关注
Andrew Kwong
Andrew Kwong
在 cs.unc.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
RAMBleed: Reading Bits in Memory Without Accessing Them
A Kwong, D Genkin, D Gruss, Y Yarom
41st IEEE Symposium on Security and Privacy (S&P), 2020
1892020
CacheOut: Leaking data on Intel CPUs via cache evictions
S van Schaik, M Minkin, A Kwong, D Genkin, Y Yarom
42nd IEEE Symposium on Security and Privacy (S&P), 2021
1512021
SGAxe: How SGX fails in practice
S Van Schaik, A Kwong, D Genkin, Y Yarom
2020. https://sgaxe. com/files/SGAxe. pdf, 2020
105*2020
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone
A Kwong, W Xu, K Fu
40th IEEE Symposium on Security and Privacy (S&P), 2019
542019
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems
C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu
39th IEEE Symposium on Security and Privacy (S&P), 2018
472018
SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks
Y Tobah, A Kwong, I Kang, D Genkin, KG Shin
43rd IEEE Symposium on Security and Privacy (S&P), 2022
442022
Pseudorandom Black Swans: Cache Attacks on CTR DRBG
S Cohney, A Kwong, S Paz, D Genkin, N Heninger, E Ronen, Y Yarom
41st IEEE Symposium on Security and Privacy (S&P), 2020
442020
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer
M Fahr Jr, H Kippen, A Kwong, T Dang, J Lichtinger, D Dachman-Soled, ...
29th ACM Conference on Computer and Communications Security (CCS), 2022
262022
Why Do You Trust Sensors? Analog Cybersecurity Attack Demos
A Kwong, C Bolton, T Trippel, W Xu, K Fu
12017
Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor
H Yavarzadeh, A Agarwal, M Christman, C Garman, D Genkin, A Kwong, ...
Proceedings of the 29th ACM International Conference on Architectural …, 2024
2024
Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage
Y Tobah, A Kwong, I Kang, D Genkin, KG Shin
USENIX Security Symposium (USENIX Security), 2024
2024
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism
I Kang, W Wang, J Kim, S van Schaik, Y Tobah, D Genkin, A Kwong, ...
USENIX Security Symposium (USENIX Security), 2024
2024
Applying Software-Based Side-Channels to Hardware Vulnerabilities
A Kwong
2023
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol
A Kwong, W Wang, J Kim, J Berger, D Genkin, E Ronen, H Shacham, ...
USENIX Security Symposium (USENIX Security), 2023
2023
Poster: Blue Note-How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems
C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu
系统目前无法执行此操作,请稍后再试。
文章 1–15