Spook. js: Attacking Chrome strict site isolation via speculative execution A Agarwal, S O’Connell, J Kim, S Yehezkel, D Genkin, E Ronen, Y Yarom 2022 IEEE Symposium on Security and Privacy (SP), 699-715, 2022 | 35 | 2022 |
Hot Pixels: Frequency, Power, and Temperature Attacks on {GPUs} and Arm {SoCs} H Taneja, J Kim, JJ Xu, S Van Schaik, D Genkin, Y Yarom 32nd USENIX Security Symposium (USENIX Security 23), 6275-6292, 2023 | 24 | 2023 |
Ileakage: Browser-based timerless speculative execution attacks on apple devices J Kim, S van Schaik, D Genkin, Y Yarom Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 12 | 2023 |
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism I Kang, W Wang, J Kim, S van Schaik, Y Tobah, D Genkin, A Kwong, ... Proc. USENIX, 2024 | 4 | 2024 |
Revisiting Lightweight Compiler Provenance Recovery on ARM Binaries J Kim, D Genkin, K Leach 2023 IEEE/ACM 31st International Conference on Program Comprehension (ICPC …, 2023 | 3 | 2023 |
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol A Kwong, W Wang, J Kim, J Berger, D Genkin, E Ronen, H Shacham, ... 32nd USENIX Security Symposium (USENIX Security 23), 7107-7124, 2023 | 1 | 2023 |