Spectre Attacks: Exploiting Speculative Execution |
40th IEEE Symposium on Security and Privacy
|
Meltdown: Basics, Details, Consequences |
Black Hat USA 2018
|
Another Flip in the Row |
Black Hat USA 2018
|
Another Flip in the Wall of Rowhammer Defenses |
39th IEEE Symposium on Security and Privacy
|
When Good Turns Evil: Using Intel SGX to Stealthily Steal Bitcoins |
Black Hat Asia 2018
|
Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives |
ACM CCS 2017
|
To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures |
ACM CCS 2017
|
Hello From the Other Side: SSH Over Robust Cache Covert Channels in the Cloud |
Black Hat Asia 2017
|
Hardware Attacks and Security |
RSAC USA 2016
|
Secure Implementation Methods |
RSAC USA 2013
|