default search action
Riccardo Paccagnella
Person information
- affiliation: Carnegie Mellon University, Pittsburgh, PA, USA
- affiliation (PhD 2023): University of Illinois Urbana-Champaign, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c14]Yingchen Wang, Riccardo Paccagnella, Zhao Gang, Willy R. Vasquez, David Kohlbrenner, Hovav Shacham, Christopher W. Fletcher:
GPU.zip: On the Side-Channel Implications of Hardware-Based Graphical Data Compression. SP 2024: 3716-3734 - [c13]Boru Chen, Yingchen Wang, Pradyumna Shome, Christopher W. Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin:
GoFetch: Breaking Constant-Time Cryptographic Implementations Using Data Memory-Dependent Prefetchers. USENIX Security Symposium 2024 - [c12]Ping-Lun Wang, Riccardo Paccagnella, Riad S. Wahby, Fraser Brown:
Bending microarchitectural weird machines towards practicality. USENIX Security Symposium 2024 - 2023
- [j2]Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, David Kohlbrenner:
Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. IEEE Micro 43(4): 19-27 (2023) - [c11]Yingchen Wang, Riccardo Paccagnella, Alan Wandke, Zhao Gang, Grant Garrett-Grossman, Christopher W. Fletcher, David Kohlbrenner, Hovav Shacham:
DVFS Frequently Leaks Secrets: Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data. SP 2023: 2306-2320 - 2022
- [c10]Jose Rodrigo Sanchez Vicarte, Michael Flanders, Riccardo Paccagnella, Grant Garrett-Grossman, Adam Morrison, Christopher W. Fletcher, David Kohlbrenner:
Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest. SP 2022: 1491-1505 - [c9]Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, David Kohlbrenner:
Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86. USENIX Security Symposium 2022: 679-697 - [c8]Miles Dai, Riccardo Paccagnella, Miguel Gomez-Garcia, John D. McCalpin, Mengjia Yan:
Don't Mesh Around: Side-Channel Attacks and Mitigations on Mesh Interconnects. USENIX Security Symposium 2022: 2857-2874 - 2021
- [c7]Mohammad Behnia, Prateek Sahu, Riccardo Paccagnella, Jiyong Yu, Zirui Neil Zhao, Xiang Zou, Thomas Unterluggauer, Josep Torrellas, Carlos V. Rozas, Adam Morrison, Frank McKeen, Fangfei Liu, Ron Gabor, Christopher W. Fletcher, Abhishek Basak, Alaa R. Alameldeen:
Speculative interference attacks: breaking invisible speculation schemes. ASPLOS 2021: 1046-1060 - [c6]Dimitrios Skarlatos, Zirui Neil Zhao, Riccardo Paccagnella, Christopher W. Fletcher, Josep Torrellas:
Jamais vu: thwarting microarchitectural replay attacks. ASPLOS 2021: 1061-1076 - [c5]Riccardo Paccagnella, Licheng Luo, Christopher W. Fletcher:
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical. USENIX Security Symposium 2021: 645-662 - [i2]Riccardo Paccagnella, Licheng Luo, Christopher W. Fletcher:
Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical. CoRR abs/2103.03443 (2021) - 2020
- [c4]Jose Rodrigo Sanchez Vicarte, Benjamin Schreiber, Riccardo Paccagnella, Christopher W. Fletcher:
Game of Threads: Enabling Asynchronous Poisoning Attacks. ASPLOS 2020: 35-52 - [c3]Riccardo Paccagnella, Kevin Liao, Dave Tian, Adam Bates:
Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks. CCS 2020: 1551-1574 - [c2]Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher W. Fletcher, Andrew Miller, Dave Tian:
Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution. NDSS 2020 - [i1]Mohammad Behnia, Prateek Sahu, Riccardo Paccagnella, Jiyong Yu, Zirui Neil Zhao, Xiang Zou, Thomas Unterluggauer, Josep Torrellas, Carlos V. Rozas, Adam Morrison, Frank McKeen, Fangfei Liu, Ron Gabor, Christopher W. Fletcher, Abhishek Basak, Alaa R. Alameldeen:
Speculative Interference Attacks: Breaking Invisible Speculation Schemes. CoRR abs/2007.11818 (2020)
2010 – 2019
- 2019
- [j1]Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael D. Bailey:
Emerging Threats in Internet of Things Voice Services. IEEE Secur. Priv. 17(4): 18-24 (2019) - 2018
- [c1]Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael D. Bailey:
Skill Squatting Attacks on Amazon Alexa. USENIX Security Symposium 2018: 33-47
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-23 00:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint