Berk Sunar

Few facts about me: Professor of Electrical & Computer Engineering at Worcester Polytechnic Institute. Founder of the Vernam Research Lab specializing in applied cryptography and cybersecurity.

My current research interests are in

  • Microarchitectural & Side Channel Attacks
  • Post-Quantum Crypto
  • Homomorphic Encryption
  • Crypto Acceleration

Recent Papers

  1. IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems
    T Tiemann, Z Weissman, T Eisenbarth, B Sunar,
    AsiaCCS 2023, arXiv Preprint arXiv:2202.11623v1
  2. Jolt: Recovering TLS Signing Keys via Rowhammer Faults
    K Mus, Y Doröz, MC Tol, K Rahman, B Sunar
    Cryptology ePrint Archive 2022/1669
  3. Signature Correction Attack on Dilithium Signature Scheme
    S Islam, K Mus, R Singh, P Schaumont, B Sunar,
    7th IEEE European Symposium on Security and Privacy, 2022
  4. An End-to-End Analysis of EMFI on Bit-sliced Post-Quantum Implementations
    Richa Singh, Saad Islam, Berk Sunar, Patrick Schaumont
    ACM Transactions on Embedded Computing Systems 2023 arXiv preprint arXiv:2204.06153
  5. Toward Realistic Backdoor Injection Attacks on DNNs using Rowhammer
    MC Tol, S Islam, B Sunar, Z Zhang
    arXiv preprint
    arXiv:2110.07683 2022
  6. QuantumHammer: a practical hybrid attack on the LUOV signature scheme
    K Mus, S Islam, B Sunar
    Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications, 2020
  7. Homomorphic Sorting With Better Scalability
    G Cetin, E Savas, B Sunar,
    IEEE Transactions on Parallel and Distributed Systems, 2020.
  8. CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction,
    Daniel Moghimi, Jo Van Bulck, Nadia Heninger, Frank Piessens, Berk Sunar
    29th USENIX Security Symposium 2020 paper
  9. LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection,
    Van Bulck, Jo and Moghimi, Daniel and Schwarz, Michael and Lipp, Moritz and Minkin, Marina and Genkin, Daniel and Yuval, Yarom and Sunar, Berk and Gruss, Daniel and Piessens, Frank,
    41th IEEE Symposium on Security and Privacy (S&P'20), 2020.
    website paper trailer
  10. Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis,
    Daniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz.
    USENIX Security Symposium, 2020.
  11. JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
    Zane Weissman, Thore Tiemann, Daniel Moghimi, Evan Custodio, Thomas Eisenbarth, Berk Sunar.
    Transactions on Cryptographic Hardware and Embedded Systems (TCHES) 2020.
  12. TPM-FAIL: TPM meets Timing and Lattice Attacks,
    Daniel Moghimi, Berk Sunar, Thomas Eisenbarth and Nadia Heninger,
    USENIX Security Symposium, 2020.
    website paper
  13. FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning,
    B. Gulmezoglu, A. Moghimi, T. Eisenbarth, B. Sunar
    arXiv preprint arXiv:1907.03651
  14. Fallout: Reading Kernel Writes From User Space,
    M. Minkin, D. Moghimi, M. Lipp, M. Schwarz, J. Van Bulck, D. Genkin, D. Gruss, F. Piessens, B. Sunar, Y. Yarom.
    ACM SIGSAC Conference on Computer and Communications Security (CCS), 2019.
    website paper
  15. DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes
    MS Inci, T Eisenbarth, B Sunar,
    arXiv preprint arXiv:1808.01352 2018
  16. SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks
    S Islam, A Moghimi, B Ida, M Krebbel, G Berk, T Eisenbarth, B Sunar
    USENIX Security Symposium, 2019.
    arXiv preprint arXiv:1903.0044