David Kohlbrenner
David Kohlbrenner
Verified email at - Homepage
Cited by
Cited by
Keystone: An open framework for architecting trusted execution environments
D Lee, D Kohlbrenner, S Shinde, K Asanović, D Song
Proceedings of the Fifteenth European Conference on Computer Systems, 1-16, 2020
On subnormal floating point and abnormal timing
M Andrysco, D Kohlbrenner, K Mowery, R Jhala, S Lerner, H Shacham
2015 IEEE Symposium on Security and Privacy, 623-639, 2015
{Prime+ Abort}: A {Timer-Free}{High-Precision} L3 Cache Attack using Intel {TSX}
C Disselkoen, D Kohlbrenner, L Porter, D Tullsen
26th USENIX Security Symposium (USENIX Security 17), 51-67, 2017
Trusted browsers for uncertain times
D Kohlbrenner, H Shacham
25th USENIX Security Symposium (USENIX Security 16), 463-480, 2016
Welcome to the Entropics: Boot-time entropy in embedded devices
K Mowery, M Wei, D Kohlbrenner, H Shacham, S Swanson
2013 IEEE Symposium on Security and Privacy, 589-603, 2013
On the effectiveness of mitigations against floating-point timing channels
D Kohlbrenner, H Shacham
26th USENIX Security Symposium (USENIX Security 17), 69-81, 2017
Opening pandora’s box: A systematic study of new ways microarchitecture can leak private data
JRS Vicarte, P Shome, N Nayak, C Trippel, A Morrison, D Kohlbrenner, ...
2021 ACM/IEEE 48th Annual International Symposium on Computer Architecture …, 2021
Sanctorum: A lightweight security monitor for secure enclaves
I Lebedev, K Hogan, J Drean, D Kohlbrenner, D Lee, K Asanović, D Song, ...
2019 Design, Automation & Test in Europe Conference & Exhibition (DATE …, 2019
Keystone: Open-source secure hardware enclave
D Lee, D Kohlbrenner, S Shinde, K Asanovic, D Song, I Lebedev, ...
English, 2019
Verifying RISC-V physical memory protection
K Cheang, C Rasmussen, D Lee, DW Kohlbrenner, K Asanovic, ...
IEEE International Symposium on Performance Analysis of Systems and Software …, 2020
Building Open Trusted Execution Environments
D Kohlbrenner, S Shinde, D Lee, K Asanovic, D Song
IEEE Security & Privacy 18 (5), 47-56, 2020
Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86
Y Wang, R Paccagnella, ET He, H Shacham, CW Fletcher, D Kohlbrenner
Proceedings of the USENIX Security Symposium (USENIX), 2022
Augury: Using data memory-dependent prefetchers to leak data at rest
JRS Vicarte, M Flanders, R Paccagnella, G Garrett-Grossman, A Morrison, ...
2022 IEEE Symposium on Security and Privacy (SP), 1491-1505, 2022
Humans and Vulnerability During Times of Change: Computer Security Needs, Practices, Challenges, and Opportunities
L Simko
Disrupting Machine Learning: Emerging Threats and Applications for Privacy and Dataset Ownership
I Evtimov
University of Washington, 2021
Shweta Shinde
S Shinde, S Wang, P Yuan, A Hobor, A Roychoudhury, P Saxena, D Lee, ...
Proceedings of the 29th USENIX Security Symposium (USENIX), 2020
Trusted Systems for Uncertain Times
DW Kohlbrenner
University of California, San Diego, 2018
Journal: Proceedings of the Fifteenth European Conference on Computer Systems, 2020
D Lee, D Kohlbrenner, S Shinde, K Asanović, D Song
Software-Based Off-Chip Memory Protection for RISC-V Trusted Execution Environments
G Andrade, D Lee, D Kohlbrenner, K Asanović, D Song
The system can't perform the operation now. Try again later.
Articles 1–19