Browsing by author "Van Bulck, Jo"
Now showing items 1-20 of 24
-
About Time: On the Challenges of Temporal Guarantees in Untrusted Environments
Alder, Fritz; Scopelliti, Gianluca; Van Bulck, Jo; Muhlberg, Jan Tobias (2023) -
AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves
Constable, Scott; Van Bulck, Jo; Cheng, Xiang; Xiao, Yuan; Xing, Cedric; Alexandrovich, Ilya; Kim, Taesoo; Piessens, Frank; Vij, Mona; Silberstein, Mark (2023) -
AION: Enabling Open Systems through Strong Availability Guarantees for Enclaves
Alder, Fritz; Van Bulck, Jo; Piessens, Frank; Muhlberg, Jan Tobias (2021) -
Breaking virtual memory protection and the SGX ecosystem with foreshadow
Van Bulck, Jo; Minkin, Marina; Weisse, Ofir; Genkin, Daniel; Kasikci, Baris; Piessens, Frank; Silberstein, Mark; Wenisch, Thomas; Yarom, Yuval; Strackx, Raoul (2019) -
COPYCAT: Controlled Instruction-Level Attacks on Enclaves
Moghimi, Daniel; Van Bulck, Jo; Heninger, Nadia; Piessens, Frank; Sunar, Berk (2020) -
CopyCat: Controlled instruction-level attacks one enclaves for maximal key extraction
Moghimi, Daniel; Van Bulck, Jo; Heninger, Nadia; Piessens, Frank; Sunar, Berk (2020) -
Fallout: Reading Kernel writes from user space
Minkin, M.; Moghimi, D.; Lipp, Moritz; Schwarz, M.; Van Bulck, Jo; Genkin, D.; Gruss, D.; Piessens, Frank; Sunar, B.; Yarom, Y. (2019-05) -
Faulty Point Unit: ABI Poisoning Attacks on Intel SGX
Alder, Fritz; Van Bulck, Jo; Oswald, David; Piessens, Frank (2020) -
Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution
Van Bulck, Jo; Minkin, Marina; Weisse, Ofir; Genkin, Daniel; Kasikci, Daniel; Piessens, Frank; Silberstein, Mark; F. Wenisch, Thomas; Yarom, Yuval; Strackx, Raoul (2018) -
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
Van Bulck, Jo; Moghimi, Daniel; Schwarz, Michael; Lipp, Moritz; Minkin, Marina; Genkin, Daniel; Yarom, Yuval; Sunar, Berk; Gruss, Daniel; Piessens, Frank (2020) -
MicroProfiler: Principled Side-Channel Mitigation through Microarchitectural Profiling
Bognar, Marton; Winderix, Hans; Van Bulck, Jo; Piessens, Frank (2023) -
Mind the Gap: Studying the Insecurity of Provably Secure Embedded Trusted Execution Architectures
Bognar, Marton; Van Bulck, Jo; Piessens, Frank (2022) -
Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic
Van Bulck, Jo; Piessens, Frank; Strackx, Raoul (2018) -
Off-limits: Abusing legacy x86 memory segmentation to Spy on enclaved execution
Gyselinck, Jago; Van Bulck, Jo; Piessens, Frank; Strackx, Raoul (2018) -
Plundervolt: Software-based Fault Injection Attacks against Intel SGX
Murdock, Kit; Oswald, David; Garcia, Flavio D.; Van Bulck, Jo; Gruss, Daniel; Piessens, Frank (2020) -
Provably Secure Isolation for Interruptible Enclaved Execution on Small Microprocessors
Busi, Matteo; Noorman, Job; Van Bulck, Jo; Galletta, Letterio; Degano, Pierpaolo; Muhlberg, Jan Tobias; Piessens, Frank (2020) -
Reflections on post-Meltdown trusted computing: A case for open security processors
Mühlberg, Jan Tobias; Van Bulck, Jo (2018) -
Robust authentication for automotive control networks through covert channels
Vanderhallen, Stien; Van Bulck, Jo; Piessens, Frank; Muhlberg, Jan Tobias (2021) -
Sancus 2.0: A low-cost security architecture for IoT devices
Noorman, Job; Van Bulck, Jo; Mühlberg, Jan Tobias; Piessens, Frank; Maene, Pieter; Preneel, Bart; Verbauwhede, Ingrid; Götzfried, Johannes; Müller, Tilo; Freiling, Felix (2017) -
Securing Interruptible Enclaved Execution on Small Microprocessors
Busi, Matteo; Noorman, Job; Van Bulck, Jo; Galletta, Letterio; Degano, Pierpaolo; Muhlberg, Jan Tobias; Piessens, Frank (2021)