• Publications
  • Influence
The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications
tl;dr
We present a micro-architectural side-channel attack that runs entirely in the browser that allows a remote adversary to recover information belonging to other processes, users, and even virtual machines running on the same physical host with the victim web browser. Expand
  • 177
  • 21
  • Open Access
ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks
tl;dr
We develop a software-based defense, ANVIL, which thwarts all known rowhammer attacks on existing systems. Expand
  • 51
  • 17
  • Open Access
A low-resource public-key identification scheme for RFID tags and sensor nodes
tl;dr
We revisit a public key scheme presented by Shamir in [19] (and simultaneously by Naccache in [15]) and examine its applicability for general-purpose RFID tags in the supply chain. Expand
  • 62
  • 9
Algebraic Side-Channel Analysis in the Presence of Errors
tl;dr
We show how a single-trace side-channel analysis problem can be transformed into a pseudo-Boolean optimization (PBOPT) problem, which takes errors into consideration. Expand
  • 42
  • 7
  • Open Access
From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television
tl;dr
In the attempt to bring modern broadband Internet features to traditional broadcast television, the Digital Video Broadcasting (DVB) consortium introduced a specification called Hybrid Broadcast-Broadband Television (HbbTV), which allows broadcast streams to include embedded HTML content which is rendered by the television. Expand
  • 36
  • 4
  • Open Access
Factors affecting biofilm formation and biofouling in membrane distillation of seawater
Abstract This work is a study of the biofouling potential of hydrophobic membranes in direct contact membrane distillation (DCMD) with coastal seawater as a feed. The effects of temperature regime,Expand
  • 59
  • 4
WIPR Public Key Identi cation on Two Grains of Sand
tl;dr
We revisit a public key scheme presented by Shamir in [16] (and simultaneously by Naccache in [12]) and examine its applicability for general-purpose RFID tags in the supply chain. Expand
  • 23
  • 4
  • Open Access
Remote Password Extraction from RFID Tags
  • Y. Oren, A. Shamir
  • Computer Science
  • IEEE Transactions on Computers
  • 1 September 2007
tl;dr
We present a new attack on RFID tags which we call the parasitic backscatter attack. Expand
  • 71
  • 3
  • Open Access
Power Analysis of RFID Tags
  • 33
  • 3