USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 6 results:
Filters: Author is David Kohlbrenner [Clear All Filters]
GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers. 33rd USENIX Security Symposium (USENIX Security 24). :1117--1134.
.
2024. Synchronization Storage Channels (S2C)}}}}: Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions. 32nd USENIX Security Symposium (USENIX Security 23). :1973--1990.
.
2023. Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. 31st USENIX Security Symposium (USENIX Security 22). :679--697.
.
2022. On the effectiveness of mitigations against floating-point timing channels. 26th USENIX Security Symposium (USENIX Security 17). :69--81.
.
2017. Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX. 26th USENIX Security Symposium (USENIX Security 17). :51--67.
.
2017. Trusted Browsers for Uncertain Times. 25th USENIX Security Symposium (USENIX Security 16). :463--480.
.
2016.