Onur Aciicmez
Onur Aciicmez
Samsung Research America
Bestätigte E-Mail-Adresse bei samsung.com
Titel
Zitiert von
Zitiert von
Jahr
Detecting unauthorized use of computing devices based on behavioral patterns
L Xie, X Zhang, JP Seifert, O Aciicmez, A Latifi
US Patent 8,595,834, 2013
3732013
Predicting secret keys via branch prediction
O Acıiçmez, ÇK Koç, JP Seifert
Cryptographers’ Track at the RSA Conference, 225-242, 2007
3412007
On the power of simple branch prediction analysis
O Aciiçmez, ÇK Koç, JP Seifert
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
3072007
Yet another microarchitectural attack: exploiting I-cache
O Aciiçmez
Proceedings of the 2007 ACM workshop on Computer security architecture, 11-18, 2007
2762007
New results on instruction cache attacks
O Acıiçmez, BB Brumley, P Grabher
International Workshop on Cryptographic Hardware and Embedded Systems, 110-124, 2010
2172010
Cache based remote timing attack on the AES
O Acıiçmez, W Schindler, ÇK Koç
Cryptographers’ track at the RSA conference, 271-286, 2007
2092007
Trace-driven cache attacks on AES (short paper)
O Acıiçmez, ÇK Koç
International Conference on Information and Communications Security, 112-121, 2006
2042006
Hardware-software integrated approaches to defend against software cache-based side channel attacks
J Kong, O Aciiçmez, JP Seifert, H Zhou
2009 IEEE 15th international symposium on high performance computer …, 2009
1252009
A vulnerability in RSA implementations due to instruction cache analysis and its demonstration on OpenSSL
O Acıiçmez, W Schindler
Cryptographers’ Track at the RSA Conference, 256-273, 2008
1252008
New branch prediction vulnerabilities in OpenSSL and necessary software countermeasures
O Acıiçmez, S Gueron, JP Seifert
IMA International Conference on Cryptography and Coding, 185-203, 2007
1132007
Deconstructing new cache designs for thwarting software cache-based side channel attacks
J Kong, O Aciicmez, JP Seifert, H Zhou
Proceedings of the 2nd ACM workshop on Computer security architectures, 25-34, 2008
1072008
Cheap hardware parallelism implies cheap security
O Aciicmez, JP Seifert
Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007), 80-91, 2007
1022007
Securing stored content for trusted hosts and safe computing environments
X Zhang, O Aciicmez, JP Seifert, MA Qingwei
US Patent 8,782,801, 2014
982014
A trusted mobile phone reference architecturevia secure kernel
X Zhang, O Acıiçmez, JP Seifert
Proceedings of the 2007 ACM workshop on Scalable trusted computing, 7-14, 2007
812007
Improving Brumley and Boneh timing attack on unprotected SSL implementations
O Aciicmez, W Schindler, CK Koç
Proceedings of the 12th ACM conference on Computer and communications …, 2005
792005
Execution allocation cost assessment for computing systems and environments including elastic computing systems and environments
X Zhang, O Aciicmez, SJ Gibbs, A Kunjithapatham, S Jeong, D Cheng
US Patent 8,239,538, 2012
732012
An analytical model for time-driven cache attacks
K Tiri, O Acıiçmez, M Neve, F Andersen
International Workshop on Fast Software Encryption, 399-413, 2007
692007
Safe and efficient access control mechanisms for computing environments
X Zhang, JP Seifert, O Aciicmez, A Latifi
US Patent 8,510,805, 2013
642013
Authentication, identity, and service management for computing and communication systems
X Zhang, JP Seifert, O Aciicmez
US Patent 8,201,232, 2012
642012
Web application script migration
M Sheshagiri, SS Kalasapur, O Aciicmez, Y Song, D Cheng
US Patent 8,595,284, 2013
632013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20