USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 14 results:
Filters: Author is Yuval Yarom [Clear All Filters]
Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome. 33rd USENIX Security Symposium (USENIX Security 24). :3331--3348.
.
2024. SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism. 33rd USENIX Security Symposium (USENIX Security 24). :1597--1614.
.
2024. BunnyHop: Exploiting the Instruction Prefetcher. 32nd USENIX Security Symposium (USENIX Security 23). :7321--7337.
.
2023. Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol. 32nd USENIX Security Symposium (USENIX Security 23). :7107--7124.
.
2023. The Gates of Time: Improving Cache Attacks with Transient Execution. 32nd USENIX Security Symposium (USENIX Security 23). :1955--1972.
.
2023. Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs. 32nd USENIX Security Symposium (USENIX Security 23). :6275--6292.
.
2023. The Impostor Among US(B): Off-Path Injection Attacks on USB Communications. 32nd USENIX Security Symposium (USENIX Security 23). :5863--5880.
.
2023. Ultimate SLH: Taking Speculative Load Hardening to the Next Level. 32nd USENIX Security Symposium (USENIX Security 23). :7125--7142.
.
2023. Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses. 30th USENIX Security Symposium (USENIX Security 21). :2863--2880.
.
2021. Robust Website Fingerprinting Through the Cache Occupancy Channel. 28th USENIX Security Symposium (USENIX Security 19). :639--656.
.
2019. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. 27th USENIX Security Symposium (USENIX Security 18). :991–1008.
.
2018. Meltdown: Reading Kernel Memory from User Space. 27th USENIX Security Symposium (USENIX Security 18). :973--990.
.
2018. USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs. 26th USENIX Security Symposium (USENIX Security 17). :1145--1161.
.
2017. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. 23rd USENIX Security Symposium (USENIX Security 14). :719--732.
.
2014.