What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Boris Köpf
Google Scholar
ORCID:
0009-0005-8004-0743
20
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/ccs
Gaussian Elimination of Side-Channels: Linear Algebra for Memory Coloring.
Jana Hofmann
Cédric Fournet
Boris Köpf
Stavros Volos
2024
conf/ccs
Principled Microarchitectural Isolation on Cloud CPUs.
Stavros Volos
Cédric Fournet
Jana Hofmann
Boris Köpf
Oleksii Oleksenko
2024
conf/uss
Closed-Form Bounds for DP-SGD against Record-level Inference.
Giovanni Cherubin
Boris Köpf
Andrew Paverd
Shruti Tople
Lukas Wutschitz
Santiago Zanella-Béguelin
2023
conf/uss
Speculation at Fault: Modeling and Testing Microarchitectural Leakage of CPU Exceptions.
Jana Hofmann
Emanuele Vannacci
Cédric Fournet
Boris Köpf
Oleksii Oleksenko
2023
conf/sp
Hide and Seek with Spectres: Efficient discovery of speculative information leaks with random testing.
Oleksii Oleksenko
Marco Guarnieri
Boris Köpf
Mark Silberstein
2023
conf/sp
SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning.
Ahmed Salem
Giovanni Cherubin
David Evans
Boris Köpf
Andrew Paverd
Anshuman Suri
Shruti Tople
Santiago Zanella-Béguelin
2021
conf/sp
Hardware-Software Contracts for Secure Speculation.
Marco Guarnieri
Boris Köpf
Jan Reineke
Pepe Vila
2020
conf/ccs
Analyzing Information Leakage of Updates to Natural Language Models.
Santiago Zanella-Béguelin
Lukas Wutschitz
Shruti Tople
Victor Rühle
Andrew Paverd
Olga Ohrimenko
Boris Köpf
Marc Brockschmidt
2020
conf/sp
Spectector: Principled Detection of Speculative Information Flows.
Marco Guarnieri
Boris Köpf
José F. Morales
Jan Reineke
Andrés Sánchez
2019
conf/sp
Theory and Practice of Finding Eviction Sets.
Pepe Vila
Boris Köpf
José F. Morales
2019
conf/eurosp
On Aggregation of Information in Timing Attacks.
Itsaka Rakotonirina
Boris Köpf
2017
conf/uss
Loophole: Timing Attacks on Shared Event Loops in Chrome.
Pepe Vila
Boris Köpf
2013
conf/uss
CacheAudit: A Tool for the Static Analysis of Cache Side Channels.
Goran Doychev
Dominik Feld
Boris Köpf
Laurent Mauborgne
Jan Reineke
2013
conf/ndss
Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
Michael Backes
Goran Doychev
Boris Köpf
2011
conf/ccs
Non-uniform distributions in quantitative information-flow.
Michael Backes
Matthias Berg
Boris Köpf
2010
conf/esorics
Speaker Recognition in Encrypted Voice Streams.
Michael Backes
Goran Doychev
Markus Dürmuth
Boris Köpf
2009
conf/sp
Automatic Discovery and Quantification of Information Leaks.
Michael Backes
Boris Köpf
Andrey Rybalchenko
2008
conf/esorics
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks.
Michael Backes
Boris Köpf
2007
conf/ccs
An information-theoretic model for adaptive side-channel attacks.
Boris Köpf
David A. Basin
2006
conf/esorics
Timing-Sensitive Information Flow Analysis for Synchronous Systems.
Boris Köpf
David A. Basin
Coauthors
Ahmed Salem
(1)
Andrés Sánchez
(1)
Andrew Paverd
(3)
Andrey Rybalchenko
(1)
Anshuman Suri
(1)
Boris Köpf
(20)
Cédric Fournet
(3)
David A. Basin
(2)
David Evans
(1)
Dominik Feld
(1)
Emanuele Vannacci
(1)
Giovanni Cherubin
(2)
Goran Doychev
(3)
Itsaka Rakotonirina
(1)
Jan Reineke
(3)
Jana Hofmann
(3)
José F. Morales
(2)
Laurent Mauborgne
(1)
Lukas Wutschitz
(2)
Marc Brockschmidt
(1)
Marco Guarnieri
(3)
Mark Silberstein
(1)
Markus Dürmuth
(1)
Matthias Berg
(1)
Michael Backes
(5)
Oleksii Oleksenko
(3)
Olga Ohrimenko
(1)
Pepe Vila
(3)
Santiago Zanella-Béguelin
(3)
Shruti Tople
(3)
Stavros Volos
(2)
Victor Rühle
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to