关注
Jason Kim
Jason Kim
在 gatech.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Spook. js: Attacking Chrome strict site isolation via speculative execution
A Agarwal, S O’Connell, J Kim, S Yehezkel, D Genkin, E Ronen, Y Yarom
2022 IEEE Symposium on Security and Privacy (SP), 699-715, 2022
352022
Hot Pixels: Frequency, Power, and Temperature Attacks on {GPUs} and Arm {SoCs}
H Taneja, J Kim, JJ Xu, S Van Schaik, D Genkin, Y Yarom
32nd USENIX Security Symposium (USENIX Security 23), 6275-6292, 2023
242023
Ileakage: Browser-based timerless speculative execution attacks on apple devices
J Kim, S van Schaik, D Genkin, Y Yarom
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
122023
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism
I Kang, W Wang, J Kim, S van Schaik, Y Tobah, D Genkin, A Kwong, ...
Proc. USENIX, 2024
42024
Revisiting Lightweight Compiler Provenance Recovery on ARM Binaries
J Kim, D Genkin, K Leach
2023 IEEE/ACM 31st International Conference on Program Comprehension (ICPC …, 2023
32023
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol
A Kwong, W Wang, J Kim, J Berger, D Genkin, E Ronen, H Shacham, ...
32nd USENIX Security Symposium (USENIX Security 23), 7107-7124, 2023
12023
系统目前无法执行此操作,请稍后再试。
文章 1–6