Follow
Jo Van Bulck
Jo Van Bulck
imec-DistriNet, KU Leuven
Verified email at cs.kuleuven.be - Homepage
Title
Cited by
Cited by
Year
Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution
J Van Bulck, M Minkin, O Weisse, D Genkin, B Kasikci, F Piessens, ...
Proceedings of the 27th USENIX Security Symposium. USENIX Association, 2018
13692018
ZombieLoad: Cross-privilege-boundary data sampling
M Schwarz, M Lipp, D Moghimi, J Van Bulck, J Stecklina, T Prescher, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
5362019
A systematic evaluation of transient execution attacks and defenses
C Canella, J Van Bulck, M Schwarz, M Lipp, B Von Berg, P Ortner, ...
28th USENIX Security Symposium (USENIX Security 19), 249-266, 2019
5212019
Plundervolt: Software-based fault injection attacks against Intel SGX
K Murdock, D Oswald, FD Garcia, J Van Bulck, D Gruss, F Piessens
2020 IEEE Symposium on Security and Privacy (SP), 1466-1482, 2020
4062020
Fallout: Leaking data on Meltdown-resistant CPUs
C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
401*2019
Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution
J Van Bulck, N Weichbrodt, R Kapitza, F Piessens, R Strackx
26th USENIX Security Symposium (USENIX Security 17), 1041-1056, 2017
3482017
LVI: Hijacking transient execution through microarchitectural load value injection
J Van Bulck, D Moghimi, M Schwarz, M Lippi, M Minkin, D Genkin, ...
2020 IEEE Symposium on Security and Privacy (SP), 54-72, 2020
3242020
SGX-Step: A practical attack framework for precise enclave execution control
J Van Bulck, F Piessens, R Strackx
Proceedings of the 2nd Workshop on System Software for Trusted Execution, 1-6, 2017
2652017
Foreshadow-NG: Breaking the virtual memory abstraction with transient out-of-order execution
O Weisse, J Van Bulck, M Minkin, D Genkin, B Kasikci, F Piessens, ...
Technical report, 2018 (https://foreshadowattack.eu), 2018
2502018
Sancus 2.0: A Low-Cost Security Architecture for IoT Devices
J Noorman, J Van Bulck, JT Mühlberg, F Piessens, P Maene, B Preneel, ...
ACM Transactions on Privacy and Security (TOPS) 20 (3), 7:1 - 7:33, 2017
1722017
Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic
J Van Bulck, F Piessens, R Strackx
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1672018
A tale of two worlds: Assessing the vulnerability of enclave shielding runtimes
J Van Bulck, D Oswald, E Marin, A Aldoseri, FD Garcia, F Piessens
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1632019
VulCAN: Efficient component authentication and software isolation for automotive control networks
J Van Bulck, JT Mühlberg, F Piessens
Proceedings of the 33rd Annual Computer Security Applications Conference …, 2017
872017
CopyCat: Controlled Instruction-Level Attacks on Enclaves
D Moghimi, J Van Bulck, N Heninger, F Piessens, B Sunar
29th USENIX Security Symposium (USENIX Security 20), 469-486, 2020
782020
Off-limits: Abusing legacy x86 memory segmentation to spy on enclaved execution
J Gyselinck, J Van Bulck, F Piessens, R Strackx
Engineering Secure Software and Systems: 10th International Symposium, ESSoS …, 2018
402018
Provably secure isolation for interruptible enclaved execution on small microprocessors
M Busi, J Noorman, J Van Bulck, L Galletta, P Degano, JT Mühlberg, ...
2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 262-276, 2020
352020
AEX-Notify: Thwarting Precise Single-Stepping Attacks through Interrupt Awareness for Intel SGX Enclaves
S Constable, J Van Bulck, X Cheng, Y Xiao, C Xing, I Alexandrovich, ...
32nd USENIX Security Symposium (USENIX Security 23), 4051-4068, 2023
262023
An implementation of a high assurance smart meter using protected module architectures
JT Mühlberg, S Cleemput, MA Mustafa, J Van Bulck, B Preneel, ...
Information Security Theory and Practice: 10th IFIP WG 11.2 International …, 2016
252016
Plundervolt: How a little bit of undervolting can create a lot of trouble
K Murdock, D Oswald, FD Garcia, J Van Bulck, F Piessens, D Gruss
IEEE Security & Privacy 18 (5), 28-37, 2020
222020
Mind the gap: Studying the insecurity of provably secure embedded trusted execution architectures
M Bognar, J Van Bulck, F Piessens
2022 IEEE Symposium on Security and Privacy (SP), 1638-1655, 2022
202022
The system can't perform the operation now. Try again later.
Articles 1–20