166 results on '"Hovav Shacham"'
Search Results
2. GPU.zip: On the Side-Channel Implications of Hardware-Based Graphical Data Compression.
3. Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome.
4. The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders.
5. Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol.
6. DVFS Frequently Leaks Secrets: Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data.
7. Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.
8. Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86.
9. Constant-Time Wasmtime, for Real This Time: End-to-End Verified Zero-Overhead Constant-Time Programming for the Web and Beyond.
10. Swivel: Hardening WebAssembly against Spectre.
11. Retrofitting Fine Grain Isolation in the Firefox Renderer.
12. Towards a verified range analysis for JavaScript JITs.
13. Automated policy synthesis for system call sandboxing.
14. Short Unique Signatures from RSA with a Tight Security Reduction (in the Random Oracle Model).
15. On the effectiveness of mitigations against floating-point timing channels.
16. Retrofitting Fine Grain Isolation in the Firefox Renderer (Extended Version).
17. Return-Oriented Programming in RISC-V.
18. The Road to Less Trusted Code: Lowering the Barrier to In-Process Sandboxing.
19. Where did I leave my keys?: lessons from the Juniper Dual EC incident.
20. HIPStR: Heterogeneous-ISA Program State Relocation.
21. Trusted Browsers for Uncertain Times.
22. A Systematic Analysis of the Juniper Dual EC Incident.
23. Gobi: WebAssembly as a Practical Path to Library Sandboxing.
24. On Subnormal Floating Point and Abnormal Timing.
25. A Call to ARMs: Understanding the Costs and Benefits of JIT Spraying Mitigations.
26. On the (In)effectiveness of Mosaicing and Blurring as Tools for Document Redaction.
27. Security Analysis of a Full-Body Scanner.
28. On the Practical Exploitability of Dual EC in TLS Implementations.
29. Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions.
30. Iago attacks: why the system call API is a bad untrusted RPC interface.
31. Measuring the Practical Impact of DNSSEC Deployment.
32. Welcome to the Entropics: Boot-Time Entropy in Embedded Devices.
33. The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions.
34. Are AES x86 cache timing attacks still feasible?
35. Do you know where your cloud files are?
36. Eliminating fine grained timers in Xen.
37. Careful with Composition: Limitations of the Indifferentiability Framework.
38. Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures.
39. Experimental Security Analysis of a Modern Automobile.
40. An empirical study of privacy-violating information flows in JavaScript web applications.
41. Return-oriented programming without returns.
42. Hedged Public-Key Encryption: How to Protect against Bad Randomness.
43. When private keys are public: results from the 2008 Debian OpenSSL vulnerability.
44. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
45. Randomizable Proofs and Delegatable Anonymous Credentials.
46. Reconstructing RSA Private Keys from Random Key Bits.
47. Compact Proofs of Retrievability.
48. When good instructions go bad: generalizing return-oriented programming to RISC.
49. Efficient Ring Signatures Without Random Oracles.
50. The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.