Jan Wichelmann

Orcid: 0000-0002-5748-5462

According to our database1, Jan Wichelmann authored at least 15 papers between 2018 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SEV-Step A Single-Stepping Framework for AMD-SEV.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Obelix: Mitigating Side-Channels Through Dynamic Obfuscation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Semi-automated and Easily Interpretable Side-Channel Analysis for Modern JavaScript.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

2023
Cipherfix: Mitigating Ciphertext Side-Channel Attacks in Software.
Proceedings of the 32nd USENIX Security Symposium, 2023

MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

2022
A Systematic Look at Ciphertext Side Channels on AMD SEV-SNP.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Microwalk-CI: Practical Side-Channel Analysis for JavaScript Applications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Help, my Signal has bad Device! Breaking the Signal Messenger's Post-CompromiseSecurity through a Malicious Device.
IACR Cryptol. ePrint Arch., 2021

undeSErVed trust: Exploiting Permutation-Agnostic Remote Attestation.
Proceedings of the IEEE Security and Privacy Workshops, 2021

Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2021

Util: : Lookup: Exploiting Key Decoding in Cryptographic Libraries.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
ASAP: Algorithm Substitution Attacks on Cryptographic Protocols.
IACR Cryptol. ePrint Arch., 2020

SEVurity: No Security Without Integrity : Breaking Integrity-Free Memory Encryption with Minimal Assumptions.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations.
Int. J. Parallel Program., 2019

2018
MicroWalk: A Framework for Finding Side Channels in Binaries.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018


  Loading...