Radhesh Krishnan Konoth
Radhesh Krishnan Konoth
Verified email at vu.nl
Cited by
Cited by
Throwhammer: Rowhammer Attacks over the Network and Defenses
A Tatar, RK Konoth, E Athanasopoulos, C Giuffrida, H Bos, K Razavi
The 2018 USENIX Annual Technical Conference (USENIX ATC '18), 2018
Minesweeper: An in-depth look into drive-by cryptocurrency mining and its defense
RK Konoth, E Vineti, V Moonsamy, M Lindorfer, C Kruegel, H Bos, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication
RK Konoth, V van der Veen, H Bos
Proceedings of the 20th International Conference on Financial Cryptography …, 2016
ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks
RK Konoth, M Oliverio, A Tatar, D Andriesse, H Bos, C Giuffrida, K Razavi
13th USENIX Symposium on Operating Systems Design and Implementation (OSDI'18), 2018
Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables
B Kollenda, E Göktaş, T Blazytko, P Koppe, R Gawlik, RK Konoth, ...
47th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2017
Malicious cryptocurrency miners: Status and Outlook
RK Konoth, R van Wegberg, V Moonsamy, H Bos
arXiv preprint arXiv:1901.10794, 2019
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions
R Konoth, B Fischer, W Fokkink, K Razavi, E Athanasopoulos, H Bos
5th IEEE European Symposium on Security and Privacy (EuroS&P 2020), 2020
The system can't perform the operation now. Try again later.
Articles 1–7