Berk Sunar

Few facts about me: Professor of Electrical & Computer Engineering at Worcester Polytechnic Institute. Founder of the Vernam Research Lab specializing in applied cryptography and cybersecurity.

My current research interests are in

  • Microarchitectural & Side Channel Attacks
  • Machine Learning for Security & Security for Machine Learning
  • Post-Quantum Cryptography
  • Homomorphic Encryption

Recent Papers

  1. ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching
    M. Caner Tol, Berk Sunar
    arXiv Preprint arXiv:2308.13062
  2. IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems
    T Tiemann, Z Weissman, T Eisenbarth, B Sunar,
    AsiaCCS 2023, arXiv Preprint arXiv:2202.11623v1
  3. Jolt: Recovering TLS Signing Keys via Rowhammer Faults
    K Mus, Y Doröz, MC Tol, K Rahman, B Sunar
    Cryptology ePrint Archive 2022/1669
  4. Signature Correction Attack on Dilithium Signature Scheme
    S Islam, K Mus, R Singh, P Schaumont, B Sunar,
    7th IEEE European Symposium on Security and Privacy, 2022
  5. An End-to-End Analysis of EMFI on Bit-sliced Post-Quantum Implementations
    Richa Singh, Saad Islam, Berk Sunar, Patrick Schaumont
    ACM Transactions on Embedded Computing Systems 2023 arXiv preprint arXiv:2204.06153
  6. Toward Realistic Backdoor Injection Attacks on DNNs using Rowhammer
    MC Tol, S Islam, B Sunar, Z Zhang
    arXiv preprint
    arXiv:2110.07683 2022
  7. QuantumHammer: a practical hybrid attack on the LUOV signature scheme
    K Mus, S Islam, B Sunar
    Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications, 2020
    paper
  8. Homomorphic Sorting With Better Scalability
    G Cetin, E Savas, B Sunar,
    IEEE Transactions on Parallel and Distributed Systems, 2020.
    paper
  9. CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction,
    Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, Berk Sunar
    29th USENIX Security Symposium 2020 paper
  10. LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection,
    Van Bulck, Jo and Moghimi, Daniel and Schwarz, Michael and Lipp, Moritz and Minkin, Marina and Genkin, Daniel and Yuval, Yarom and Sunar, Berk and Gruss, Daniel and Piessens, Frank,
    41th IEEE Symposium on Security and Privacy (S&P'20), 2020.
    website paper trailer
  11. Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis,
    Daniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz.
    USENIX Security Symposium, 2020.
  12. JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
    Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth, Berk Sunar.
    Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2020.
    paper
  13. TPM-FAIL: TPM meets Timing and Lattice Attacks,
    Daniel Moghimi, Berk Sunar, Thomas Eisenbarth and Nadia Heninger,
    USENIX Security Symposium, 2020.
    website paper
  14. FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning,
    B. Gulmezoglu, A. Moghimi, T. Eisenbarth, B. Sunar
    arXiv preprint arXiv:1907.03651
  15. Fallout: Reading Kernel Writes From User Space,
    M. Minkin, D. Moghimi, M. Lipp, M. Schwarz, J. Van Bulck, D. Genkin, D. Gruss, F. Piessens, B. Sunar, Y. Yarom.
    ACM SIGSAC Conference on Computer and Communications Security (CCS), 2019.
    website paper
  16. DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes
    MS Inci, T Eisenbarth, B Sunar,
    ACSAC 2019 DYNAMICS
    arXiv preprint arXiv:1808.01352 2018
  17. SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks
    S Islam, A Moghimi, B Ida, M Krebbel, G Berk, T Eisenbarth, B Sunar
    USENIX Security Symposium, 2019.
    arXiv preprint arXiv:1903.0044