What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Daniel Genkin
Google Scholar
65
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Peek-a-Walk: Leaking Secrets via Page Walk Side Channels.
Alan Wang
Boru Chen
Yingchen Wang
Christopher W. Fletcher
Daniel Genkin
David Kohlbrenner
Riccardo Paccagnella
2025
conf/sp
SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon.
Jason Kim
Daniel Genkin
Yuval Yarom
2025
conf/sp
Slice+Slice Baby: Generating Last-Level Cache Eviction Sets in the Blink of an Eye.
Bradley Morgan
Gal Horowitz
Sioli O'Connell
Stephan van Schaik
Chitchanok Chuengsatiansup
Daniel Genkin
Olaf Maennel
Paul Montague
Eyal Ronen
Yuval Yarom
2025
conf/sp
PQ-Hammer: End-to-End Key Recovery Attacks on Post-Quantum Cryptography Using Rowhammer.
Samy Amer
Yingchen Wang
Hunter Kippen
Thinh Dang
Daniel Genkin
Andrew Kwong
Alexander Nelson
Arkady Yerukhimovich
2025
conf/uss
FLOP: Breaking the Apple M3 CPU via False Load Output Predictions.
Jason Kim
Jalen Chuang
Daniel Genkin
Yuval Yarom
2025
conf/uss
ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory.
Nureddin Kamadan
Walter Wang
Stephan van Schaik
Christina Garman
Daniel Genkin
Yuval Yarom
2024
journals/tches
Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks.
Shing Hing William Cheng
Chitchanok Chuengsatiansup
Daniel Genkin
Dallas McNeil
Toby Murray
Yuval Yarom
Zhiyuan Zhang
2024
conf/ccs
Testing Side-channel Security of Cryptographic Implementations against Future Microarchitectures.
Gilles Barthe
Marcel Böhme
Sunjay Cauligi
Chitchanok Chuengsatiansup
Daniel Genkin
Marco Guarnieri
David Mateos Romero
Peter Schwabe
David Wu
Yuval Yarom
2024
conf/uss
Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome.
Sioli O'Connell
Lishay Aben Sour
Ron Magen
Daniel Genkin
Yossi Oren
Hovav Shacham
Yuval Yarom
2024
conf/uss
Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage.
Youssef Tobah
Andrew Kwong
Ingab Kang
Daniel Genkin
Kang G. Shin
2024
conf/uss
GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers.
Boru Chen
Yingchen Wang
Pradyumna Shome
Christopher W. Fletcher
David Kohlbrenner
Riccardo Paccagnella
Daniel Genkin
2024
conf/uss
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism.
Ingab Kang
Walter Wang
Jason Kim
Stephan van Schaik
Youssef Tobah
Daniel Genkin
Andrew Kwong
Yuval Yarom
2024
conf/sp
SoK: SGX.Fail: How Stuff Gets eXposed.
Stephan van Schaik
Alexander Seto
Thomas Yurek
Adam Batori
Bader AlBassam
Daniel Genkin
Andrew Miller
Eyal Ronen
Yuval Yarom
Christina Garman
2023
journals/joc
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries.
Koji Chida
Koki Hamada
Dai Ikarashi
Ryo Kikuchi
Daniel Genkin
Yehuda Lindell
Ariel Nof
2023
conf/ccs
iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices.
Jason Kim
Stephan van Schaik
Daniel Genkin
Yuval Yarom
2023
conf/ccs
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
Ben Nassi
Ofek Vayner
Etay Iluz
Dudi Nassi
Jan Jancar
Daniel Genkin
Eran Tromer
Boris Zadov
Yuval Elovici
2023
conf/uss
The Impostor Among US(B): Off-Path Injection Attacks on USB Communications.
Robert Dumitru
Daniel Genkin
Andrew Wabnitz
Yuval Yarom
2023
conf/uss
BunnyHop: Exploiting the Instruction Prefetcher.
