Yuval Yarom
Orcid: 0000-0003-0401-4197Affiliations:
- Ruhr University Bochum, Germany
- The University of Adelaide, School of Computer Science, Adelaide, SA, Australia (former, PhD 2014)
According to our database1,
Yuval Yarom
authored at least 96 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
Testing side-channel security of cryptographic implementations against future microarchitectures.
CoRR, 2024
Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
SoK: Can We Really Detect Cache Side-Channel Attacks by Monitoring Performance Counters?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
2023
Comput. J., June, 2023
CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives.
Proc. ACM Program. Lang., 2023
IACR Cryptol. ePrint Arch., 2023
BarraCUDA: Bringing Electromagnetic Side Channel Into Play to Steal the Weights of Neural Networks from NVIDIA GPUs.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: ICSE 2023 Companion Proceedings, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
IACR Cryptol. ePrint Arch., 2022
CryptOpt: Verified Compilation with Random Program Search for Cryptographic Primitives.
CoRR, 2022
CoRR, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022
Proceedings of the 2022 Workshop on Attacks and Solutions in Hardware Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Secur. Priv., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
2020
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Second IEEE International Conference on Trust, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 53rd Annual IEEE/ACM International Symposium on Microarchitecture, 2020
Proceedings of the 22nd International Conference on Enterprise Information Systems, 2020
Proceedings of the Enterprise Information Systems - 22nd International Conference, 2020
2019
Dataset, September, 2019
IEEE Micro, 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
A survey of microarchitectural timing attacks and countermeasures on contemporary hardware.
J. Cryptogr. Eng., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
Proceedings of the 9th Asia-Pacific Workshop on Systems, 2018
2017
To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures.
IACR Cryptol. ePrint Arch., 2017
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Flush, Gauss, and Reload - A Cache Attack on the BLISS Lattice-Based Signature Scheme.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 IEEE International Symposium on High Performance Computer Architecture, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
2013
IACR Cryptol. ePrint Arch., 2013
2012
Proceedings of the VMIL@SPLASH 2012: Proceedings of the sixth ACM workshop on Virtual machines and intermediate languages, 2012
2008
Proceedings of the 2008 Second ACM/IEEE International Conference on Distributed Smart Cameras, 2008