Onur Aciiçmez

According to our database1, Onur Aciiçmez authored at least 25 papers between 2005 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms.
IEEE Trans. Mob. Comput., 2014

2013
Architecting against Software Cache-Based Side-Channel Attacks.
IEEE Trans. Computers, 2013

2010
Alhambra: a system for creating, enforcing, and testing browser security policies.
Proceedings of the 19th International Conference on World Wide Web, 2010

SEIP: Simple and Efficient Integrity Protection for Open Mobile Platforms.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

New Results on Instruction Cache Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Hardware-software integrated approaches to defend against software cache-based side channel attacks.
Proceedings of the 15th International Conference on High-Performance Computer Architecture (HPCA-15 2009), 2009

A Secure DVB Set-Top Box via Trusting Computing Technologies.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Microarchitectural Attacks and Countermeasures.
Proceedings of the Cryptographic Engineering, 2009

2008
A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL.
Proceedings of the Topics in Cryptology, 2008

Deconstructing new cache designs for thwarting software cache-based side channel attacks.
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, 2008

A Trusted Mobile Phone Prototype.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Micro-Architectural Cryptanalysis.
IEEE Secur. Priv., 2007

A Major Vulnerability in RSA Implementations due to MicroArchitectural Analysis Threat.
IACR Cryptol. ePrint Arch., 2007

New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures.
IACR Cryptol. ePrint Arch., 2007

Yet Another MicroArchitectural Attack: Exploiting I-cache.
IACR Cryptol. ePrint Arch., 2007

An Analytical Model for Time-Driven Cache Attacks.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

Cheap Hardware Parallelism Implies Cheap Security.
Proceedings of the Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007

Cache Based Remote Timing Attack on the AES.
Proceedings of the Topics in Cryptology, 2007

A trusted mobile phone reference architecturevia secure kernel.
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, 2007

2006
Predicting Secret Keys via Branch Prediction.
IACR Cryptol. ePrint Arch., 2006

On the Power of Simple Branch Prediction Analysis.
IACR Cryptol. ePrint Arch., 2006

Trace-Driven Cache Attacks on AES.
IACR Cryptol. ePrint Arch., 2006

Trace-Driven Cache Attacks on AES (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006

2005
Improving Brumley and Boneh timing attack on unprotected SSL implementations.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005


  Loading...