The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Onur Aciiçmez: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç
    Improving Brumley and Boneh timing attack on unprotected SSL implementations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:139-146 [Conf]
  2. Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert
    Predicting Secret Keys Via Branch Prediction. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:225-242 [Conf]
  3. Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç
    Cache Based Remote Timing Attack on the AES. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:271-286 [Conf]
  4. Onur Aciiçmez, Çetin Kaya Koç
    Trace-Driven Cache Attacks on AES (Short Paper). [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:112-121 [Conf]
  5. Kris Tiri, Onur Aciiçmez, Michael Neve, Flemming Andersen
    An Analytical Model for Time-Driven Cache Attacks. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:399-413 [Conf]

  6. Yet another MicroArchitectural Attack: : exploiting I-Cache. [Citation Graph (, )][DBLP]


  7. Deconstructing new cache designs for thwarting software cache-based side channel attacks. [Citation Graph (, )][DBLP]


  8. A trusted mobile phone reference architecturevia secure kernel. [Citation Graph (, )][DBLP]


  9. New Results on Instruction Cache Attacks. [Citation Graph (, )][DBLP]


  10. A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL. [Citation Graph (, )][DBLP]


  11. Cheap Hardware Parallelism Implies Cheap Security. [Citation Graph (, )][DBLP]


  12. Hardware-software integrated approaches to defend against software cache-based side channel attacks. [Citation Graph (, )][DBLP]


  13. New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. [Citation Graph (, )][DBLP]


  14. Alhambra: a system for creating, enforcing, and testing browser security policies. [Citation Graph (, )][DBLP]


  15. Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002