Search Results - "Kopf, Boris"

Refine Results
  1. 1

    Revizor: Testing Black-Box CPUs Against Speculation Contracts by Oleksenko, Oleksii, Fetzer, Christof, Kopf, Boris, Silberstein, Mark

    Published in IEEE MICRO (01-07-2023)
    “…Speculative execution attacks such as Spectre and Meltdown exploit microarchitectural optimizations to leak information across security domains. These…”
    Get full text
    Journal Article
  2. 2

    Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing by Oleksenko, Oleksii, Guarnieri, Marco, Kopf, Boris, Silberstein, Mark

    “…Attacks like Spectre abuse speculative execution, one of the key performance optimizations of modern CPUs. Recently, several testing tools have emerged to…”
    Get full text
    Conference Proceeding
  3. 3

    On the Incomparability of Cache Algorithms in Terms of Timing Leakage by Pablo Cañones, Boris Köpf, Jan Reineke

    Published in Logical methods in computer science (01-01-2019)
    “…Modern computer architectures rely on caches to reduce the latency gap between the CPU and main memory. While indispensable for performance, caches pose a…”
    Get full text
    Journal Article
  4. 4

    SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning by Salem, Ahmed, Cherubin, Giovanni, Evans, David, Kopf, Boris, Paverd, Andrew, Suri, Anshuman, Tople, Shruti, Zanella-Beguelin, Santiago

    “…Deploying machine learning models in production may allow adversaries to infer sensitive information about training data. There is a vast literature analyzing…”
    Get full text
    Conference Proceeding
  5. 5

    Information-Theoretic Bounds for Differentially Private Mechanisms by Barthe, G., Kopf, B.

    “…There are two active and independent lines of research that aim at quantifying the amount of information that is disclosed by computing on confidential data…”
    Get full text
    Conference Proceeding
  6. 6

    Theory and Practice of Finding Eviction Sets by Vila, Pepe, Kopf, Boris, Morales, Jose F.

    “…Many micro-architectural attacks rely on the capability of an attacker to efficiently find small eviction sets: groups of virtual addresses that map to the…”
    Get full text
    Conference Proceeding
  7. 7

    Hardware-Software Contracts for Secure Speculation by Guarnieri, Marco, Kopf, Boris, Reineke, Jan, Vila, Pepe

    “…Since the discovery of Spectre, a large number of hardware mechanisms for secure speculation has been proposed. Intuitively, more defensive mechanisms are less…”
    Get full text
    Conference Proceeding
  8. 8

    Rational Protection against Timing Attacks by Doychev, Goran, Kopf, Boris

    “…Timing attacks can effectively recover keys from cryptosystems. While they can be defeated using constant-time implementations, this defensive approach comes…”
    Get full text
    Conference Proceeding
  9. 9

    Spectector: Principled Detection of Speculative Information Flows by Guarnieri, Marco, Kopf, Boris, Morales, Jose F., Reineke, Jan, Sanchez, Andres

    “…Since the advent of Spectre, a number of counter-measures have been proposed and deployed. Rigorously reasoning about their effectiveness, however, requires a…”
    Get full text
    Conference Proceeding
  10. 10

    Automatic Discovery and Quantification of Information Leaks by Backes, M., Kopf, B., Rybalchenko, A.

    “…Information-flow analysis is a powerful technique for reasoning about the sensitive information exposed by a program during its execution. We present the first…”
    Get full text
    Conference Proceeding
  11. 11

    Approximation and Randomization for Quantitative Information-Flow Analysis by Köpf, B, Rybalchenko, A

    “…Quantitative information-flow analysis (QIF) is an emerging technique for establishing information-theoretic confidentiality properties. Automation of QIF is…”
    Get full text
    Conference Proceeding
  12. 12

    A Provably Secure and Efficient Countermeasure against Timing Attacks by Kopf, B., Durmuth, M.

    “…We show that the amount of information about the key that an unknown-message attacker can extract from a deterministic side-channel is bounded from above by…”
    Get full text
    Conference Proceeding
  13. 13

    Vulnerability Bounds and Leakage Resilience of Blinded Cryptography under Timing Attacks by Köpf, Boris, Smith, Geoffrey

    “…We establish formal bounds for the number of min-entropy bits that can be extracted in a timing attack against a cryptosystem that is protected by blinding,…”
    Get full text
    Conference Proceeding
  14. 14

    Timing Leaks and Coarse-Grained Clocks by Vasilikos, Panagiotis, Riis Nielson, Hanne, Nielson, Flemming, Kopf, Boris

    “…Timing-based side-channel attacks have matured from an academic exercise to a powerful attack vector in the hand of real-world adversaries. A widely deployed…”
    Get full text
    Conference Proceeding
  15. 15

    On Aggregation of Information in Timing Attacks by Rakotonirina, Itsaka, Kopf, Boris

    “…A key question for characterising a system's vulnerability against timing attacks is whether or not it allows an adversary to aggregate information about a…”
    Get full text
    Conference Proceeding
  16. 16

    Maatphor: Automated Variant Analysis for Prompt Injection Attacks by Salem, Ahmed, Paverd, Andrew, Köpf, Boris

    Published 12-12-2023
    “…Prompt injection has emerged as a serious security threat to large language models (LLMs). At present, the current best-practice for defending against…”
    Get full text
    Journal Article
  17. 17

    Transformational typing and unification for automatically correcting insecure programs by Köpf, Boris, Mantel, Heiko

    “…Before starting a rigorous security analysis of a given software system, the most likely outcome is often already clear, namely that the system is not entirely…”
    Get full text
    Journal Article
  18. 18

    Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing by Oleksenko, Oleksii, Guarnieri, Marco, Köpf, Boris, Silberstein, Mark

    Published 18-01-2023
    “…Attacks like Spectre abuse speculative execution, one of the key performance optimizations of modern CPUs. Recently, several testing tools have emerged to…”
    Get full text
    Journal Article
  19. 19

    Closed-Form Bounds for DP-SGD against Record-level Inference by Cherubin, Giovanni, Köpf, Boris, Paverd, Andrew, Tople, Shruti, Wutschitz, Lukas, Zanella-Béguelin, Santiago

    Published 22-02-2024
    “…Machine learning models trained with differentially-private (DP) algorithms such as DP-SGD enjoy resilience against a wide range of privacy attacks. Although…”
    Get full text
    Journal Article
  20. 20

    Loophole: Timing Attacks on Shared Event Loops in Chrome by Vila, Pepe, Köpf, Boris

    Published 22-02-2017
    “…Event-driven programming (EDP) is the prevalent paradigm for graphical user interfaces, web clients, and it is rapidly gaining importance for server-side and…”
    Get full text
    Journal Article