Follow
S.J.R. van Schaik
S.J.R. van Schaik
University of Michigan
Verified email at synkhronix.com - Homepage
Title
Cited by
Cited by
Year
RIDL: Rogue in-flight data load
S Van Schaik, A Milburn, S Österlund, P Frigo, G Maisuradze, K Razavi, ...
2019 IEEE Symposium on Security and Privacy (SP), 88-105, 2019
4332019
CacheOut: Leaking data on Intel CPUs via cache evictions
S Van Schaik, M Minkin, A Kwong, D Genkin, Y Yarom
2021 IEEE Symposium on Security and Privacy (SP), 339-354, 2021
1442021
SGAxe: How SGX fails in practice
S Van Schaik, A Kwong, D Genkin, Y Yarom
2020. https://sgaxe. com/files/SGAxe. pdf, 2020
1022020
Malicious management unit: Why stopping cache attacks in software is harder than you think
S Van Schaik, C Giuffrida, H Bos, K Razavi
27th USENIX Security Symposium (USENIX Security 18), 937-954, 2018
802018
RevAnC: A framework for reverse engineering hardware page table caches
S Van Schaik, K Razavi, B Gras, H Bos, C Giuffrida
Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017
33*2017
Sok: Sgx. fail: How stuff get exposed
S van Schaik, A Seto, T Yurek, A Batori, B AlBassam, C Garman, ...
102022
Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs
H Taneja, J Kim, JJ Xu, S van Schaik, D Genkin, Y Yarom
arXiv preprint arXiv:2305.12784, 2023
92023
Rogue in-flight data load
S van Schaik, A Milburn, S Osterlund, P Frigo, G Maisuradze, K Razavi, ...
IEEE SP, 2019
72019
UvA@ Work-RoCKIn@ Work camp 2014-rome, italy
S Negrijn, S van Schaik, J Haber, A Visser
Team Description Paper, Intelligent Robotics Lab, Universiteit van Amsterdam …, 2013
62013
RIDL: Rogue inflight data load
S Van Schaik, A Milburn, S Österlund, P Frigo, G Maisuradze, K Razavi, ...
2019 IEEE Symposium on Security and Privacy (SP), 88-105, 0
3
Addendum to RIDL: Rogue in-flight data load.(2019)
S van Schaik, A Milburn, S Osterlund, P Frigo, G Maisuradze, K Razavi, ...
22019
UvA@ Work customer agriculture order-mid-term report
S Negrijn, J Haber, S van Schaik, A Visser
Intelligent Robotics Lab, Universiteit van Amsterdam, Science Park 904, 1098, 2014
22014
iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices
J Kim, S van Schaik, D Genkin, Y Yarom
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
2023
Side-Channel Leakage in Cryptographic Protocols on Complex Devices Software
D Genkin, A Agarwal, I Kang, A Kwong, M Minkin, S van Schaik, ...
2022
VU Research Portal
S Van Schaik, K Razavi, B Gras, H Bos, C Giuffrida
2017
UvA@ Work Customer Agriculture Order
S Negrijn, J Haber, S van Schaik, A Visser
2014
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism
I Kang, W Wang, J Kim, S van Schaik, Y Tobah, D Genkin, A Kwong, ...
UvA@ Work Team Description Paper RoCKIn@ Work Camps 2014-Rome, Italy
S Negrijn, S van Schaik, J Haber, A Visser
The system can't perform the operation now. Try again later.
Articles 1–18