An information-theoretic model for adaptive side-channel attacks B Köpf, D Basin 14th ACM Conference on Computer and Communications Security (CCS), 286-296, 2007 | 458 | 2007 |
Cacheaudit: A tool for the static analysis of cache side channels G Doychev, B Köpf, L Mauborgne, J Reineke ACM Transactions on information and system security (TISSEC) 18 (1), 1-32, 2015 | 354 | 2015 |
Probabilistic relational reasoning for differential privacy G Barthe, B Köpf, F Olmedo, S Zanella Béguelin ACM SIGPLAN Notices 47 (1), 97-110, 2012 | 280 | 2012 |
Automatic discovery and quantification of information leaks M Backes, B Köpf, A Rybalchenko 30th IEEE Symposium on Security and Privacy, 141-153, 2009 | 277 | 2009 |
Spectector: Principled Detection of Speculative Information Flows M Guarnieri, B Köpf, JF Morales, J Reineke, A Sánchez 41st IEEE Symposium on Security and Privacy, 2020 | 196 | 2020 |
Theory and practice of finding eviction sets P Vila, B Köpf, JF Morales 40th IEEE Symposium on Security and Privacy 2019, 2018 | 168 | 2018 |
Fast and simple horizontal coordinate assignment U Brandes, B Köpf International Symposium on Graph Drawing, 31-44, 2001 | 151 | 2001 |
Automatic quantification of cache side-channels B Köpf, L Mauborgne, M Ochoa International Conference on Computer Aided Verification (CAV), 564-580, 2012 | 148 | 2012 |
A provably secure and efficient countermeasure against timing attacks B Köpf, M Dürmuth IEEE Computer Security Foundations Symposium (CSF), 324-335, 2009 | 145 | 2009 |
Analyzing information leakage of updates to natural language models S Zanella-Béguelin, L Wutschitz, S Tople, V Rühle, A Paverd, ... Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 119 | 2020 |
Information-theoretic bounds for differentially private mechanisms G Barthe, B Kopf IEEE Computer Security Foundations Symposium (CSF), 191-204, 2011 | 116 | 2011 |
Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks B Köpf, G Smith IEEE Computer Security Foundations Symposium (CSF), 44-56, 2010 | 113 | 2010 |
Visone software for visual social network analysis M Baur, M Benkert, U Brandes, S Cornelsen, M Gaertler, B Köpf, J Lerner, ... International symposium on graph drawing, 463-464, 2001 | 110 | 2001 |
Hardware-software contracts for secure speculation M Guarnieri, B Köpf, J Reineke, P Vila 2021 IEEE Symposium on Security and Privacy (SP), 1868-1883, 2021 | 97 | 2021 |
Approximation and randomization for quantitative information-flow analysis B Köpf, A Rybalchenko 2010 23rd IEEE Computer Security Foundations Symposium, 3-14, 2010 | 97 | 2010 |
Rigorous analysis of software countermeasures against cache attacks G Doychev, B Köpf ACM Conference on Programming Language Design and Implementation (PLDI), 406-421, 2017 | 84 | 2017 |
Loophole: Timing attacks on shared event loops in chrome P Vila, B Köpf 26th USENIX Security Symposium (USENIX Security), 849-864, 2017 | 80 | 2017 |
Speaker recognition in encrypted voice streams M Backes, G Doychev, M Dürmuth, B Köpf European Symposium on Research in Computer Security (ESORICS), 508-523, 2010 | 65 | 2010 |
Transformational typing and unification for automatically correcting insecure programs B Köpf, H Mantel International Journal of Information Security 6 (2), 107-131, 2007 | 63* | 2007 |
Preventing Side-Channel Leaks in Web Traffic: A Formal Approach. M Backes, G Doychev, B Köpf Network and Distributed Systems Symposium (NDSS), 2013 | 61 | 2013 |