Onur Aciicmez
Onur Aciicmez
Samsung Research America
Verified email at samsung.com
Title
Cited by
Cited by
Year
Detecting unauthorized use of computing devices based on behavioral patterns
L Xie, X Zhang, JP Seifert, O Aciicmez, A Latifi
US Patent 8,595,834, 2013
3252013
Predicting secret keys via branch prediction
O Acıiçmez, ÇK Koç, JP Seifert
Cryptographers’ Track at the RSA Conference, 225-242, 2007
3092007
On the power of simple branch prediction analysis
O Aciiçmez, ÇK Koç, JP Seifert
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2822007
Yet another microarchitectural attack: exploiting I-cache
O Aciiçmez
Proceedings of the 2007 ACM workshop on Computer security architecture, 11-18, 2007
2592007
Cache based remote timing attack on the AES
O Acıiçmez, W Schindler, ÇK Koç
Cryptographers’ track at the RSA conference, 271-286, 2007
1902007
New results on instruction cache attacks
O Acıiçmez, BB Brumley, P Grabher
International Workshop on Cryptographic Hardware and Embedded Systems, 110-124, 2010
1892010
Trace-driven cache attacks on AES (short paper)
O Acıiçmez, ÇK Koç
International Conference on Information and Communications Security, 112-121, 2006
1882006
Hardware-software integrated approaches to defend against software cache-based side channel attacks
J Kong, O Aciiçmez, JP Seifert, H Zhou
2009 IEEE 15th International Symposium on High Performance Computer …, 2009
1182009
A vulnerability in RSA implementations due to instruction cache analysis and its demonstration on OpenSSL
O Acıiçmez, W Schindler
Cryptographers’ Track at the RSA Conference, 256-273, 2008
1112008
New branch prediction vulnerabilities in OpenSSL and necessary software countermeasures
O Acıiçmez, S Gueron, JP Seifert
IMA International Conference on Cryptography and Coding, 185-203, 2007
1062007
Deconstructing new cache designs for thwarting software cache-based side channel attacks
J Kong, O Aciicmez, JP Seifert, H Zhou
Proceedings of the 2nd ACM workshop on Computer security architectures, 25-34, 2008
992008
Securing stored content for trusted hosts and safe computing environments
X Zhang, O Aciicmez, JP Seifert, MA Qingwei
US Patent 8,782,801, 2014
962014
Cheap hardware parallelism implies cheap security
O Aciicmez, JP Seifert
Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007), 80-91, 2007
912007
A trusted mobile phone reference architecturevia secure kernel
X Zhang, O Acıiçmez, JP Seifert
Proceedings of the 2007 ACM workshop on Scalable trusted computing, 7-14, 2007
772007
Improving Brumley and Boneh timing attack on unprotected SSL implementations
O Aciiçmez, W Schindler, ÇK Koç
Proceedings of the 12th ACM conference on Computer and communications …, 2005
752005
Execution allocation cost assessment for computing systems and environments including elastic computing systems and environments
X Zhang, O Aciicmez, SJ Gibbs, A Kunjithapatham, S Jeong, D Cheng
US Patent 8,239,538, 2012
692012
Safe and efficient access control mechanisms for computing environments
X Zhang, JP Seifert, O Aciicmez, A Latifi
US Patent 8,510,805, 2013
612013
Authentication, identity, and service management for computing and communication systems
X Zhang, JP Seifert, O Aciicmez
US Patent 8,201,232, 2012
612012
An analytical model for time-driven cache attacks
K Tiri, O Acıiçmez, M Neve, F Andersen
International Workshop on Fast Software Encryption, 399-413, 2007
612007
Web application script migration
M Sheshagiri, SS Kalasapur, O Aciicmez, Y Song, D Cheng
US Patent 8,595,284, 2013
592013
The system can't perform the operation now. Try again later.
Articles 1–20