Name
Affiliation
Papers
YUVAL YAROM
The University of Adelaide, Adelaide, Australia
54
Collaborators
Citations 
PageRank 
141
775
35.54
Referers 
Referees 
References 
1354
1165
886
Search Limit
1001000
Title
Citations
PageRank
Year
Breaking and Fixing Speculative Load Hardening.00.342022
Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution00.342022
Side-Channeling the Kalyna Key Expansion00.342022
RSA Key Recovery from Digit Equivalence Information00.342022
Opportunities for genetic improvement of cryptographic code.00.342022
HammerScope: Observing DRAM Power Consumption Using Rowhammer00.342022
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses00.342021
Rosita++: Automatic Higher-Order Leakage Elimination from Cryptographic Code00.342021
RSA Key Recovery from Digit Equivalence Information.00.342021
Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms00.342021
Whack-a-Meltdown: Microarchitectural Security Games [Systems Attacks and Defenses]10.352021
CacheOut: Leaking Data on Intel CPUs via Cache Evictions20.382021
Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality00.342021
Spectre attacks: exploiting speculative execution10.342020
RAMBleed: Reading Bits in Memory Without Accessing Them110.482020
Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung.00.342020
LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage40.472020
Meltdown: reading kernel memory from user space130.582020
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection80.532020
Security Architecture Framework for Enterprises.00.342020
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG20.362020
PThammer: Cross-User-Kernel-Boundary Rowhammer through Implicit Accesses20.362020
A Queueing Solution to Reduce Delay in Processing of Disclosed Vulnerabilities00.342020
Breaking Virtual Memory Protection and the SGX Ecosystem with Foreshadow.30.382019
Fallout: Reading Kernel Writes From User Space.00.342019
Fallout: Leaking Data on Meltdown-resistant CPUs170.652019
Rosita: Towards Automatic Elimination Of Power-Analysis Leakage In Ciphers10.362019
Another Flip in the Wall of Rowhammer Defenses300.872018
Robust Website Fingerprinting Through The Cache Occupancy Channel20.362018
Time Protection: the Missing OS Abstraction.50.412018
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks.10.342018
The Effect of Common Vulnerability Scoring System Metrics on Vulnerability Exploit Delay20.372018
Drive-by Key-Extraction Cache Attacks from Portable Code.10.342018
A Survey of Microarchitectural Timing Attacks and Countermeasures on Contemporary Hardware.451.242018
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations10.352018
To BLISS-B or not to be - Attacking strongSwan's Implementation of Post-Quantum Signatures.60.412017
CacheBleed: a timing attack on OpenSSL constant-time RSA.411.082017
Usb Snooping Made Easy: Crosstalk Leakage Attacks On Usb Hubs10.352017
Modifying an Enciphering Scheme after Deployment.20.382017
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519.120.732017
Sliding Right Into Disaster: Left-To-Right Sliding Windows Leak40.412017
Amplifying Side Channels Through Performance Degradation.120.582016
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels.340.942016
Do Hardware Cache Flushing Operations Actually Meet Our Expectations?00.342016
"Make Sure DSA Signing Exponentiations Really are Constant-Time".190.682016
Last-Level Cache Side-Channel Attacks are Practical2235.342015
Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs.00.342015
Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher.10.352015
Mapping the Intel Last-Level Cache.140.802015
\"Ooh Aah... Just a Little Bit\": A Small Amount of Side Channel Can Go a Long Way571.692014
  • 1
  • 2