Zhiyuan Zhang
Mingtian Tao
Sioli O'Connell
Chitchanok Chuengsatiansup
Daniel Genkin
Yuval Yarom
2023
conf/uss
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol.
Andrew Kwong
Walter Wang
Jason Kim
Jonathan Berger
Daniel Genkin
Eyal Ronen
Hovav Shacham
Riad S. Wahby
Yuval Yarom
2023
conf/uss
Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs.
Hritvik Taneja
Jason Kim
Jie Jeff Xu
Stephan van Schaik
Daniel Genkin
Yuval Yarom
2023
conf/sp
Spectre Declassified: Reading from the Right Place at the Wrong Time.
Basavesh Ammanaghatta Shivakumar
Jack Barnes
Gilles Barthe
Sunjay Cauligi
Chitchanok Chuengsatiansup
Daniel Genkin
Sioli O'Connell
Peter Schwabe
Rui Qi Sim
Yuval Yarom
2023
conf/asiaccs
CacheFX: A Framework for Evaluating Cache Security.
Daniel Genkin
William Kosasih
Fangfei Liu
Anna Trikalinou
Thomas Unterluggauer
Yuval Yarom
2022
conf/ccs
HammerScope: Observing DRAM Power Consumption Using Rowhammer.
Yaakov Cohen
Kevin Sam Tharayil
Arie Haenel
Daniel Genkin
Angelos D. Keromytis
Yossi Oren
Yuval Yarom
2022
conf/ccs
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer.
Michael Fahr
Hunter Kippen
Andrew Kwong
Thinh Dang
Jacob Lichtinger
Dana Dachman-Soled
Daniel Genkin
Alexander Nelson
Ray A. Perlner
Arkady Yerukhimovich
Daniel Apon
2022
conf/uss
Lend Me Your Ear: Passive Remote Physical Side Channels on PCs.
Daniel Genkin
Noam Nissan
Roei Schuster
Eran Tromer
2022
conf/crypto
Snapshot-Oblivious RAMs: Sub-logarithmic Efficiency for Short Transcripts.
Yang Du
Daniel Genkin
Paul Grubbs
2022
conf/sp
Spook.js: Attacking Chrome Strict Site Isolation via Speculative Execution.
Ayush Agarwal
Sioli O'Connell
Jason Kim
Shaked Yehezkel
Daniel Genkin
Eyal Ronen
Yuval Yarom
2022
conf/sp
SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks.
Youssef Tobah
Andrew Kwong
Ingab Kang
Daniel Genkin
Kang G. Shin
2022
conf/ctrsa
Side-Channeling the Kalyna Key Expansion.
Chitchanok Chuengsatiansup
Daniel Genkin
Yuval Yarom
Zhiyuan Zhang
2021
conf/uss
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses.
Anatoly Shusterman
Ayush Agarwal
Sioli O'Connell
Daniel Genkin
Yossi Oren
Yuval Yarom
2021
conf/sp
CacheOut: Leaking Data on Intel CPUs via Cache Evictions.
Stephan van Schaik
Marina Minkin
Andrew Kwong
Daniel Genkin
Yuval Yarom
2021
conf/eurosp
Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms.
Monjur Alam
Baki Berkay Yilmaz
Frank Werner
Niels Samwel
Alenka G. Zajic
Daniel Genkin
Yuval Yarom
Milos Prvulovic
2020
journals/tches
Cache vs. Key-Dependency: Side Channeling an Implementation of Pilsung.
Daniel Genkin
Romain Poussier
Rui Qi Sim
Yuval Yarom
Yuanjing Zhao
2020
conf/uss
Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems.
Takeshi Sugawara
Benjamin Cyr
Sara Rampazzi
Daniel Genkin
Kevin Fu
2020
conf/sp
RAMBleed: Reading Bits in Memory Without Accessing Them.
Andrew Kwong
Daniel Genkin
Daniel Gruss
Yuval Yarom
2020
conf/sp
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG.
