 26th IEEE European Test Symposium, 2021
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021
Proceedings of the Asian Hardware Oriented Security and Trust Symposium, 2021
2020
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the International Conference on Field-Programmable Technology, 2020
Proceedings of the 38th IEEE International Conference on Computer Design, 2020
Proceedings of the IEEE/ACM International Conference On Computer Aided Design, 2020
Proceedings of the IEEE International Symposium on High Performance Computer Architecture, 2020
Proceedings of the FPGA '20: The 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2020
Proceedings of the FPGA '20: The 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2020
Pipeline-aware Logic Deduplication in High-Level Synthesis for Post-Quantum Cryptography Algorithms.
Proceedings of the FPGA '20: The 2020 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2020
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
J. Hardw. Syst. Secur., 2019
J. Hardw. Syst. Secur., 2019
IACR Cryptol. ePrint Arch., 2019
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting.
CoRR, 2019
Designing Monitoring Systems for Continuous Certification of Cloud Services: Deriving Meta-requirements and Design Guidelines.
Commun. Assoc. Inf. Syst., 2019
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019
Proceedings of the 8th International Workshop on Hardware and Architectural Support for Security and Privacy, 2019
Proceedings of the 46th International Symposium on Computer Architecture, 2019
Merge-Exchange Sort Based Discrete Gaussian Sampler with Fixed Memory Access Pattern.
Proceedings of the International Conference on Field-Programmable Technology, 2019
Proceedings of the 37th IEEE International Conference on Computer Design, 2019
Proceedings of the 2019 on Great Lakes Symposium on VLSI, 2019
Proceedings of the 29th International Conference on Field Programmable Logic and Applications, 2019
Proceedings of the 2019 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2019
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019
2018
Synthesis Lectures on Computer Architecture, Morgan & Claypool Publishers, ISBN: 978-3-031-01760-5, 2018
IACR Cryptol. ePrint Arch., 2018
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security <sup>†</sup>.
Cryptogr., 2018
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, 2018
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018
Post-Quantum Cryptography on FPGAs: The Niederreiter Cryptosystem: Extended Abstract.
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the International Conference on ReConFigurable Computing and FPGAs, 2016
Proceedings of the 2016 International Conference on Field-Programmable Technology, 2016
Proceedings of the Seventh ACM Symposium on Cloud Computing, 2016
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016
Proceedings of the 21st Asia and South Pacific Design Automation Conference, 2016
2015
Predicting program phases and defending against side-channel attacks using hardware performance counters.
Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the 5th International Workshop on Trustworthy Embedded Devices, 2015
2014
Proceedings of the Information Security - 17th International Conference, 2014
Proceedings of the HASP 2014, 2014
Leveraging Virtual Machine Introspection for Hot-Hardening of Arbitrary Cloud-User Applications.
Proceedings of the 6th USENIX Workshop on Hot Topics in Cloud Computing, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the Secure Cloud Computing, 2014
2013
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013
BitDeposit: Deterring Attacks and Abuses of Cloud Computing Services through Economic Measures.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013
2012
Proceedings of the 45th Annual IEEE/ACM International Symposium on Microarchitecture, 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012
Proceedings of the 17th International Conference on Architectural Support for Programming Languages and Operating Systems, 2012
2011
Proceedings of the 22nd IEEE International Symposium on Rapid System Prototyping, 2011
A Case for Hardware Protection of Guest VMs from Compromised Hypervisors in Cloud Computing.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the 37th International Symposium on Computer Architecture (ISCA 2010), 2010
Proceedings of the 21st IEEE International Conference on Application-specific Systems Architectures and Processors, 2010
2009
Proceedings of the Annual IEEE International SoC Conference, SoCC 2009, 2009