default search action
David Kohlbrenner
Person information
- affiliation: University of Washington, Seattle, WA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c16]Michael Flanders, Reshabh K. Sharma, Alexandra E. Michael, Dan Grossman, David Kohlbrenner:
Avoiding Instruction-Centric Microarchitectural Timing Channels Via Binary-Code Transformations. ASPLOS (2) 2024: 120-136 - [c15]Colin Drewes, Olivia Weng, Andres Meza, Alric Althoff, David Kohlbrenner, Ryan Kastner, Dustin Richmond:
Pentimento: Data Remanence in Cloud FPGAs. ASPLOS (2) 2024: 862-878 - [c14]Yingchen Wang, Riccardo Paccagnella, Zhao Gang, Willy R. Vasquez, David Kohlbrenner, Hovav Shacham, Christopher W. Fletcher:
GPU.zip: On the Side-Channel Implications of Hardware-Based Graphical Data Compression. SP 2024: 3716-3734 - [c13]Boru Chen, Yingchen Wang, Pradyumna Shome, Christopher W. Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin:
GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers. USENIX Security Symposium 2024 - 2023
- [j2]Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, David Kohlbrenner:
Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. IEEE Micro 43(4): 19-27 (2023) - [c12]Yingchen Wang, Riccardo Paccagnella, Alan Wandke, Zhao Gang, Grant Garrett-Grossman, Christopher W. Fletcher, David Kohlbrenner, Hovav Shacham:
DVFS Frequently Leaks Secrets: Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data. SP 2023: 2306-2320 - [c11]Jiyong Yu, Aishani Dutta, Trent Jaeger, David Kohlbrenner, Christopher W. Fletcher:
Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions. USENIX Security Symposium 2023: 1973-1990 - [i6]Colin Drewes, Olivia Weng, Andres Meza, Alric Althoff, David Kohlbrenner, Ryan Kastner, Dustin Richmond:
Pentimento: Data Remanence in Cloud FPGAs. CoRR abs/2303.17881 (2023) - [i5]Christopher W. Fletcher, Marco Guarnieri, David Kohlbrenner, Clémentine Maurice:
MAD: Microarchitectural Attacks and Defenses (Dagstuhl Seminar 23481). Dagstuhl Reports 13(11): 151-166 (2023) - 2022
- [c10]Jose Rodrigo Sanchez Vicarte, Michael Flanders, Riccardo Paccagnella, Grant Garrett-Grossman, Adam Morrison, Christopher W. Fletcher, David Kohlbrenner:
Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest. SP 2022: 1491-1505 - [c9]Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, David Kohlbrenner:
Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. USENIX Security Symposium 2022: 679-697 - [i4]Kevin Cheang, Cameron Rasmussen, Dayeol Lee, David W. Kohlbrenner, Krste Asanovic, Sanjit A. Seshia:
Verifying RISC-V Physical Memory Protection. CoRR abs/2211.02179 (2022) - 2021
- [c8]Jose Rodrigo Sanchez Vicarte, Pradyumna Shome, Nandeeka Nayak, Caroline Trippel, Adam Morrison, David Kohlbrenner, Christopher W. Fletcher:
Opening Pandora's Box: A Systematic Study of New Ways Microarchitecture Can Leak Private Data. ISCA 2021: 347-360 - 2020
- [j1]David Kohlbrenner, Shweta Shinde, Dayeol Lee, Krste Asanovic, Dawn Song:
Building Open Trusted Execution Environments. IEEE Secur. Priv. 18(5): 47-56 (2020) - [c7]Dayeol Lee, David Kohlbrenner, Shweta Shinde, Krste Asanovic, Dawn Song:
Keystone: an open framework for architecting trusted execution environments. EuroSys 2020: 38:1-38:16
2010 – 2019
- 2019
- [c6]Ilia A. Lebedev, Kyle Hogan, Jules Drean, David Kohlbrenner, Dayeol Lee, Krste Asanovic, Dawn Song, Srinivas Devadas:
Sanctorum: A lightweight security monitor for secure enclaves. DATE 2019: 1142-1147 - [i3]Dayeol Lee, David Kohlbrenner, Shweta Shinde, Dawn Song, Krste Asanovic:
Keystone: A Framework for Architecting TEEs. CoRR abs/1907.10119 (2019) - [i2]Ilia A. Lebedev, Kyle Hogan, Jules Drean, David Kohlbrenner, Dayeol Lee, Krste Asanovic, Dawn Song, Srinivas Devadas:
Sanctorum: A lightweight security monitor for secure enclaves. IACR Cryptol. ePrint Arch. 2019: 1 (2019) - 2018
- [b1]David Kohlbrenner:
Trusted Systems for Uncertain Times. University of California, San Diego, USA, 2018 - [i1]Ilia A. Lebedev, Kyle Hogan, Jules Drean, David Kohlbrenner, Dayeol Lee, Krste Asanovic, Dawn Song, Srinivas Devadas:
Sanctorum: A lightweight security monitor for secure enclaves. CoRR abs/1812.10605 (2018) - 2017
- [c5]Craig Disselkoen, David Kohlbrenner, Leo Porter, Dean M. Tullsen:
Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX. USENIX Security Symposium 2017: 51-67 - [c4]David Kohlbrenner, Hovav Shacham:
On the effectiveness of mitigations against floating-point timing channels. USENIX Security Symposium 2017: 69-81 - 2016
- [c3]David Kohlbrenner, Hovav Shacham:
Trusted Browsers for Uncertain Times. USENIX Security Symposium 2016: 463-480 - 2015
- [c2]Marc Andrysco, David Kohlbrenner, Keaton Mowery, Ranjit Jhala, Sorin Lerner, Hovav Shacham:
On Subnormal Floating Point and Abnormal Timing. IEEE Symposium on Security and Privacy 2015: 623-639 - 2013
- [c1]Keaton Mowery, Michael Yung Chung Wei, David Kohlbrenner, Hovav Shacham, Steven Swanson:
Welcome to the Entropics: Boot-Time Entropy in Embedded Devices. IEEE Symposium on Security and Privacy 2013: 589-603
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-23 00:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint