default search action
Jakub Szefer
Person information
- affiliation: Yale University, New Haven, CT, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2018
- [b1]Jakub Szefer:
Principles of Secure Processor Architecture Design. Synthesis Lectures on Computer Architecture, Morgan & Claypool Publishers 2018, ISBN 978-3-031-00632-6
Journal Articles
- 2024
- [j24]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Designing Secure TLBs. IEEE Des. Test 41(2): 39-46 (2024) - [j23]Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue:
SDitH in Hardware. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 215-251 (2024) - [j22]Ferhat Erata, Chuanqi Xu, Ruzica Piskac, Jakub Szefer:
Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 735-768 (2024) - [j21]Theodoros Trochatos, Anthony Etim, Jakub Szefer:
Covert-channels in FPGA-enabled SmartSSDs. ACM Trans. Reconfigurable Technol. Syst. 17(2): 27:1-27:23 (2024) - 2023
- [j20]Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding, Jakub Szefer:
A Quantum Computer Trusted Execution Environment. IEEE Comput. Archit. Lett. 22(2): 177-180 (2023) - [j19]Ferhat Erata, Shuwen Deng, Faisal Zaghloul, Wenjie Xiong, Onur Demir, Jakub Szefer:
Survey of Approaches and Techniques for Security Verification of Computer Systems. ACM J. Emerg. Technol. Comput. Syst. 19(1): 6:1-6:34 (2023) - [j18]Ferhat Erata, Eren Yildiz, Arda Goknil, Kasim Sinan Yildirim, Jakub Szefer, Ruzica Piskac, Gökçin Sezgin:
ETAP: Energy-aware Timing Analysis of Intermittent Programs. ACM Trans. Embed. Comput. Syst. 22(2): 23:1-23:31 (2023) - [j17]Florian Frank, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, André Schaller, Tolga Arul, Farinaz Koushanfar, Stefan Katzenbeisser, Ulrich Rührmair, Jakub Szefer:
Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature. IEEE Trans. Inf. Forensics Secur. 18: 2991-3005 (2023) - [j16]Ilias Giechaskiel, Shanquan Tian, Jakub Szefer:
Cross-VM Covert- and Side-Channel Attacks in Cloud FPGAs. ACM Trans. Reconfigurable Technol. Syst. 16(1): 6:1-6:29 (2023) - 2022
- [j15]Wenjie Xiong, Jakub Szefer:
Survey of Transient Execution Attacks and Their Mitigations. ACM Comput. Surv. 54(3): 54:1-54:36 (2022) - [j14]Shuwen Deng, Nikolay Matyunin, Wenjie Xiong, Stefan Katzenbeisser, Jakub Szefer:
Evaluation of Cache Attacks on Arm Processors and Secure Caches. IEEE Trans. Computers 71(9): 2248-2262 (2022) - [j13]Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang:
Complete and Improved FPGA Implementation of Classic McEliece. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3): 71-113 (2022) - [j12]Christophe Bobda, Joel Mandebi Mbongue, Paul Chow, Mohammad Ewais, Naif Tarafdar, Juan Camilo Vega, Ken Eguro, Dirk Koch, Suranga Handagala, Miriam Leeser, Martin C. Herbordt, Hafsah Shahzad, H. Peter Hofstee, Burkhard Ringlein, Jakub Szefer, Ahmed Sanaullah, Russell Tessier:
The Future of FPGA Acceleration in Datacenters and the Cloud. ACM Trans. Reconfigurable Technol. Syst. 15(3): 34:1-34:42 (2022) - 2021
- [j11]Wenjie Xiong, André Schaller, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
DRAM PUFs in Commodity Devices. IEEE Des. Test 38(3): 76-83 (2021) - [j10]Shayan Moini, Shanquan Tian, Daniel E. Holcomb, Jakub Szefer, Russell Tessier:
Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs. IEEE J. Emerg. Sel. Topics Circuits Syst. 11(2): 357-370 (2021) - [j9]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Understanding the Insecurity of Processor Caches Due to Cache Timing-Based Vulnerabilities. IEEE Secur. Priv. 19(3): 42-49 (2021) - [j8]Wenjie Xiong, Stefan Katzenbeisser, Jakub Szefer:
Leaking Information Through Cache LRU States in Commercial Processors and Secure Caches. IEEE Trans. Computers 70(4): 511-523 (2021) - 2020
- [j7]Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer:
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 269-306 (2020) - [j6]Wenjie Xiong, André Schaller, Stefan Katzenbeisser, Jakub Szefer:
Software Protection Using Dynamic PUFs. IEEE Trans. Inf. Forensics Secur. 15: 2053-2068 (2020) - 2019
- [j5]Sebastian Lins, Stephan Schneider, Jakub Szefer, Shafeeq Ibraheem, Ali Sunyaev:
Designing Monitoring Systems for Continuous Certification of Cloud Services: Deriving Meta-requirements and Design Guidelines. Commun. Assoc. Inf. Syst. 44: 25 (2019) - [j4]Jakub Szefer:
Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses. J. Hardw. Syst. Secur. 3(3): 219-234 (2019) - [j3]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Analysis of Secure Caches Using a Three-Step Model for Timing-Based Attacks. J. Hardw. Syst. Secur. 3(4): 397-425 (2019) - [j2]André Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Boris Skoric, Stefan Katzenbeisser, Jakub Szefer:
Decay-Based DRAM PUFs in Commodity Devices. IEEE Trans. Dependable Secur. Comput. 16(3): 462-475 (2019) - 2018
- [j1]Nikolaos Athanasios Anagnostopoulos, Tolga Arul, Yufan Fan, Christian Hatzfeld, André Schaller, Wenjie Xiong, Manishkumar Jain, Muhammad Umair Saleem, Jan Lotichius, Sebastian Gabmeyer, Jakub Szefer, Stefan Katzenbeisser:
Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security †. Cryptogr. 2(3): 13 (2018)
Conference and Workshop Papers
- 2024
- [c82]Chuanqi Xu, Jamie Sikora, Jakub Szefer:
A Thorough Study of State Leakage Mitigation in Quantum Computing with One-Time Pad. HOST 2024: 55-65 - [c81]Theodoros Trochatos, Sanjay Deshpande, Chuanqi Xu, Yao Lu, Yongshan Ding, Jakub Szefer:
Dynamic Pulse Switching for Protection of Quantum Computation on Untrusted Clouds. HOST 2024: 404-414 - [c80]Jessie Chen, Jakub Szefer:
All Your Base Are Belong To Us: Stealing VRP Secrets from Quantum Circuit Structures. HOST 2024: 415-419 - [c79]Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding, Jakub Szefer:
A Quantum Computer Trusted Execution Environment. HPCA 2024: 613 - 2023
- [c78]Chuanqi Xu, Jakub Szefer:
Long-Term Analysis of the Dependability of Cloud-based NISQ Quantum Computers. ARES 2023: 32:1-32:6 - [c77]Chuanqi Xu, Ferhat Erata, Jakub Szefer:
Exploration of Power Side-Channel Vulnerabilities in Quantum Computer Controllers. CCS 2023: 579-593 - [c76]Chuanqi Xu, Jessie Chen, Allen Mi, Jakub Szefer:
Securing NISQ Quantum Computer Reset Operations Against Higher Energy State Attacks. CCS 2023: 594-607 - [c75]Shanquan Tian, Shayan Moini, Daniel E. Holcomb, Russell Tessier, Jakub Szefer:
