Boris Köpf
Boris Köpf
Microsoft Research
Bestätigte E-Mail-Adresse bei - Startseite
Zitiert von
Zitiert von
An information-theoretic model for adaptive side-channel attacks
B Köpf, D Basin
Proceedings of the 14th ACM conference on Computer and communications …, 2007
Automatic discovery and quantification of information leaks
M Backes, B Köpf, A Rybalchenko
30th IEEE Symposium on Security and Privacy, 141-153, 2009
Cacheaudit: A tool for the static analysis of cache side channels
G Doychev, B Köpf, L Mauborgne, J Reineke
ACM Transactions on Information and System Security (TISSEC) 18 (1), 1-32, 2015
Probabilistic relational reasoning for differential privacy
G Barthe, B Köpf, F Olmedo, S Zanella Béguelin
ACM SIGPLAN Notices 47 (1), 97-110, 2012
A provably secure and efficient countermeasure against timing attacks
B Köpf, M Dürmuth
Computer Security Foundations Symposium, 2009. CSF'09. 22nd IEEE, 324-335, 2009
Fast and simple horizontal coordinate assignment
U Brandes, B Köpf
International Symposium on Graph Drawing, 31-44, 2001
Automatic quantification of cache side-channels
B Köpf, L Mauborgne, M Ochoa
International Conference on Computer Aided Verification, 564-580, 2012
Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks
B Köpf, G Smith
2010 23rd IEEE Computer Security Foundations Symposium, 44-56, 2010
Approximation and randomization for quantitative information-flow analysis
B Köpf, A Rybalchenko
Computer Security Foundations Symposium (CSF), 2010 23rd IEEE, 3-14, 2010
Visone Software for visual social network analysis
M Baur, M Benkert, U Brandes, S Cornelsen, M Gaertler, B Köpf, J Lerner, ...
International Symposium on Graph Drawing, 463-464, 2001
Information-theoretic bounds for differentially private mechanisms
G Barthe, B Kopf
2011 IEEE 24th Computer Security Foundations Symposium, 191-204, 2011
Speaker recognition in encrypted voice streams
M Backes, G Doychev, M Dürmuth, B Köpf
European Symposium on Research in Computer Security, 508-523, 2010
Formally bounding the side-channel leakage in unknown-message attacks
M Backes, B Köpf
European Symposium on Research in Computer Security, 517-532, 2008
Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
M Backes, G Doychev, B Köpf
NDSS, 2013
Rigorous analysis of software countermeasures against cache attacks
G Doychev, B Köpf
Proceedings of the 38th ACM SIGPLAN Conference on Programming Language …, 2017
Loophole: Timing attacks on shared event loops in chrome
P Vila, B Köpf
26th USENIX Security Symposium (USENIX Security 17), 849-864, 2017
Transformational typing and unification for automatically correcting insecure programs
B Köpf, H Mantel
International Journal of Information Security 6 (2-3), 107-131, 2007
Theory and practice of finding eviction sets
P Vila, B Köpf, JF Morales
40th IEEE Symposium on Security and Privacy 2019, 2018
Leakage resilience against concurrent cache attacks
G Barthe, B Köpf, L Mauborgne, M Ochoa
International Conference on Principles of Security and Trust, 140-158, 2014
Eliminating implicit information leaks by transformational typing and unification
B Köpf, H Mantel
International Workshop on Formal Aspects in Security and Trust, 47-62, 2005
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20