Repository logo Institutional repository
  • Communities & Collections
  • Browse
  • Site
Search repository
High contrast
  1. Home
  2. Browse by Author

Browsing by Author "Van Bulck, Jo"

Filter results by typing the first few letters
Now showing 1 - 20 of 24
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    Publication

    About Time: On the Challenges of Temporal Guarantees in Untrusted Environments

    Alder, Fritz
    ;
    Scopelliti, Gianluca
    ;
    Van Bulck, Jo
    ;
    Muhlberg, Jan Tobias
    Proceedings paper
    2023, 6th Workshop on System Software for Trusted Execution (SysTEX) Part of EuroSys Conference, MAY 08, 2023, p.27-33
  • Loading...
    Thumbnail Image
    Publication

    AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves

    Constable, Scott
    ;
    Van Bulck, Jo
    ;
    Cheng, Xiang
    ;
    Xiao, Yuan
    ;
    Xing, Cedric
    ;
    Alexandrovich, Ilya
    Proceedings paper
    2023, 32nd USENIX Security Symposium, AUG 09-11, 2023, p.4051-4068
  • Loading...
    Thumbnail Image
    Publication

    AION: Enabling Open Systems through Strong Availability Guarantees for Enclaves

    Alder, Fritz
    ;
    Van Bulck, Jo
    ;
    Piessens, Frank
    ;
    Muhlberg, Jan Tobias
    Proceedings paper
    2021, ACM SIGSAC Conference on Computer and Communications Security (ACM CCS), NOV 15-19, 2021, p.1357-1372
  • Loading...
    Thumbnail Image
    Publication

    Breaking virtual memory protection and the SGX ecosystem with foreshadow

    Van Bulck, Jo
    ;
    Minkin, Marina
    ;
    Weisse, Ofir
    ;
    Genkin, Daniel
    ;
    Kasikci, Baris
    ;
    Piessens, Frank
    Journal article
    2019, IEEE Micro, (39) 3, p.66-74
  • Loading...
    Thumbnail Image
    Publication

    COPYCAT: Controlled Instruction-Level Attacks on Enclaves

    Moghimi, Daniel
    ;
    Van Bulck, Jo
    ;
    Heninger, Nadia
    ;
    Piessens, Frank
    ;
    Sunar, Berk
    Proceedings paper
    2020, 29th USENIX Security Symposium, AUG 12-14, 2020, p.469-486
  • Loading...
    Thumbnail Image
    Publication

    CopyCat: Controlled instruction-level attacks one enclaves for maximal key extraction

    Moghimi, Daniel
    ;
    Van Bulck, Jo
    ;
    Heninger, Nadia
    ;
    Piessens, Frank
    ;
    Sunar, Berk
    Journal article
    2020, CoRR Abstracts, 1, p.2002.08437
  • Loading...
    Thumbnail Image
    Publication

    Fallout: Reading Kernel writes from user space

    Minkin, M.
    ;
    Moghimi, D.
    ;
    Lipp, Moritz
    ;
    Schwarz, M.
    ;
    Van Bulck, Jo
    ;
    Genkin, D.
    ;
    Gruss, D.
    Journal article
    2019-05, CoRR, p.12701
  • Loading...
    Thumbnail Image
    Publication

    Faulty Point Unit: ABI Poisoning Attacks on Intel SGX

    Alder, Fritz
    ;
    Van Bulck, Jo
    ;
    Oswald, David
    ;
    Piessens, Frank
    Proceedings paper
    2020, 36th Annual Computer Security Applications Virtual Conference (ACSAC), DEC 07-11, 2020, p.415-427
  • Loading...
    Thumbnail Image
    Publication

    Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution

    Van Bulck, Jo
    ;
    Minkin, Marina
    ;
    Weisse, Ofir
    ;
    Genkin, Daniel
    ;
    Kasikci, Daniel
    ;
    Piessens, Frank
    Proceedings paper
    2018, 27th USENIX Security Symposium, 15/08/2018, p.991-1008
  • Loading...
    Thumbnail Image
    Publication

    LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection

    Van Bulck, Jo
    ;
    Moghimi, Daniel
    ;
    Schwarz, Michael
    ;
    Lipp, Moritz
    ;
    Minkin, Marina
    ;
    Genkin, Daniel
    Proceedings paper
    2020, 41st IEEE Symposium on Security and Privacy (SP), MAY 18-21, 2020, p.54-72
  • Loading...
    Thumbnail Image
    Publication

    MicroProfiler: Principled Side-Channel Mitigation through Microarchitectural Profiling

    Bognar, Marton
    ;
    Winderix, Hans
    ;
    Van Bulck, Jo
    ;
    Piessens, Frank
    Proceedings paper
    2023, 8th IEEE European Symposium on Security and Privacy (EuroS and P), JUL 03-07, 2023, p.651-670
  • Loading...
    Thumbnail Image
    Publication

    Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures

    Bognar, Marton
    ;
    Van Bulck, Jo
    ;
    Piessens, Frank
    Proceedings paper
    2022, 43rd IEEE Symposium on Security and Privacy (SP), MAY 23-26, 2022, p.1638-1655
  • Loading...
    Thumbnail Image
    Publication

    Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic

    Van Bulck, Jo
    ;
    Piessens, Frank
    ;
    Strackx, Raoul
    Proceedings paper
    2018, CCS '18 Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 15/10/2018, p.178-195
  • Loading...
    Thumbnail Image
    Publication

    Off-limits: Abusing legacy x86 memory segmentation to Spy on enclaved execution

    Gyselinck, Jago
    ;
    Van Bulck, Jo
    ;
    Piessens, Frank
    ;
    Strackx, Raoul
    Proceedings paper
    2018, ESSoS 2018 : International Symposium on Engineering Secure Software and Systems, 26/06/2018, p.44-60
  • Loading...
    Thumbnail Image
    Publication

    Plundervolt: Software-based Fault Injection Attacks against Intel SGX

    Murdock, Kit
    ;
    Oswald, David
    ;
    Garcia, Flavio D.
    ;
    Van Bulck, Jo
    ;
    Gruss, Daniel
    ;
    Piessens, Frank
    Proceedings paper
    2020, 41st IEEE Symposium on Security and Privacy (SP), MAY 18-21, 2020, p.1466-1482
  • Loading...
    Thumbnail Image
    Publication

    Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors

    Busi, Matteo
    ;
    Noorman, Job
    ;
    Van Bulck, Jo
    ;
    Galletta, Letterio
    ;
    Degano, Pierpaolo
    Proceedings paper
    2020, 33rd IEEE Computer Security Foundations Symposium (CSF), JUN 22-25, 2020, p.262-276
  • Loading...
    Thumbnail Image
    Publication

    Reflections on post-Meltdown trusted computing: A case for open security processors

    Mühlberg, Jan Tobias
    ;
    Van Bulck, Jo
    Journal article
    2018, ;login: The USENIX magazine, (43) 3, p.1-4
  • Loading...
    Thumbnail Image
    Publication

    Robust authentication for automotive control networks through covert channels

    Vanderhallen, Stien
    ;
    Van Bulck, Jo
    ;
    Piessens, Frank
    ;
    Muhlberg, Jan Tobias
    Journal article
    2021, COMPUTER NETWORKS, 193, p.108079
  • Loading...
    Thumbnail Image
    Publication

    Sancus 2.0: A low-cost security architecture for IoT devices

    Noorman, Job
    ;
    Van Bulck, Jo
    ;
    Mühlberg, Jan Tobias
    ;
    Piessens, Frank
    ;
    Maene, Pieter
    ;
    Preneel, Bart  
    Journal article
    2017, ACM Transactions on Privacy and Security - TOPS, (20) 3, p.Art. 7
  • Loading...
    Thumbnail Image
    Publication

    Securing Interruptible Enclaved Execution on Small Microprocessors

    Busi, Matteo
    ;
    Noorman, Job
    ;
    Van Bulck, Jo
    ;
    Galletta, Letterio
    ;
    Degano, Pierpaolo
    Journal article
    2021, ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, (43) 3, p.Art. 12
  • «
  • 1 (current)
  • 2
  • »

Follow imec on

VimeoLinkedInFacebook

The repository

  • Contact us
  • Policy
  • About imec
Privacy statement | Cookie settings