A Practical Remote Power Attack on Machine Learning Accelerators in Cloud FPGAs. DATE 2023: 1-6 - [c74]Ferhat Erata, Ruzica Piskac, Víctor Mateu, Jakub Szefer:
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code. EuroS&P 2023: 687-706 - [c73]Theodoros Trochatos, Anthony Etim, Jakub Szefer:
Covert-channels in FPGA-enabled SmartSSDs. ICFPT 2023: 2 - [c72]Jalil Morris, Anisul Abedin, Chuanqi Xu, Jakub Szefer:
Fingerprinting Quantum Computer Equipment. ACM Great Lakes Symposium on VLSI 2023: 117-123 - [c71]Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Hanrui Wang, Ferhat Erata, Song Han, Yongshan Ding, Jakub Szefer:
Design of Quantum Computer Antivirus. HOST 2023: 260-270 - [c70]Kaitlin N. Smith, Joshua Viszlai, Lennart Maximilian Seifert, Jonathan M. Baker, Jakub Szefer, Frederic T. Chong:
Fast Fingerprinting of Cloud-based NISQ Quantum Computers. HOST 2023: 271-282 - [c69]Sanjay Deshpande, Chuanqi Xu, Mamuri Nawan, Kashif Nawaz, Jakub Szefer:
Fast and Efficient Hardware Implementation of HQC. SAC 2023: 297-321 - 2022
- [c68]Allen Mi, Shuwen Deng, Jakub Szefer:
Securing Reset Operations in NISQ Quantum Computers. CCS 2022: 2279-2293 - [c67]Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Yongshan Ding, Jakub Szefer:
Towards an Antivirus for Quantum Computers. HOST 2022: 37-40 - [c66]Shuwen Deng, Bowen Huang, Jakub Szefer:
Leaky Frontends: Security Vulnerabilities in Processor Frontends. HPCA 2022: 53-66 - 2021
- [c65]Jonathon Durand, Anisul Abedin, Jakub Szefer:
Ultra Freezing Attacks and Clock Glitching of Clock Oscillator Circuits. AsianHOST 2021: 1-6 - [c64]Patrick Longa, Wen Wang, Jakub Szefer:
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3. CRYPTO (3) 2021: 402-431 - [c63]Shuwen Deng, Jakub Szefer:
New Predictor-Based Attacks in Processors. DAC 2021: 697-702 - [c62]Shayan Moini, Shanquan Tian, Daniel E. Holcomb, Jakub Szefer, Russell Tessier:
Remote Power Side-Channel Attacks on BNN Accelerators in FPGAs. DATE 2021: 1639-1644 - [c61]Obi Nnorom, Jalil Morris, Ilias Giechaskiel, Jakub Szefer:
Chill Out: Freezing Attacks on Capacitors and DC/DC Converters. ETS 2021: 1-2 - [c60]Shanquan Tian, Ilias Giechaskiel, Wenjie Xiong, Jakub Szefer:
Cloud FPGA Cartography using PCIe Contention. FCCM 2021: 224-232 - [c59]Shanquan Tian, Shayan Moini, Adam Wolnikowski, Daniel E. Holcomb, Russell Tessier, Jakub Szefer:
Remote Power Attacks on the Versatile Tensor Accelerator in Multi-Tenant FPGAs. FCCM 2021: 242-246 - [c58]Sanjay Deshpande, Santos Merino Del Pozo, Víctor Mateu, Marc Manzano, Najwa Aaraj, Jakub Szefer:
Modular Inverse for Integers using Fast Constant Time GCD Algorithm and its Applications. FPL 2021: 122-129 - [c57]Julia Burgiel, Daniel E. Holcomb, Ilias Giechaskiel, Shanquan Tian, Jakub Szefer:
Characterization of IOBUF-based Ring Oscillators. FPT 2021: 1-4 - [c56]Ilias Giechaskiel, Shanquan Tian, Jakub Szefer:
Cross-VM Information Leaks in FPGA-Accelerated Cloud Environments. HOST 2021: 91-101 - [c55]Tianwei Zhang, Jakub Szefer, Ruby B. Lee:
Practical and Scalable Security Verification of Secure Architectures. HASP@MICRO 2021: 2:1-2:9 - [c54]Allen Mi, Shuwen Deng, Jakub Szefer:
Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers. HASP@MICRO 2021: 7:1-7:6 - [c53]Jalil Morris, Obi Nnorom, Anisul Abedin, Ferhat Erata, Jakub Szefer:
Deep Freezing Attacks on Capacitors and Electronic Circuits. SPACE 2021: 188-203 - 2020
- [c52]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
A Benchmark Suite for Evaluating Caches' Vulnerability to Timing Attacks. ASPLOS 2020: 683-697 - [c51]Jakub Szefer:
Thermal and Voltage Side and Covert Channels and Attacks in Cloud FPGAs. FPGA 2020: 22 - [c50]Shanquan Tian, Wenjie Xiong, Ilias Giechaskiel, Kasper Rasmussen, Jakub Szefer:
Fingerprinting Cloud FPGA Infrastructures. FPGA 2020: 58-64 - [c49]Changsu Kim, Yongwoo Lee, Shinnung Jeong, Wen Wang, Jakub Szefer, Hanjun Kim:
Pipeline-aware Logic Deduplication in High-Level Synthesis for Post-Quantum Cryptography Algorithms. FPGA 2020: 310 - [c48]Wenjie Xiong, Jakub Szefer:
Leaking Information Through Cache LRU States. HPCA 2020: 139-152 - [c47]Ilias Giechaskiel, Jakub Szefer:
Information Leakage from FPGA Routing and Logic Elements. ICCAD 2020: 63:1-63:9 - [c46]Prashanth Mohan, Wen Wang, Bernhard Jungk, Ruben Niederhagen, Jakub Szefer, Ken Mai:
ASIC Accelerator in 28 nm for the Post-Quantum Digital Signature Scheme XMSS. ICCD 2020: 656-662 - [c45]Shanquan Tian, Andrew Krzywosz, Ilias Giechaskiel, Jakub Szefer:
Cloud FPGA Security with RO-Based Primitives. FPT 2020: 154-158 - [c44]Ilias Giechaskiel, Kasper Bonne Rasmussen, Jakub Szefer:
C3APSULe: Cross-FPGA Covert-Channel Attacks through Power Supply Unit Leakage. SP 2020: 1728-1741 - 2019
- [c43]Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, André Schaller, Stefan Katzenbeisser, Jakub Szefer:
Spying on Temperature using DRAM. DATE 2019: 13-18 - [c42]Shanquan Tian, Jakub Szefer:
Temporal Thermal Covert Channels in Cloud FPGAs. FPGA 2019: 298-303 - [c41]Ilias Giechaskiel, Kasper Bonne Rasmussen, Jakub Szefer:
Measuring Long Wire Leakage with Ring Oscillators in Cloud FPGAs. FPL 2019: 45-50 - [c40]Wenjie Xiong, André Schaller, Stefan Katzenbeisser, Jakub Szefer:
Dynamic Physically Unclonable Functions. ACM Great Lakes Symposium on VLSI 2019: 311-314 - [c39]Ilias Giechaskiel, Kasper Rasmussen, Jakub Szefer:
Reading Between the Dies: Cross-SLR Covert Channels on Multi-Tenant Cloud FPGAs. ICCD 2019: 1-10 - [c38]Shanquan Tian, Wen Wang, Jakub Szefer:
Merge-Exchange Sort Based Discrete Gaussian Sampler with Fixed Memory Access Pattern. FPT 2019: 126-134 - [c37]Shuwen Deng, Doguhan Gümüsoglu, Wenjie Xiong, Sercan Sari, Y. Serhan Gener, Corine Lu, Onur Demir, Jakub Szefer:
SecChisel Framework for Security Verification of Secure Processor Architectures. HASP@ISCA 2019: 7:1-7:8 - [c36]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Secure TLBs. ISCA 2019: 346-359 - [c35]Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, Ruben Niederhagen:
XMSS and Embedded Systems. SAC 2019: 523-550 - [c34]Shuai Chen, Wenjie Xiong, Yehan Xu, Bing Li, Jakub Szefer:
