Jakub Szefer
Jakub Szefer
Associate Professor of Electrical Engineering, Yale University
Verified email at - Homepage
Cited by
Cited by
Eliminating the hypervisor attack surface for a more secure cloud
J Szefer, E Keller, RB Lee, J Rexford
Proceedings of the 18th ACM conference on Computer and communications …, 2011
NoHype: virtualized cloud infrastructure without the virtualization
E Keller, J Szefer, J Rexford, RB Lee
Proceedings of the 37th annual international symposium on Computer …, 2010
Characterizing Hypervisor Vulnerabilities in Cloud Computing Servers
D Perez-Botero, J Szefer, RB Lee
Workshop on Security in Cloud Computing, 2013
Architectural support for hypervisor-secure virtualization
J Szefer, RB Lee
Proceedings of the seventeenth international conference on Architectural …, 2012
Classic McEliece: conservative code-based cryptography
DJ Bernstein, T Chou, T Lange, I von Maurich, R Misoczki, ...
NIST submissions 1 (1), 1-25, 2017
Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses
J Szefer
Cryptology ePrint Archive, 2016
Run-time Accessible DRAM PUFs in Commodity Devices
W Xiong, A Schaller, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ...
Conference on Cryptographic Hardware and Embedded Systems, 2016
Temporal Thermal Covert Channels in Cloud FPGAs
S Tian, J Szefer
Proceedings of the 2019 ACM/SIGDA International Symposium on Field …, 2019
The Future of FPGA Acceleration in Datacenters and the Cloud
C Bobda, JM Mbongue, P Chow, M Ewais, N Tarafdar, JC Vega, K Eguro, ...
ACM Transactions on Reconfigurable Technology and Systems (TRETS) 15 (3), 1-42, 2022
CAPSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage
I Giechaskiel, K Rasmussen, J Szefer
IEEE Symposium on Security and Privacy (S&P), 2020
Leaking Information Through Cache LRU States
W Xiong, J Szefer
International Symposium on High-Performance Computer Architecture (HPCA), 2020
FPGA-based Niederreiter cryptosystem using binary Goppa codes
W Wang, J Szefer, R Niederhagen
Post-Quantum Cryptography: 9th International Conference, PQCrypto 2018, Fort …, 2018
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security
A Schaller, W Xiong, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ...
Hardware Oriented Security and Trust (HOST), 2017 IEEE International …, 2017
Covert Channels Using Mobile Device’s Magnetic Field Sensors
N Matyunin, J Szefer, S Biedermann, S Katzenbeisser
21st Asia and South Pacific Design Automation Conference, 2016
Survey of Transient Execution Attacks and Their Mitigations
W Xiong, J Szefer
ACM Computing Surveys (CSUR) 54 (3), 1-36, 2021
Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs
I Giechaskiel, KB Rasmussen, J Szefer
2019 29th International Conference on Field Programmable Logic and …, 2019
Classic McEliece
MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ...
NIST Post-Quantum Cryptography Standardization Project (Round 3), https …, 2020
Decay-Based DRAM PUFs in Commodity Devices
A Schaller, W Xiong, NA Anagnostopoulos, MU Saleem, S Gabmeyer, ...
IEEE Transactions on Dependable and Secure Computing 16 (3), 462-475, 2018
XMSS and Embedded Systems: XMSS Hardware Accelerators for RISC-V
W Wang, B Jungk, J Wälde, S Deng, N Gupta, J Szefer, R Niederhagen
International Conference on Selected Areas in Cryptography, 523-550, 2019
Classic McEliece: conservative code-based cryptography
MR Albrecht, DJ Bernstein, T Chou, C Cid, J Gilcher, T Lange, V Maram, ...
NIST PQC standardization: Round 3, 2020
The system can't perform the operation now. Try again later.
Articles 1–20