Berk Sunar

Few facts about me: Professor of Electrical & Computer Engineering at Worcester Polytechnic Institute. Founder of the Vernam Research Lab specializing in applied cryptography and cybersecurity.

My current research interests are in

  • Microarchitectural & Side Channel Attacks
  • Post-Quantum Crypto
  • Homomorphic Encryption
  • Crypto Acceleration

Recent Papers

  1. IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems
    T Tiemann, Z Weissman, T Eisenbarth, B Sunar,
    arXiv Preprint arXiv:2202.11623v1
  2. Signature Correction Attack on Dilithium Signature Scheme
    S Islam, K Mus, R Singh, P Schaumont, B Sunar,
    7th IEEE European Symposium on Security and Privacy, 2022
  3. Toward Realistic Backdoor Injection Attacks on DNNs using Rowhammer
    MC Tol, S Islam, B Sunar, Z Zhang
    arXiv preprint arXiv:2110.07683 2022
  4. QuantumHammer: a practical hybrid attack on the LUOV signature scheme
    K Mus, S Islam, B Sunar
    Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications, 2020
  5. Homomorphic Sorting With Better Scalability
    G Cetin, E Savas, B Sunar,
    IEEE Transactions on Parallel and Distributed Systems, 2020.
  6. CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction,
    Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, Berk Sunar
  7. LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection,
    Van Bulck, Jo and Moghimi, Daniel and Schwarz, Michael and Lipp, Moritz and Minkin, Marina and Genkin, Daniel and Yuval, Yarom and Sunar, Berk and Gruss, Daniel and Piessens, Frank,
    41th IEEE Symposium on Security and Privacy (S&P'20), 2020.
    website paper trailer
  8. Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis,
    Daniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz.
    USENIX Security Symposium, 2020.
  9. JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
    Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth, Berk Sunar.
    Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2020.
  10. TPM-FAIL: TPM meets Timing and Lattice Attacks,
    Daniel Moghimi, Berk Sunar, Thomas Eisenbarth and Nadia Heninger,
    USENIX Security Symposium, 2020.
    website paper
  11. FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning,
    B. Gulmezoglu, A. Moghimi, T. Eisenbarth, B. Sunar
    arXiv preprint arXiv:1907.03651
  12. Fallout: Reading Kernel Writes From User Space,
    M. Minkin, D. Moghimi, M. Lipp, M. Schwarz, J. Van Bulck, D. Genkin, D. Gruss, F. Piessens, B. Sunar, Y. Yarom.
    ACM SIGSAC Conference on Computer and Communications Security (CCS), 2019.
    website paper
  13. DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes
    MS Inci, T Eisenbarth, B Sunar,
    arXiv preprint arXiv:1808.01352 2018
  14. SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks
    S Islam, A Moghimi, B Ida, M Krebbel, G Berk, T Eisenbarth, B Sunar
    USENIX Security Symposium, 2019.
    arXiv preprint arXiv:1903.0044