RAMBleed: Reading Bits in Memory Without Accessing Them A Kwong, D Genkin, D Gruss, Y Yarom 41st IEEE Symposium on Security and Privacy (S&P), 2020 | 223 | 2020 |
CacheOut: Leaking data on Intel CPUs via cache evictions S van Schaik, M Minkin, A Kwong, D Genkin, Y Yarom 42nd IEEE Symposium on Security and Privacy (S&P), 2021 | 170 | 2021 |
SGAxe: How SGX fails in practice S Van Schaik, A Kwong, D Genkin, Y Yarom 2020. https://sgaxe. com/files/SGAxe. pdf, 2020 | 120* | 2020 |
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone A Kwong, W Xu, K Fu 40th IEEE Symposium on Security and Privacy (S&P), 2019 | 63 | 2019 |
SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks Y Tobah, A Kwong, I Kang, D Genkin, KG Shin 43rd IEEE Symposium on Security and Privacy (S&P), 2022 | 57 | 2022 |
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu 39th IEEE Symposium on Security and Privacy (S&P), 2018 | 51 | 2018 |
Pseudorandom Black Swans: Cache Attacks on CTR DRBG S Cohney, A Kwong, S Paz, D Genkin, N Heninger, E Ronen, Y Yarom 41st IEEE Symposium on Security and Privacy (S&P), 2020 | 48 | 2020 |
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer M Fahr Jr, H Kippen, A Kwong, T Dang, J Lichtinger, D Dachman-Soled, ... 29th ACM Conference on Computer and Communications Security (CCS), 2022 | 39 | 2022 |
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism I Kang, W Wang, J Kim, S van Schaik, Y Tobah, D Genkin, A Kwong, ... USENIX Security Symposium (USENIX Security), 2024 | 3 | 2024 |
Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage Y Tobah, A Kwong, I Kang, D Genkin, KG Shin USENIX Security Symposium (USENIX Security), 2024 | 2 | 2024 |
Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor H Yavarzadeh, A Agarwal, M Christman, C Garman, D Genkin, A Kwong, ... 29th ACM International Conference on Architectural Support for Programming …, 2024 | 1 | 2024 |
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detection Protocol A Kwong, W Wang, J Kim, J Berger, D Genkin, E Ronen, H Shacham, ... USENIX Security Symposium (USENIX Security), 2023 | 1 | 2023 |
Why Do You Trust Sensors? Analog Cybersecurity Attack Demos A Kwong, C Bolton, T Trippel, W Xu, K Fu | 1 | 2017 |
Applying Software-Based Side-Channels to Hardware Vulnerabilities A Kwong | | 2023 |
Poster: Blue Note-How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu | | |