Follow
Andrew Kwong
Andrew Kwong
Verified email at cs.unc.edu - Homepage
Title
Cited by
Cited by
Year
RAMBleed: Reading Bits in Memory Without Accessing Them
A Kwong, D Genkin, D Gruss, Y Yarom
41st IEEE Symposium on Security and Privacy (S&P), 2020
2232020
CacheOut: Leaking data on Intel CPUs via cache evictions
S van Schaik, M Minkin, A Kwong, D Genkin, Y Yarom
42nd IEEE Symposium on Security and Privacy (S&P), 2021
1702021
SGAxe: How SGX fails in practice
S Van Schaik, A Kwong, D Genkin, Y Yarom
2020. https://sgaxe. com/files/SGAxe. pdf, 2020
120*2020
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone
A Kwong, W Xu, K Fu
40th IEEE Symposium on Security and Privacy (S&P), 2019
632019
SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks
Y Tobah, A Kwong, I Kang, D Genkin, KG Shin
43rd IEEE Symposium on Security and Privacy (S&P), 2022
572022
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems
C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu
39th IEEE Symposium on Security and Privacy (S&P), 2018
512018
Pseudorandom Black Swans: Cache Attacks on CTR DRBG
S Cohney, A Kwong, S Paz, D Genkin, N Heninger, E Ronen, Y Yarom
41st IEEE Symposium on Security and Privacy (S&P), 2020
482020
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer
M Fahr Jr, H Kippen, A Kwong, T Dang, J Lichtinger, D Dachman-Soled, ...
29th ACM Conference on Computer and Communications Security (CCS), 2022
392022
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism
I Kang, W Wang, J Kim, S van Schaik, Y Tobah, D Genkin, A Kwong, ...
USENIX Security Symposium (USENIX Security), 2024
32024
Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage
Y Tobah, A Kwong, I Kang, D Genkin, KG Shin
USENIX Security Symposium (USENIX Security), 2024
22024
Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor
H Yavarzadeh, A Agarwal, M Christman, C Garman, D Genkin, A Kwong, ...
29th ACM International Conference on Architectural Support for Programming …, 2024
12024
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detection Protocol
A Kwong, W Wang, J Kim, J Berger, D Genkin, E Ronen, H Shacham, ...
USENIX Security Symposium (USENIX Security), 2023
12023
Why Do You Trust Sensors? Analog Cybersecurity Attack Demos
A Kwong, C Bolton, T Trippel, W Xu, K Fu
12017
Applying Software-Based Side-Channels to Hardware Vulnerabilities
A Kwong
2023
Poster: Blue Note-How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems
C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu
The system can't perform the operation now. Try again later.
Articles 1–15