Cross-VM side channels and their use to extract private keys Y Zhang, A Juels, MK Reiter, T Ristenpart Proceedings of CCS, 2012 | 1050 | 2012 |
Peeking behind the curtains of serverless platforms L Wang, M Li, Y Zhang, T Ristenpart, M Swift 2018 USENIX annual technical conference (USENIX ATC 18), 133-146, 2018 | 679 | 2018 |
Cross-tenant side-channel attacks in PaaS clouds Y Zhang, A Juels, MK Reiter, T Ristenpart Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 498 | 2014 |
Homealone: Co-residency detection in the cloud via side-channel analysis Y Zhang, A Juels, A Oprea, MK Reiter 2011 IEEE symposium on security and privacy, 313-328, 2011 | 488 | 2011 |
Sgxpectre: Stealing intel secrets from sgx enclaves via speculative execution G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 142-157, 2019 | 456 | 2019 |
Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX W Wang, G Chen, X Pan, Y Zhang, XF Wang, V Bindschaedler, H Tang, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 447 | 2017 |
One bit flips, one cloud flops:{Cross-VM} row hammer attacks and privilege escalation Y Xiao, X Zhang, Y Zhang, R Teodorescu 25th USENIX security symposium (USENIX Security 16), 19-35, 2016 | 310 | 2016 |
Düppel: Retrofitting commodity operating systems to mitigate cache side channels in the cloud Y Zhang, MK Reiter Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 300 | 2013 |
Cloudradar: A real-time side-channel attack detection system in clouds T Zhang, Y Zhang, RB Lee Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016 | 296 | 2016 |
The security of modern password expiration: An algorithmic framework and empirical analysis Y Zhang, F Monrose, MK Reiter Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 271 | 2010 |
Detecting privileged side-channel attacks in shielded execution with Déjá Vu S Chen, X Zhang, MK Reiter, Y Zhang Proceedings of the 2017 ACM on Asia Conference on Computer and …, 2017 | 266 | 2017 |
Homonit: Monitoring smart home apps from encrypted traffic W Zhang, Y Meng, Y Liu, X Zhang, Y Zhang, H Zhu Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 242 | 2018 |
A placement vulnerability study in {Multi-Tenant} public clouds V Varadarajan, Y Zhang, T Ristenpart, M Swift 24th USENIX Security Symposium (USENIX Security 15), 913-928, 2015 | 220 | 2015 |
A software approach to defeating side channels in last-level caches Z Zhou, MK Reiter, Y Zhang Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 197 | 2016 |
Sgxpectre attacks: Leaking enclave secrets via speculative execution G Chen, S Chen, Y Xiao, Y Zhang, Z Lin, TH Lai arXiv preprint arXiv:1802.09085, 2018 | 143 | 2018 |
Why does your data leak? uncovering the data leakage in cloud from mobile apps C Zuo, Z Lin, Y Zhang 2019 IEEE Symposium on Security and Privacy (SP), 1296-1310, 2019 | 123 | 2019 |
{TXSPECTOR}: Uncovering attacks in ethereum from transactions M Zhang, X Zhang, Y Zhang, Z Lin 29th USENIX Security Symposium (USENIX Security 20), 2775-2792, 2020 | 106 | 2020 |
PT-CFI: Transparent backward-edge control flow violation detection using intel processor trace Y Gu, Q Zhao, Y Zhang, Z Lin Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 99 | 2017 |
Racing in hyperspace: Closing hyper-threading side channels on sgx with contrived data races G Chen, W Wang, T Chen, S Chen, Y Zhang, XF Wang, TH Lai, D Lin 2018 IEEE Symposium on Security and Privacy (SP), 178-194, 2018 | 97 | 2018 |
Specshield: Shielding speculative data from microarchitectural covert channels K Barber, A Bacha, L Zhou, Y Zhang, R Teodorescu 2019 28th International Conference on Parallel Architectures and Compilation …, 2019 | 93 | 2019 |