Shaanan Cohney
Andrew Kwong
Shahar Paz
Daniel Genkin
Nadia Heninger
Eyal Ronen
Yuval Yarom
2020
conf/sp
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection.
Jo Van Bulck
Daniel Moghimi
Michael Schwarz
Moritz Lipp
Marina Minkin
Daniel Genkin
Yuval Yarom
Berk Sunar
Daniel Gruss
Frank Piessens
2019
conf/ccs
Fallout: Leaking Data on Meltdown-resistant CPUs.
Claudio Canella
Daniel Genkin
Lukas Giner
Daniel Gruss
Moritz Lipp
Marina Minkin
Daniel Moghimi
Frank Piessens
Michael Schwarz
Berk Sunar
Jo Van Bulck
Yuval Yarom
2019
conf/sp
Spectre Attacks: Exploiting Speculative Execution.
Paul Kocher
Jann Horn
Anders Fogh
Daniel Genkin
Daniel Gruss
Werner Haas
Mike Hamburg
Moritz Lipp
Stefan Mangard
Thomas Prescher
Michael Schwarz
Yuval Yarom
2019
conf/sp
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels.
Daniel Genkin
Mihir Pattani
Roei Schuster
Eran Tromer
2019
conf/sp
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations.
Eyal Ronen
Robert Gillham
Daniel Genkin
Adi Shamir
David Wong
Yuval Yarom
2018
journals/tches
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks.
Fergus Dall
Gabrielle De Micheli
Thomas Eisenbarth
Daniel Genkin
Nadia Heninger
Ahmad Moghimi
Yuval Yarom
2018
conf/uss
Meltdown: Reading Kernel Memory from User Space.
Moritz Lipp
Michael Schwarz
Daniel Gruss
Thomas Prescher
Werner Haas
Anders Fogh
Jann Horn
Stefan Mangard
Paul Kocher
Daniel Genkin
Yuval Yarom
Mike Hamburg
2018
conf/uss
Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution.
Jo Van Bulck
Marina Minkin
Ofir Weisse
Daniel Genkin
Baris Kasikci
Frank Piessens
Mark Silberstein
Thomas F. Wenisch
Yuval Yarom
Raoul Strackx
2018
conf/crypto
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries.
Koji Chida
Daniel Genkin
Koki Hamada
Dai Ikarashi
Ryo Kikuchi
Yehuda Lindell
Ariel Nof
2018
conf/sp
Another Flip in the Wall of Rowhammer Defenses.
Daniel Gruss
Moritz Lipp
Michael Schwarz
Daniel Genkin
Jonas Juffinger
Sioli O'Connell
Wolfgang Schoechl
Yuval Yarom
2018
conf/sp
vRAM: Faster Verifiable RAM with Program-Independent Preprocessing.
Yupeng Zhang
Daniel Genkin
Jonathan Katz
Dimitrios Papadopoulos
Charalampos Papamanthou
2018
conf/acns
Best of Both Worlds in Secure Computation, with Low Communication Overhead.
Daniel Genkin
S. Dov Gordon
Samuel Ranellucci
2018
conf/acns
Drive-By Key-Extraction Cache Attacks from Portable Code.
Daniel Genkin
Lev Pachmanov
Eran Tromer
Yuval Yarom
2017
journals/joc
Acoustic Cryptanalysis.
Daniel Genkin
Adi Shamir
Eran Tromer
2017
conf/ccs
May the Fourth Be With You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519.
Daniel Genkin
Luke Valenta
Yuval Yarom
2017
conf/uss
USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs.
Yang Su
Daniel Genkin
Damith Chinthana Ranasinghe
Yuval Yarom
2017
conf/sp
vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.
Yupeng Zhang
Daniel Genkin
Jonathan Katz
Dimitrios Papadopoulos
Charalampos Papamanthou
2017
conf/ches
Sliding Right into Disaster: Left-to-Right Sliding Windows Leak.