Thermal Covert Channels Leveraging Package-on-Package DRAM. TrustCom/BigDataSE 2019: 319-326 - [c33]Nikolay Matyunin, Yujue Wang, Tolga Arul, Kristian Kullmann, Jakub Szefer, Stefan Katzenbeisser:
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting. WPES@CCS 2019: 135-149 - 2018
- [c32]Wen Wang, Jakub Szefer, Ruben Niederhagen:
Post-Quantum Cryptography on FPGAs: The Niederreiter Cryptosystem: Extended Abstract. ACM Great Lakes Symposium on VLSI 2018: 371 - [c31]Nikolay Matyunin, Jakub Szefer, Stefan Katzenbeisser:
Zero-permission acoustic cross-device tracking. HOST 2018: 25-32 - [c30]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Cache timing side-channel vulnerability checking with computation tree logic. HASP@ISCA 2018: 2:1-2:8 - [c29]Wen Wang, Jakub Szefer, Ruben Niederhagen:
FPGA-Based Niederreiter Cryptosystem Using Binary Goppa Codes. PQCrypto 2018: 77-98 - 2017
- [c28]Wen Wang, Jakub Szefer, Ruben Niederhagen:
FPGA-based Key Generator for the Niederreiter Cryptosystem Using Binary Goppa Codes. CHES 2017: 253-274 - [c27]André Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer effect for improved security. HOST 2017: 1-7 - 2016
- [c26]Nikolay Matyunin, Jakub Szefer, Sebastian Biedermann, Stefan Katzenbeisser:
Covert channels using mobile device's magnetic field sensors. ASP-DAC 2016: 525-532 - [c25]Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Run-Time Accessible DRAM PUFs in Commodity Devices. CHES 2016: 432-453 - [c24]Ji-Yong Shin, Mahesh Balakrishnan, Tudor Marian, Jakub Szefer, Hakim Weatherspoon:
Towards Weakly Consistent Local Storage Systems. SoCC 2016: 294-306 - [c23]Sumedh Guha, Wen Wang, Shafeeq Ibraheem, Mahesh Balakrishnan, Jakub Szefer:
Design and implementation of open-source SATA III core for Stratix V FPGAs. FPT 2016: 237-240 - [c22]Wen Wang, Jakub Szefer, Ruben Niederhagen:
Solving large systems of linear equations over GF(2) on FPGAs. ReConFig 2016: 1-7 - 2015
- [c21]Jakub Szefer:
Leveraging Processor Performance Counters for Security and Performance. TrustED@CCS 2015: 41 - [c20]Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer:
Hard Drive Side-Channel Attacks Using Smartphone Magnetic Field Sensors. Financial Cryptography 2015: 489-496 - [c19]Junaid Nomani, Jakub Szefer:
Predicting program phases and defending against side-channel attacks using hardware performance counters. HASP@ISCA 2015: 9:1-9:4 - 2014
- [c18]Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer:
Hot-hardening: getting more out of your security settings. ACSAC 2014: 6-15 - [c17]Sebastian Jeuk, Jakub Szefer, Shi Zhou:
Towards Cloud, Service and Tenant Classification for Cloud Computing. CCGRID 2014: 792-801 - [c16]Jakub Szefer, Pramod A. Jamkhedkar, Diego Perez-Botero, Ruby B. Lee:
Cyber defenses for physical attacks and insider threats in cloud computing. AsiaCCS 2014: 519-524 - [c15]Sebastian Biedermann, Stefan Katzenbeisser, Jakub Szefer:
Leveraging Virtual Machine Introspection for Hot-Hardening of Arbitrary Cloud-User Applications. HotCloud 2014 - [c14]Jakub Szefer, Sebastian Biedermann:
Towards fast hardware memory integrity checking with skewed Merkle trees. HASP@ISCA 2014: 9:1-9:8 - [c13]Sebastian Biedermann, Jakub Szefer:
