Toward Realistic Backdoor Injection Attacks on DNNs using Rowhammer
MC Tol, S Islam, B Sunar, Z Zhang
arXiv preprint arXiv:2110.07683 2022
QuantumHammer: a practical hybrid attack on the LUOV signature scheme
K Mus, S Islam, B Sunar
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications, 2020
paper
Homomorphic Sorting With Better Scalability
G Cetin, E Savas, B Sunar,
IEEE Transactions on Parallel and Distributed Systems, 2020.
paper
CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction,
Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, Berk Sunar
29th USENIX Security Symposium 2020
paper
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection,
Van Bulck, Jo and Moghimi, Daniel and Schwarz, Michael and Lipp, Moritz and Minkin, Marina and Genkin, Daniel and Yuval, Yarom and Sunar, Berk and Gruss, Daniel and
Piessens, Frank,
41th IEEE Symposium on Security and Privacy (S&P'20), 2020.
website
paper
trailer
Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis,
Daniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz.
USENIX Security Symposium, 2020.
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth, Berk Sunar.
Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2020.
paper
TPM-FAIL: TPM meets Timing and Lattice Attacks,
Daniel Moghimi, Berk Sunar, Thomas Eisenbarth and Nadia Heninger,
USENIX Security Symposium, 2020.
website
paper
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning,
B. Gulmezoglu, A. Moghimi, T. Eisenbarth, B. Sunar
arXiv preprint arXiv:1907.03651
Fallout: Reading Kernel Writes From User Space,
M. Minkin, D. Moghimi, M. Lipp, M. Schwarz, J. Van Bulck, D. Genkin, D. Gruss, F.
Piessens, B. Sunar, Y. Yarom.
ACM SIGSAC Conference on Computer and Communications Security (CCS), 2019.
website
paper
DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes
MS Inci, T Eisenbarth, B Sunar,
ACSAC 2019 DYNAMICS
arXiv preprint arXiv:1808.01352 2018
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks
S Islam, A Moghimi, B Ida, M Krebbel, G Berk, T Eisenbarth, B Sunar
USENIX Security Symposium, 2019.
arXiv preprint arXiv:1903.0044