Daniel J. Bernstein
Joachim Breitner
Daniel Genkin
Leon Groot Bruinderink
Nadia Heninger
Tanja Lange
Christine van Vredendaal
Yuval Yarom
2017
conf/eurocrypt
Computational Integrity with a Public Random String from Quasi-Linear PCPs.
Eli Ben-Sasson
Iddo Bentov
Alessandro Chiesa
Ariel Gabizon
Daniel Genkin
Matan Hamilis
Evgenya Pergament
Michael Riabzev
Mark Silberstein
Eran Tromer
Madars Virza
2017
conf/tcc
How to Construct a Leakage-Resilient (Stateless) Trusted Party.
Daniel Genkin
Yuval Ishai
Mor Weiss
2016
conf/ccs
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels.
Daniel Genkin
Lev Pachmanov
Itamar Pipman
Eran Tromer
Yuval Yarom
2016
conf/ches
CacheBleed: A Timing Attack on OpenSSL Constant Time RSA.
Yuval Yarom
Daniel Genkin
Nadia Heninger
2016
conf/ctrsa
ECDH Key-Extraction via Low-Bandwidth Electromagnetic Attacks on PCs.
Daniel Genkin
Lev Pachmanov
Itamar Pipman
Eran Tromer
2016
conf/tcc
Binary AMD Circuits from Secure Multiparty Computation.
Daniel Genkin
Yuval Ishai
Mor Weiss
2015
conf/crypto
Efficient Multi-party Computation: From Passive to Active Security via Secure SIMD Circuits.
Daniel Genkin
Yuval Ishai
Antigoni Polychroniadou
2015
conf/ches
Stealing Keys from PCs Using a Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation.
Daniel Genkin
Lev Pachmanov
Itamar Pipman
Eran Tromer
2014
conf/crypto
RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.
Daniel Genkin
Adi Shamir
Eran Tromer
2014
conf/ches
Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs.
Daniel Genkin
Itamar Pipman
Eran Tromer
2013
conf/crypto
SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge.
Eli Ben-Sasson
Alessandro Chiesa
Daniel Genkin
Eran Tromer
Madars Virza
Coauthors
Adam Batori
(1)
Adi Shamir
(3)
Ahmad Moghimi
(1)
Alan Wang
(1)
Alenka G. Zajic
(1)
Alessandro Chiesa
(2)
Alexander Nelson
(2)
Alexander Seto
(1)
Anatoly Shusterman
(1)
Anders Fogh
(2)
Andrew Kwong
(9)
Andrew Miller
(1)
Andrew Wabnitz
(1)
Angelos D. Keromytis
(1)
Anna Trikalinou
(1)
Antigoni Polychroniadou
(1)
Arie Haenel
(1)
Ariel Gabizon
(1)
Ariel Nof
(2)
Arkady Yerukhimovich
(2)
Ayush Agarwal
(2)
Bader AlBassam
(1)
Baki Berkay Yilmaz
(1)
Baris Kasikci
(1)
Basavesh Ammanaghatta Shivakumar
(1)
Ben Nassi
(1)
Benjamin Cyr
(1)
Berk Sunar
(2)
Boris Zadov
(1)
Boru Chen
(2)
Bradley Morgan
(1)
Charalampos Papamanthou
(2)
Chitchanok Chuengsatiansup
(6)
Christina Garman
(2)
Christine van Vredendaal
(1)
Christopher W. Fletcher
(2)
Claudio Canella
(1)
