His main research concerns Cache, Side channel attack, Computer security, Cloud computing and Implementation. His work on Algorithm expands to the thematically related Cache. He works mostly in the field of Side channel attack, limiting it down to concerns involving Cache algorithms and, occasionally, Overhead.
The various areas that he examines in his Cloud computing study include Exploit, Virtual machine, Timing attack and Cryptography. Yuval Yarom interconnects Computer network and Information leakage in the investigation of issues within Virtual machine. His Cryptography research incorporates themes from Ciphertext-only attack and ElGamal encryption.
Yuval Yarom focuses on Computer security, Side channel attack, Cache, Embedded system and Exploit. His study brings together the fields of Speculative execution and Computer security. His research integrates issues of Dram, Virtual machine, Ciphertext and Public-key cryptography in his study of Side channel attack.
In general Cache study, his work on CPU cache often relates to the realm of Implementation, thereby connecting several areas of interest. His research investigates the link between Exploit and topics such as User space that cross with problems in Address space. His research in Central processing unit tackles topics such as Branch predictor which are related to areas like Instruction set and Microarchitecture.
Yuval Yarom mostly deals with Side channel attack, Cache, Computer network, Computer security and Central processing unit. His Side channel attack research is multidisciplinary, relying on both Dram and Information sensitivity. His Cache study contributes to a more complete understanding of Operating system.
His Computer network research integrates issues from Random access memory, Memory module and Reading. His work on Cryptographic nonce is typically connected to Most significant bit, Scalar multiplication, Special case and Elliptic Curve Digital Signature Algorithm as part of general Computer security study, connecting several disciplines of science. His studies in Central processing unit integrate themes in fields like Microcode and Branch predictor.
Central processing unit, Side channel attack, Microcode, Cache and Computer security are his primary areas of study. His study explores the link between Central processing unit and topics such as Branch predictor that cross with problems in Microarchitecture, x86 and Embedded system. Yuval Yarom combines subjects such as Random access memory, Computer network, Memory module and Reading with his study of Side channel attack.
Yuval Yarom has included themes like Virtual machine, CPU cache, Compiler and Memory hierarchy in his Microcode study. His work deals with themes such as Speculative execution, Process and Instruction set, which intersect with Cache. Many of his research projects under Computer security are closely connected to Elliptic Curve Digital Signature Algorithm, Leakage, Montgomery ladder and Special case with Elliptic Curve Digital Signature Algorithm, Leakage, Montgomery ladder and Special case, tying the diverse disciplines of science together.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Spectre Attacks: Exploiting Speculative Execution
Paul Kocher;Jann Horn;Anders Fogh;Daniel Genkin.
ieee symposium on security and privacy (2019)
FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack
Yuval Yarom;Katrina Falkner.
usenix security symposium (2014)
FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack
Yuval Yarom;Katrina Falkner.
usenix security symposium (2014)
Last-Level Cache Side-Channel Attacks are Practical
Fangfei Liu;Yuval Yarom;Qian Ge;Gernot Heiser.
ieee symposium on security and privacy (2015)
Last-Level Cache Side-Channel Attacks are Practical
Fangfei Liu;Yuval Yarom;Qian Ge;Gernot Heiser.
ieee symposium on security and privacy (2015)
Meltdown: reading kernel memory from user space
Moritz Lipp;Michael Schwarz;Daniel Gruss;Thomas Prescher.
usenix security symposium (2018)
Meltdown: reading kernel memory from user space
Moritz Lipp;Michael Schwarz;Daniel Gruss;Thomas Prescher.
usenix security symposium (2018)
Foreshadow: extracting the keys to the intel SGX kingdom with transient out-of-order execution
Jo Van Bulck;Marina Minkin;Ofir Weisse;Daniel Genkin.
usenix security symposium (2018)
Foreshadow: extracting the keys to the intel SGX kingdom with transient out-of-order execution
Jo Van Bulck;Marina Minkin;Ofir Weisse;Daniel Genkin.
usenix security symposium (2018)
CacheBleed: a timing attack on OpenSSL constant-time RSA
Yuval Yarom;Daniel Genkin;Daniel Genkin;Nadia Heninger.
Journal of Cryptographic Engineering (2017)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of Michigan–Ann Arbor
University of New South Wales
Radboud University Nijmegen
KU Leuven
Tel Aviv University
Graz University of Technology
University of Michigan–Ann Arbor
KU Leuven
Worcester Polytechnic Institute
Eindhoven University of Technology
University of California, Santa Cruz
Microsoft (United States)
Beijing Jiaotong University
National University of Singapore
Louisiana State University
New York University
University of Central Florida
Fraunhofer Society
National Institutes of Health
National Institute of Geophysics and Volcanology
University of Miami
SUNY Upstate Medical University
University of Santiago de Compostela
King's College London
University of Oxford
University of Erfurt