Follow
Anil Kurmus
Anil Kurmus
IBM Research Europe - Zurich
Verified email at zurich.ibm.com - Homepage
Title
Cited by
Cited by
Year
AsyncShock: Exploiting synchronisation bugs in Intel SGX enclaves
N Weichbrodt, A Kurmus, P Pietzuch, R Kapitza
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
2722016
Smotherspectre: exploiting speculative execution through port contention
A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
2712019
Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring.
A Kurmus, R Tartler, D Dorneanu, B Heinloth, V Rothberg, A Ruprecht, ...
NDSS, 2013
1222013
Implementation and implications of a stealth hard-drive backdoor
J Zaddach, A Kurmus, D Balzarotti, EO Blass, A Francillon, T Goodspeed, ...
Proceedings of the 29th annual computer security applications conference …, 2013
1132013
Secure isolation of tenant resources in a multi-tenant storage system using a security gateway
ME Factor, D Hadas, EK Kolodner, A Kurmus, A Shulman-Peleg, ...
US Patent 9,411,973, 2016
1062016
Attack surface reduction for commodity OS kernels: trimmed garden plants may attract less bugs
A Kurmus, A Sorniotti, R Kapitza
Proceedings of the Fourth European Workshop on System Security, 6, 2011
582011
Secure logical isolation for multi-tenancy in cloud storage
M Factor, D Hadas, A Harnama, N Har'El, EK Kolodner, A Kurmus, ...
2013 IEEE 29th Symposium on Mass Storage Systems and Technologies (MSST), 1-5, 2013
532013
A Comparison of Secure Multi-tenancy Architectures for Filesystem Storage Clouds
A Kurmus, M Gupta, R Pletka, C Cachin, R Haas
Proceedings of the 12th International Middleware Conference, 2011
462011
Speculator: a tool to analyze speculative execution attacks and mitigations
A Mambretti, M Neugschwandtner, A Sorniotti, E Kirda, W Robertson, ...
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
432019
Secure isolation of tenant resources in a multi-tenant storage system using a gatekeeper
ME Factor, D Hadas, EK Kolodner, A Kurmus, A Shulman-Peleg, ...
US Patent App. 13/875,300, 2014
422014
Design and implementation of a key-lifecycle management system
M Björkqvist, C Cachin, R Haas, XY Hu, A Kurmus, R Pawlitzek, M Vukolić
Financial Cryptography and Data Security, 160-174, 2010
392010
Secure cloud maintenance: protecting workloads against insider attacks
S Bleikertz, A Kurmus, ZA Nagy, M Schunter
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
382012
Quantifiable Run-time Kernel Attack Surface Reduction
A Kurmus, S Dechand, R Kapitza
DIMVA'14, 2014
372014
A tale of two kernels: Towards ending kernel hardening wars with split kernel
A Kurmus, R Zippel
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
352014
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks
A Kurmus, N Ioannou, M Neugschwandtner, N Papandreou, T Parnell
11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017
332017
Automatic {OS} Kernel {TCB} Reduction by Leveraging {Compile-Time} Configurability
R Tartler, A Kurmus, B Heinloth, V Rothberg, A Ruprecht, D Dorneanu, ...
Eighth Workshop on Hot Topics in System Dependability (HotDep 12), 2012
332012
The {Huge }-Family of Protocols for RFID-Privacy and Authentication
EO Blass, A Kurmus, R Molva, G Noubir, A Shikfa
Dependable and Secure Computing, IEEE Transactions on, 1-1, 2011
312011
Bypassing memory safety mechanisms through speculative control flow hijacks
A Mambretti, A Sandulescu, A Sorniotti, W Robertson, E Kirda, A Kurmus
2021 IEEE European Symposium on Security and Privacy (EuroS&P), 633-649, 2021
282021
Secure isolation of tenant resources in a multi-tenant storage systemwith inter-server communication
ME Factor, D Hadas, EK Kolodner, A Kurmus, A Shulman-Peleg, ...
US Patent App. 13/875,303, 2014
282014
PSP: private and secure payment with RFID
EO Blass, A Kurmus, R Molva, T Strufe
Proceedings of the 8th ACM workshop on Privacy in the electronic society, 51-60, 2009
232009
The system can't perform the operation now. Try again later.
Articles 1–20