USENIX reaffirms its commitment to diversity, equity, and inclusion.
Biblio
Export 11 results:
Filters: Author is Frank Piessens [Clear All Filters]
CopyCat: Controlled Instruction-Level Attacks on Enclaves. 29th USENIX Security Symposium (USENIX Security 20). :469--486.
.
2020. A Systematic Evaluation of Transient Execution Attacks and Defenses. 28th USENIX Security Symposium (USENIX Security 19). :249--266.
.
2019. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. 27th USENIX Security Symposium (USENIX Security 18). :991–1008.
.
2018. Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives. 12th USENIX Workshop on Offensive Technologies (WOOT 18).
.
2018. Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution. 26th USENIX Security Symposium (USENIX Security 17). :1041--1056.
.
2017. All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS. 2016 USENIX Annual Technical Conference (USENIX ATC 16).
.
2016. Ariadne: A Minimal Approach to State Continuity. 25th USENIX Security Symposium (USENIX Security 16). :875--892.
.
2016. Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys. 25th USENIX Security Symposium (USENIX Security 16). :673--688.
.
2016. Request and Conquer: Exposing Cross-Origin Resource Size. 25th USENIX Security Symposium (USENIX Security 16). :447--462.
.
2016. All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS. 24th USENIX Security Symposium (USENIX Security 15). :97--112.
.
2015. Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base. 22nd USENIX Security Symposium (USENIX Security 13). :479--498.
.
2013.