Browsing by Author "Van Bulck, Jo"
- Results Per Page
- Sort Options
Publication About Time: On the Challenges of Temporal Guarantees in Untrusted Environments
;Alder, Fritz ;Scopelliti, Gianluca ;Van Bulck, JoMuhlberg, Jan TobiasProceedings paper2023, 6th Workshop on System Software for Trusted Execution (SysTEX) Part of EuroSys Conference, MAY 08, 2023, p.27-33Publication AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves
;Constable, Scott ;Van Bulck, Jo ;Cheng, Xiang ;Xiao, Yuan ;Xing, CedricAlexandrovich, IlyaProceedings paper2023, 32nd USENIX Security Symposium, AUG 09-11, 2023, p.4051-4068Publication AION: Enabling Open Systems through Strong Availability Guarantees for Enclaves
;Alder, Fritz ;Van Bulck, Jo ;Piessens, FrankMuhlberg, Jan TobiasProceedings paper2021, ACM SIGSAC Conference on Computer and Communications Security (ACM CCS), NOV 15-19, 2021, p.1357-1372Publication Breaking virtual memory protection and the SGX ecosystem with foreshadow
;Van Bulck, Jo ;Minkin, Marina ;Weisse, Ofir ;Genkin, Daniel ;Kasikci, BarisPiessens, FrankJournal article2019, IEEE Micro, (39) 3, p.66-74Publication COPYCAT: Controlled Instruction-Level Attacks on Enclaves
;Moghimi, Daniel ;Van Bulck, Jo ;Heninger, Nadia ;Piessens, FrankSunar, BerkProceedings paper2020, 29th USENIX Security Symposium, AUG 12-14, 2020, p.469-486Publication CopyCat: Controlled instruction-level attacks one enclaves for maximal key extraction
;Moghimi, Daniel ;Van Bulck, Jo ;Heninger, Nadia ;Piessens, FrankSunar, BerkJournal article2020, CoRR Abstracts, 1, p.2002.08437Publication Fallout: Reading Kernel writes from user space
;Minkin, M. ;Moghimi, D. ;Lipp, Moritz ;Schwarz, M. ;Van Bulck, Jo ;Genkin, D.Gruss, D.Journal article2019-05, CoRR, p.12701Publication Faulty Point Unit: ABI Poisoning Attacks on Intel SGX
;Alder, Fritz ;Van Bulck, Jo ;Oswald, DavidPiessens, FrankProceedings paper2020, 36th Annual Computer Security Applications Virtual Conference (ACSAC), DEC 07-11, 2020, p.415-427Publication Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution
;Van Bulck, Jo ;Minkin, Marina ;Weisse, Ofir ;Genkin, Daniel ;Kasikci, DanielPiessens, FrankProceedings paper2018, 27th USENIX Security Symposium, 15/08/2018, p.991-1008Publication LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
;Van Bulck, Jo ;Moghimi, Daniel ;Schwarz, Michael ;Lipp, Moritz ;Minkin, MarinaGenkin, DanielProceedings paper2020, 41st IEEE Symposium on Security and Privacy (SP), MAY 18-21, 2020, p.54-72Publication MicroProfiler: Principled Side-Channel Mitigation through Microarchitectural Profiling
;Bognar, Marton ;Winderix, Hans ;Van Bulck, JoPiessens, FrankProceedings paper2023, 8th IEEE European Symposium on Security and Privacy (EuroS and P), JUL 03-07, 2023, p.651-670Publication Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures
;Bognar, Marton ;Van Bulck, JoPiessens, FrankProceedings paper2022, 43rd IEEE Symposium on Security and Privacy (SP), MAY 23-26, 2022, p.1638-1655Publication Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic
;Van Bulck, Jo ;Piessens, FrankStrackx, RaoulProceedings paper2018, CCS '18 Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 15/10/2018, p.178-195Publication Off-limits: Abusing legacy x86 memory segmentation to Spy on enclaved execution
;Gyselinck, Jago ;Van Bulck, Jo ;Piessens, FrankStrackx, RaoulProceedings paper2018, ESSoS 2018 : International Symposium on Engineering Secure Software and Systems, 26/06/2018, p.44-60Publication Plundervolt: Software-based Fault Injection Attacks against Intel SGX
;Murdock, Kit ;Oswald, David ;Garcia, Flavio D. ;Van Bulck, Jo ;Gruss, DanielPiessens, FrankProceedings paper2020, 41st IEEE Symposium on Security and Privacy (SP), MAY 18-21, 2020, p.1466-1482Publication Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors
;Busi, Matteo ;Noorman, Job ;Van Bulck, Jo ;Galletta, LetterioDegano, PierpaoloProceedings paper2020, 33rd IEEE Computer Security Foundations Symposium (CSF), JUN 22-25, 2020, p.262-276Publication Reflections on post-Meltdown trusted computing: A case for open security processors
;Mühlberg, Jan TobiasVan Bulck, JoJournal article2018, ;login: The USENIX magazine, (43) 3, p.1-4Publication Robust authentication for automotive control networks through covert channels
;Vanderhallen, Stien ;Van Bulck, Jo ;Piessens, FrankMuhlberg, Jan TobiasJournal article2021, COMPUTER NETWORKS, 193, p.108079Publication Sancus 2.0: A low-cost security architecture for IoT devices
Journal article2017, ACM Transactions on Privacy and Security - TOPS, (20) 3, p.Art. 7Publication Securing Interruptible Enclaved Execution on Small Microprocessors
;Busi, Matteo ;Noorman, Job ;Van Bulck, Jo ;Galletta, LetterioDegano, PierpaoloJournal article2021, ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, (43) 3, p.Art. 12