Search Results for author: Yuval Yarom

Found 6 papers, 3 papers with code

CNN architecture extraction on edge GPU

no code implementations24 Jan 2024 Peter Horvath, Lukasz Chmielewski, Leo Weissbart, Lejla Batina, Yuval Yarom

The results of the analysis show that neural network architectures are easily distinguishable using deep learning-based side-channel analysis.

Image Classification Side Channel Analysis +2

CryptOpt: Automatic Optimization of Straightline Code

1 code implementation31 May 2023 Joel Kuepper, Andres Erbsen, Jason Gross, Owen Conoly, Chuyue Sun, Samuel Tian, David Wu, Adam Chlipala, Chitchanok Chuengsatiansup, Daniel Genkin, Markus Wagner, Yuval Yarom

Manual engineering of high-performance implementations typically consumes many resources and requires in-depth knowledge of the hardware.

CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives (full version)

1 code implementation19 Nov 2022 Joel Kuepper, Andres Erbsen, Jason Gross, Owen Conoly, Chuyue Sun, Samuel Tian, David Wu, Adam Chlipala, Chitchanok Chuengsatiansup, Daniel Genkin, Markus Wagner, Yuval Yarom

Most software domains rely on compilers to translate high-level code to multiple different machine languages, with performance not too much worse than what developers would have the patience to write directly in assembly language.

Benchmarking C++ code

Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses

no code implementations8 Mar 2021 Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom

To assess the effectiveness of this approach, in this work we seek to identify those JavaScript features which are essential for carrying out a cache-based attack.

Website Fingerprinting Attacks Cryptography and Security

Robust Website Fingerprinting Through the Cache Occupancy Channel

no code implementations17 Nov 2018 Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom

In this work we investigate these attacks under a different attack model, in which the adversary is capable of running a small amount of unprivileged code on the target user's computer.

Website Fingerprinting Attacks

Meltdown

2 code implementations3 Jan 2018 Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg

The security of computer systems fundamentally relies on memory isolation, e. g., kernel address ranges are marked as non-accessible and are protected from user access.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.