SystemWall: An Isolated Firewall Using Hardware-Based Memory Introspection. ISC 2014: 273-290 - 2013
- [c12]Jakub Szefer, Ruby B. Lee:
BitDeposit: Deterring Attacks and Abuses of Cloud Computing Services through Economic Measures. CCGRID 2013: 630-635 - [c11]Diego Perez-Botero, Jakub Szefer, Ruby B. Lee:
Characterizing hypervisor vulnerabilities in cloud computing servers. SCC@ASIACCS 2013: 3-10 - [c10]Pramod A. Jamkhedkar, Jakub Szefer, Diego Perez-Botero, Tianwei Zhang, Gina Triolo, Ruby B. Lee:
A Framework for Realizing Security on Demand in Cloud Computing. CloudCom (1) 2013: 371-378 - 2012
- [c9]Jakub Szefer, Ruby B. Lee:
Architectural support for hypervisor-secure virtualization. ASPLOS 2012: 437-450 - [c8]Jakub Szefer, Pramod A. Jamkhedkar, Yu-Yuan Chen, Ruby B. Lee:
Physical attack protection with human-secure virtualization in data centers. DSN Workshops 2012: 1-6 - [c7]Tianwei Zhang, Jakub Szefer, Ruby B. Lee:
Security verification of hardware-enabled attestation protocols. MICRO Workshops 2012: 47-54 - 2011
- [c6]Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer Rexford:
Eliminating the hypervisor attack surface for a more secure cloud. CCS 2011: 401-412 - [c5]Jakub Szefer, Ruby B. Lee:
A Case for Hardware Protection of Guest VMs from Compromised Hypervisors in Cloud Computing. ICDCS Workshops 2011: 248-252 - [c4]Jakub Szefer, Wei Zhang, Yu-Yuan Chen, David Champagne, King Chan, Will X. Y. Li, Ray C. C. Cheung, Ruby B. Lee:
Rapid single-chip secure processor prototyping on the OpenSPARC FPGA platform. International Symposium on Rapid System Prototyping 2011: 38-44 - 2010
- [c3]Jakub Szefer, Yu-Yuan Chen, Ruby B. Lee:
General-purpose FPGA platform for efficient encryption and hashing. ASAP 2010: 309-312 - [c2]Eric Keller, Jakub Szefer, Jennifer Rexford, Ruby B. Lee:
NoHype: virtualized cloud infrastructure without the virtualization. ISCA 2010: 350-361 - 2009
- [c1]Chun Hok Ho, Wayne Luk, Jakub Szefer, Ruby B. Lee:
Tuning instruction customisation for reconfigurable system-on-chip. SoCC 2009: 61-64
Parts in Books or Collections
- 2014
- [p1]Jakub Szefer, Ruby B. Lee:
Hardware-Enhanced Security for Cloud Computing. Secure Cloud Computing 2014: 57-76
Editorship
- 2020
- [e3]Jakub Szefer, Weidong Shi, Ruby B. Lee:
HASP@MICRO 2020: Hardware and Architectural Support for Security and Privacy, Virtual Event, Greece, 17 October 2020. ACM 2020, ISBN 978-1-4503-8898-6 [contents] - 2018
- [e2]Jakub Szefer, Weidong Shi, Ruby B. Lee:
Proceedings of the 7th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2018, Los Angeles, CA, USA, June 02-02, 2018. ACM 2018 [contents] - 2015
- [e1]Ruby B. Lee, Weidong Shi, Jakub Szefer:
Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP@ISCA 2015, Portland, OR, USA, June 14, 2015. ACM 2015, ISBN 978-1-4503-3483-9 [contents]
Informal and Other Publications
- 2024
- [i37]Chuanqi Xu, Jamie Sikora, Jakub Szefer:
A Thorough Study of State Leakage Mitigation in Quantum Computing with One-Time Pad. CoRR abs/2401.15529 (2024) - [i36]Ferhat Erata, Chuanqi Xu, Ruzica Piskac, Jakub Szefer:
