Search

Your search keyword '"Sunar, Berk"' showing total 388 results

Search Constraints

Start Over You searched for: Author "Sunar, Berk" Remove constraint Author: "Sunar, Berk"
388 results on '"Sunar, Berk"'

Search Results

1. FAULT+PROBE: A Generic Rowhammer-based Bit Recovery Attack

2. LeapFrog: The Rowhammer Instruction Skip Attack

3. Mayhem: Targeted Corruption of Register and Stack Variables

4. ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching

6. An End-to-End Analysis of EMFI on Bit-sliced Post-Quantum Implementations

7. Signature Correction Attack on Dilithium Signature Scheme

8. IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems

9. Don't Knock! Rowhammer at the Backdoor of DNN Models

10. FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings

11. CopyCat: Controlled Instruction-Level Attacks on Enclaves

12. JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms

13. TPM-FAIL: TPM meets Timing and Lattice Attacks

14. FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning

15. Fallout: Reading Kernel Writes From User Space

16. Credential Masquerading and OpenSSL Spy: Exploring ROS 2 using DDS security

17. SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks

18. Undermining User Privacy on Mobile Devices Using AI

20. MicroWalk: A Framework for Finding Side Channels in Binaries

21. DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes

22. MemJam: A False Dependency Attack against Constant-Time Crypto Implementations

23. Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries

24. PerfWeb: How to Violate Web Privacy with Hardware Performance Events

25. Homomorphic Rank Sort Using Surrogate Polynomials

26. Flattening NTRU for Evaluation Key Free Homomorphic Encryption

27. MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX

28. Fully Homomorphic Encryption from the Finite Field Isomorphism Problem

32. On-the-fly Homomorphic Batching/Unbatching

33. Cache Attacks Enable Bulk Key Recovery on the Cloud

34. Co-location Detection on the Cloud

35. cuHE: A Homomorphic Encryption Accelerator Library

37. Accelerating LTV Based Homomorphic Encryption in Reconfigurable Hardware

38. Accelerating SWHE Based PIRs Using GPUs

39. Depth Optimized Efficient Homomorphic Sorting

40. A Faster and More Realistic Flush+Reload Attack on AES

41. Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince

42. Bandwidth Efficient PIR from NTRU

43. Wait a Minute! A fast, Cross-VM Attack on AES

50. An Emerging Threat: Eve Meets a Robot : (Work-in-Progress)

Catalog

Books, media, physical & digital resources