Berk Sunar

Few facts about me: I am a Professor of Electrical & Computer Engineering at Worcester Polytechnic Institute. I am leading the Vernam Research Group specializing in applied cryptography.

My current research interests are in

  • Post-Quantum Crypto & Homomorphic Encryption
  • Microarchitectural & Side Channel Attacks

Recent Papers

  1. CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction,
    Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, Berk Sunar
  2. LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection,
    Van Bulck, Jo and Moghimi, Daniel and Schwarz, Michael and Lipp, Moritz and Minkin, Marina and Genkin, Daniel and Yuval, Yarom and Sunar, Berk and Gruss, Daniel and Piessens, Frank,
    41th IEEE Symposium on Security and Privacy (S&P'20), 2020.
    website paper trailer
  3. Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis,
    Daniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz.
    USENIX Security Symposium, 2020.
  4. JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
    Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth, Berk Sunar.
    Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2020.
  5. TPM-FAIL: TPM meets Timing and Lattice Attacks,
    Daniel Moghimi, Berk Sunar, Thomas Eisenbarth and Nadia Heninger,
    USENIX Security Symposium, 2020.
    website paper
  6. FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning,
    B. Gulmezoglu, A. Moghimi, T. Eisenbarth, B. Sunar
    arXiv preprint arXiv:1907.03651
  7. Fallout: Reading Kernel Writes From User Space,
    M. Minkin, D. Moghimi, M. Lipp, M. Schwarz, J. Van Bulck, D. Genkin, D. Gruss, F. Piessens, B. Sunar, Y. Yarom.
    ACM SIGSAC Conference on Computer and Communications Security (CCS), 2019.
    website paper
  8. DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes
    MS Inci, T Eisenbarth, B Sunar,
    arXiv preprint arXiv:1808.01352 2018
  9. SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks
    S Islam, A Moghimi, B Ida, M Krebbel, G Berk, T Eisenbarth, B Sunar
    USENIX Security Symposium, 2019.
    arXiv preprint arXiv:1903.0044