RIDL: Rogue in-flight data load S Van Schaik, A Milburn, S Österlund, P Frigo, G Maisuradze, K Razavi, ... 2019 IEEE Symposium on Security and Privacy (SP), 88-105, 2019 | 405 | 2019 |
CacheOut: Leaking data on Intel CPUs via cache evictions S Van Schaik, M Minkin, A Kwong, D Genkin, Y Yarom 2021 IEEE Symposium on Security and Privacy (SP), 339-354, 2021 | 129 | 2021 |
SGAxe: How SGX fails in practice S Van Schaik, A Kwong, D Genkin, Y Yarom 2020. https://sgaxe. com/files/SGAxe. pdf, 2020 | 95 | 2020 |
Malicious management unit: Why stopping cache attacks in software is harder than you think S Van Schaik, C Giuffrida, H Bos, K Razavi 27th USENIX Security Symposium (USENIX Security 18), 937-954, 2018 | 77 | 2018 |
RevAnC: A framework for reverse engineering hardware page table caches S Van Schaik, K Razavi, B Gras, H Bos, C Giuffrida Proceedings of the 10th European Workshop on Systems Security, 1-6, 2017 | 31* | 2017 |
Sok: Sgx. fail: How stuff get exposed S van Schaik, A Seto, T Yurek, A Batori, B AlBassam, C Garman, ... | 9 | 2022 |
Rogue in-flight data load S van Schaik, A Milburn, S Osterlund, P Frigo, G Maisuradze, K Razavi, ... IEEE SP, 2019 | 7 | 2019 |
UvA@ Work-RoCKIn@ Work camp 2014-rome, italy S Negrijn, S van Schaik, J Haber, A Visser Team Description Paper, Intelligent Robotics Lab, Universiteit van Amsterdam …, 2013 | 6 | 2013 |
Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs H Taneja, J Kim, JJ Xu, S van Schaik, D Genkin, Y Yarom arXiv preprint arXiv:2305.12784, 2023 | 4 | 2023 |
RIDL: Rogue inflight data load S Van Schaik, A Milburn, S Österlund, P Frigo, G Maisuradze, K Razavi, ... 2019 IEEE Symposium on Security and Privacy (SP), 88-105, 0 | 3 | |
Addendum to RIDL: Rogue in-flight data load.(2019) S van Schaik, A Milburn, S Osterlund, P Frigo, G Maisuradze, K Razavi, ... | 2 | 2019 |
UvA@ Work customer agriculture order-mid-term report S Negrijn, J Haber, S van Schaik, A Visser Intelligent Robotics Lab, Universiteit van Amsterdam, Science Park 904, 1098, 2014 | 2 | 2014 |
iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices J Kim, S van Schaik, D Genkin, Y Yarom Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | | 2023 |
Side-Channel Leakage in Cryptographic Protocols on Complex Devices Software D Genkin, A Agarwal, I Kang, A Kwong, M Minkin, S van Schaik, ... | | 2022 |
UvA@ Work Customer Agriculture Order S Negrijn, J Haber, S van Schaik, A Visser | | 2014 |
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism I Kang, W Wang, J Kim, S van Schaik, Y Tobah, D Genkin, A Kwong, ... | | |
UvA@ Work Team Description Paper RoCKIn@ Work Camps 2014-Rome, Italy S Negrijn, S van Schaik, J Haber, A Visser | | |