Quantum Circuit Reconstruction from Power Side-Channel Attacks on Quantum Computer Controllers. CoRR abs/2401.15869 (2024) - [i35]Ferhat Erata, Tinghung Chiu, Anthony Etim, Srilalith Nampally, Tejas Raju, Rajashree Ramu, Ruzica Piskac, Timos Antonopoulos, Wenjie Xiong, Jakub Szefer:
Systematic Use of Random Self-Reducibility against Physical Attacks. CoRR abs/2405.05193 (2024) - [i34]Chuanqi Xu, Jakub Szefer:
Jailbreaking Quantum Computers. CoRR abs/2406.05941 (2024) - [i33]Sanjay Deshpande, James Howe, Jakub Szefer, Dongze Yue:
SDitH in Hardware. IACR Cryptol. ePrint Arch. 2024: 69 (2024) - 2023
- [i32]Ferhat Erata, Ruzica Piskac, Víctor Mateu, Jakub Szefer:
Towards Automated Detection of Single-Trace Side-Channel Vulnerabilities in Constant-Time Cryptographic Code. CoRR abs/2304.02102 (2023) - [i31]Chuanqi Xu, Ferhat Erata, Jakub Szefer:
Exploration of Quantum Computer Power Side-Channels. CoRR abs/2304.03315 (2023) - [i30]Sanjay Deshpande, Jakub Szefer:
Analyzing ChatGPT's Aptitude in an Introductory Computer Engineering Course. CoRR abs/2304.06122 (2023) - [i29]Theodoros Trochatos, Anthony Etim, Jakub Szefer:
Security Evaluation of Thermal Covert-channels on SmartSSDs. CoRR abs/2305.09115 (2023) - [i28]Theodoros Trochatos, Chuanqi Xu, Sanjay Deshpande, Yao Lu, Yongshan Ding, Jakub Szefer:
Hardware Architecture for a Quantum Computer Trusted Execution Environment. CoRR abs/2308.03897 (2023) - [i27]Chuanqi Xu, Ferhat Erata, Jakub Szefer:
Classification of Quantum Computer Fault Injection Attacks. CoRR abs/2309.05478 (2023) - [i26]Jerry Tan, Chuanqi Xu, Theodoros Trochatos, Jakub Szefer:
Extending and Defending Attacks on Reset Operations in Quantum Computers. CoRR abs/2309.06281 (2023) - 2022
- [i25]Ferhat Erata, Arda Goknil, Eren Yildiz, Kasim Sinan Yildirim, Ruzica Piskac, Jakub Szefer, Gökçin Sezgin:
ETAP: Energy-aware Timing Analysis of Intermittent Programs. CoRR abs/2201.11433 (2022) - [i24]Allen Mi, Shuwen Deng, Jakub Szefer:
Short Paper: Device- and Locality-Specific Fingerprinting of Shared NISQ Quantum Computers. CoRR abs/2202.12731 (2022) - [i23]Sanjay Deshpande, Chuanqi Xu, Theodoros Trochatos, Yongshan Ding, Jakub Szefer:
Towards an Antivirus for Quantum Computers. CoRR abs/2203.02649 (2022) - [i22]Florian Frank, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, André Schaller, Tolga Arul, Farinaz Koushanfar, Stefan Katzenbeisser, Ulrich Rührmair, Jakub Szefer:
Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature. CoRR abs/2208.02125 (2022) - [i21]Po-Jen Chen, Tung Chou, Sanjay Deshpande, Norman Lahr, Ruben Niederhagen, Jakub Szefer, Wen Wang:
Complete and Improved FPGA Implementation of Classic McEliece. IACR Cryptol. ePrint Arch. 2022: 412 (2022) - [i20]Sanjay Deshpande, Mamuri Nawan, Kashif Nawaz, Jakub Szefer, Chuanqi Xu:
Towards a Fast and Efficient Hardware Implementation of HQC. IACR Cryptol. ePrint Arch. 2022: 1183 (2022) - 2021
- [i19]Shuwen Deng, Bowen Huang, Jakub Szefer:
Leaky Frontends: Micro-Op Cache and Processor Frontend Vulnerabilities. CoRR abs/2105.12224 (2021) - [i18]Shuwen Deng, Nikolay Matyunin, Wenjie Xiong, Stefan Katzenbeisser, Jakub Szefer:
Evaluation of Cache Attacks on Arm Processors and Secure Caches. CoRR abs/2106.14054 (2021) - 2020
