Follow
Jason Kim
Jason Kim
Verified email at gatech.edu - Homepage
Title
Cited by
Cited by
Year
Spook. js: Attacking Chrome strict site isolation via speculative execution
A Agarwal, S O’Connell, J Kim, S Yehezkel, D Genkin, E Ronen, Y Yarom
2022 IEEE Symposium on Security and Privacy (SP), 699-715, 2022
302022
Hot Pixels: Frequency, Power, and Temperature Attacks on {GPUs} and Arm {SoCs}
H Taneja, J Kim, JJ Xu, S Van Schaik, D Genkin, Y Yarom
32nd USENIX Security Symposium (USENIX Security 23), 6275-6292, 2023
142023
Ileakage: Browser-based timerless speculative execution attacks on apple devices
J Kim, S van Schaik, D Genkin, Y Yarom
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
42023
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism
I Kang, W Wang, J Kim, S van Schaik, Y Tobah, D Genkin, A Kwong, ...
Proc. USENIX, 2024
22024
Revisiting Lightweight Compiler Provenance Recovery on ARM Binaries
J Kim, D Genkin, K Leach
2023 IEEE/ACM 31st International Conference on Program Comprehension (ICPC …, 2023
12023
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol
A Kwong, W Wang, J Kim, J Berger, D Genkin, E Ronen, H Shacham, ...
32nd USENIX Security Symposium (USENIX Security 23), 7107-7124, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–6