Dai Ikarashi
(2)
Dallas McNeil
(1)
Damith Chinthana Ranasinghe
(1)
Dana Dachman-Soled
(1)
Daniel Apon
(1)
Daniel Genkin
(65)
Daniel Gruss
(6)
Daniel J. Bernstein
(1)
Daniel Moghimi
(2)
David Kohlbrenner
(2)
David Mateos Romero
(1)
David Wong
(1)
David Wu
(1)
Dimitrios Papadopoulos
(2)
Dudi Nassi
(1)
Eli Ben-Sasson
(2)
Eran Tromer
(12)
Etay Iluz
(1)
Evgenya Pergament
(1)
Eyal Ronen
(6)
Fangfei Liu
(1)
Fergus Dall
(1)
Frank Piessens
(3)
Frank Werner
(1)
Gabrielle De Micheli
(1)
Gal Horowitz
(1)
Gilles Barthe
(2)
Hovav Shacham
(2)
Hritvik Taneja
(1)
Hunter Kippen
(2)
Iddo Bentov
(1)
Ingab Kang
(3)
Itamar Pipman
(4)
Jack Barnes
(1)
Jacob Lichtinger
(1)
Jalen Chuang
(1)
Jan Jancar
(1)
Jann Horn
(2)
Jason Kim
(7)
Jie Jeff Xu
(1)
Jo Van Bulck
(3)
Joachim Breitner
(1)
Jonas Juffinger
(1)
Jonathan Berger
(1)
Jonathan Katz
(2)
Kang G. Shin
(2)
Kevin Fu
(1)
Kevin Sam Tharayil
(1)
Koji Chida
(2)
Koki Hamada
(2)
Leon Groot Bruinderink
(1)
Lev Pachmanov
(4)
Lishay Aben Sour
(1)
Lukas Giner
(1)
Luke Valenta
(1)
Madars Virza
(2)
Marcel Böhme
(1)
Marco Guarnieri
(1)
Marina Minkin
(4)
Mark Silberstein
(2)
Matan Hamilis
(1)
Michael Fahr
(1)
Michael Riabzev
(1)
Michael Schwarz
(5)
Mihir Pattani
(1)
Mike Hamburg
(2)
Milos Prvulovic
(1)
Mingtian Tao
(1)
Monjur Alam
(1)
Mor Weiss
(2)
Moritz Lipp
(5)
Nadia Heninger
(4)
Niels Samwel
(1)
Noam Nissan
(1)
Nureddin Kamadan
(1)
Ofek Vayner
(1)
Ofir Weisse
(1)
Olaf Maennel
(1)
Paul Grubbs
(1)
Paul Kocher
(2)
Paul Montague
(1)
Peter Schwabe
(2)
Pradyumna Shome
(1)
Raoul Strackx
(1)
Ray A. Perlner
(1)
Riad S. Wahby
(1)
Riccardo Paccagnella
(2)
Robert Dumitru
(1)
Robert Gillham
(1)
Roei Schuster
(2)
Romain Poussier
(1)
Ron Magen
(1)
Rui Qi Sim
(2)
Ryo Kikuchi
(2)
S. Dov Gordon
(1)
Samuel Ranellucci
(1)
Samy Amer
(1)
Sara Rampazzi
(1)
Shaanan Cohney
(1)
Shahar Paz
(1)
Shaked Yehezkel
(1)
Shing Hing William Cheng
(1)
Sioli O'Connell
(7)
Stefan Mangard
(2)
Stephan van Schaik
(7)
Sunjay Cauligi
(2)
Takeshi Sugawara
(1)
Tanja Lange
(1)
Thinh Dang
(2)
Thomas Eisenbarth
(1)
Thomas F. Wenisch
(1)
Thomas Prescher
(2)
Thomas Unterluggauer
(1)
Thomas Yurek
(1)
Toby Murray
(1)
Walter Wang
(3)
Werner Haas
(2)
William Kosasih
(1)
Wolfgang Schoechl
(1)
Yaakov Cohen
(1)
Yang Du
(1)
Yang Su
(1)
Yehuda Lindell
(2)
Yingchen Wang
(3)
Yossi Oren
(3)
Youssef Tobah
(3)
Yuanjing Zhao
(1)
Yupeng Zhang
(2)
Yuval Elovici
(1)
Yuval Ishai
(3)
Yuval Yarom
(39)
Zhiyuan Zhang
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to