- [i17]Wenjie Xiong, Jakub Szefer:
Survey of Transient Execution Attacks. CoRR abs/2005.13435 (2020) - [i16]Shayan Moini, Shanquan Tian, Jakub Szefer, Daniel E. Holcomb, Russell Tessier:
Remote Power Side-Channel Attacks on CNN Accelerators in FPGAs. CoRR abs/2011.07603 (2020) - [i15]Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer:
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA. IACR Cryptol. ePrint Arch. 2020: 54 (2020) - [i14]Patrick Longa, Wen Wang, Jakub Szefer:
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3. IACR Cryptol. ePrint Arch. 2020: 1457 (2020) - 2019
- [i13]André Schaller, Wenjie Xiong, Nikolaos Athanasios Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Intrinsic Rowhammer PUFs: Leveraging the Rowhammer Effect for Improved Security. CoRR abs/1902.04444 (2019) - [i12]Wenjie Xiong, Jakub Szefer:
Leaking Information Through Cache LRU States. CoRR abs/1905.08348 (2019) - [i11]Nikolay Matyunin, Yujue Wang, Tolga Arul, Jakub Szefer, Stefan Katzenbeisser:
MagneticSpy: Exploiting Magnetometer in Mobile Devices for Website and Application Fingerprinting. CoRR abs/1906.11117 (2019) - [i10]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
A Benchmark Suite for Evaluating Caches' Vulnerability to Timing Attacks. CoRR abs/1911.08619 (2019) - [i9]Shuwen Deng, Wenjie Xiong, Jakub Szefer:
Analysis of Secure Caches and Timing-Based Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2019: 167 (2019) - 2018
- [i8]Jakub Szefer, Tianwei Zhang, Ruby B. Lee:
Practical and Scalable Security Verification of Secure Architectures. CoRR abs/1807.01854 (2018) - [i7]Wen Wang, Bernhard Jungk, Julian Wälde, Shuwen Deng, Naina Gupta, Jakub Szefer, Ruben Niederhagen:
XMSS and Embedded Systems - XMSS Hardware Accelerators for RISC-V. IACR Cryptol. ePrint Arch. 2018: 1225 (2018) - 2017
- [i6]Shuwen Deng, Doguhan Gümüsoglu, Wenjie Xiong, Y. Serhan Gener, Onur Demir, Jakub Szefer:
SecChisel: Language and Tool for Practical and Scalable Security Verification of Security-Aware Hardware Architectures. IACR Cryptol. ePrint Arch. 2017: 193 (2017) - [i5]Wen Wang, Jakub Szefer, Ruben Niederhagen:
FPGA-based Key Generator for the Niederreiter Cryptosystem using Binary Goppa Codes. IACR Cryptol. ePrint Arch. 2017: 595 (2017) - [i4]Wen Wang, Jakub Szefer, Ruben Niederhagen:
FPGA-based Niederreiter Cryptosystem using Binary Goppa Codes. IACR Cryptol. ePrint Arch. 2017: 1180 (2017) - 2016
- [i3]Wenjie Xiong, André Schaller, Nikolaos A. Anagnostopoulos, Muhammad Umair Saleem, Sebastian Gabmeyer, Stefan Katzenbeisser, Jakub Szefer:
Practical DRAM PUFs in Commodity Devices. IACR Cryptol. ePrint Arch. 2016: 253 (2016) - [i2]Jakub Szefer:
Survey of Microarchitectural Side and Covert Channels, Attacks, and Defenses. IACR Cryptol. ePrint Arch. 2016: 479 (2016) - [i1]Onur Demir, Wenjie Xiong, Faisal Zaghloul, Jakub Szefer:
Survey of Approaches for Security Verification of Hardware/Software Systems. IACR Cryptol. ePrint Arch. 2016: 846 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-15 00:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint