Sunar, Berk
73  results:
Search for persons X
?
1

Mayhem: Targeted Corruption of Register and Stack Variables:

, In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security,
 
?
2

Analysis of EM Fault Injection on Bit-sliced Number Theoret..:

Singh, Richa ; Islam, Saad ; Sunar, Berk.
ACM Transactions on Embedded Computing Systems.  23 (2024)  2 - p. 1-27 , 2024
 
?
3

Don't Knock! Rowhammer at the Backdoor of DNN Models:

, In: 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
Tol, M. Caner ; Islam, Saad ; Adiletta, Andrew J... - p. 109-122 , 2023
 
?
4

Microarchitectural Vulnerabilities Introduced, Exploited, a..:

, In: Security of FPGA-Accelerated Cloud Computing Environments,
 
?
5

IOTLB-SC: An Accelerator-Independent Leakage Source in Mode..:

, In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security,
 
?
6

Jolt: Recovering TLS Signing Keys via Rowhammer Faults:

, In: 2023 IEEE Symposium on Security and Privacy (SP),
Mus, Koksal ; Doroz, Yarkin ; Tol, M. Caner.. - p. 1719-1736 , 2023
 
?
7

Signature Correction Attack on Dilithium Signature Scheme:

, In: 2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P),
Islam, Saad ; Mus, Koksal ; Singh, Richa.. - p. 647-663 , 2022
 
?
8

FastSpec: Scalable Generation and Detection of Spectre Gadg..:

, In: 2021 IEEE European Symposium on Security and Privacy (EuroS&P),
 
?
9

Homomorphic Sorting With Better Scalability:

Cetin, Gizem S. ; Savas, Erkay ; Sunar, Berk
IEEE Transactions on Parallel and Distributed Systems.  32 (2021)  4 - p. 760-771 , 2021
 
?
10

Flattening NTRU for Evaluation Key Free Homomorphic Encrypt..:

Doröz, Yarkın ; Sunar, Berk
Journal of Mathematical Cryptology.  14 (2020)  1 - p. 66-83 , 2020
 
?
11

QuantumHammer : A Practical Hybrid Attack on the LUOV Si..:

, In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security,
Mus, Koksal ; Islam, Saad ; Sunar, Berk - p. 1071-1084 , 2020
 
?
12

JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU P..:

Weissman, Zane ; Tiemann, Thore ; Moghimi, Daniel...
IACR Transactions on Cryptographic Hardware and Embedded Systems.  , 2020
 
?
13

LVI: Hijacking Transient Execution through Microarchitectur..:

, In: 2020 IEEE Symposium on Security and Privacy (SP),
 
?
14

DeepCloak: Adversarial Crafting As a Defensive Measure to C..:

, In: 2019 Workshop on DYnamic and Novel Advances in Machine learning and Intelligent Cyber Security,
 
?
15

Undermining User Privacy on Mobile Devices Using AI:

, In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security,
Gulmezoglu, Berk ; Zankl, Andreas ; Tol, M. Caner... - p. 214-227 , 2019
 
1-15