Biblio

Export 8 results:
Filters: Author is Nadia Heninger  [Clear All Filters]
2020
Moghimi D, Van Bulck J, Heninger N, Piessens F, Sunar B.  2020.  CopyCat: Controlled Instruction-Level Attacks on Enclaves. 29th USENIX Security Symposium (USENIX Security 20). :469--486.
Moghimi D, Sunar B, Eisenbarth T, Heninger N.  2020.  TPM-FAIL: TPM meets Timing and Lattice Attacks. 29th USENIX Security Symposium (USENIX Security 20). :2057--2073.
2016
Aviram N, Schinzel S, Somorovsky J, Heninger N, Dankel M, Steube J, Valenta L, Adrian D, J. Halderman A, Dukhovni V et al..  2016.  DROWN: Breaking TLS Using SSLv2. 25th USENIX Security Symposium (USENIX Security 16). :689--706.
2012
Heninger N, Durumeric Z, Wustrow E, J. Halderman A.  2012.  Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. 21st USENIX Security Symposium (USENIX Security 12). :205--220.
Devet C, Goldberg I, Heninger N.  2012.  Optimally Robust Private Information Retrieval. 21st USENIX Security Symposium (USENIX Security 12). :269--283.
2010
Heninger N.  2010.  Computational Complexity and Information Asymmetry in Election Audits with Low-Entropy Randomness. 2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE 10).