D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 30 Citations 7,843 70 World Ranking 10020 National Ranking 282

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Central processing unit
  • Computer network

His main research concerns Cache, Side channel attack, Computer security, Cloud computing and Implementation. His work on Algorithm expands to the thematically related Cache. He works mostly in the field of Side channel attack, limiting it down to concerns involving Cache algorithms and, occasionally, Overhead.

The various areas that he examines in his Cloud computing study include Exploit, Virtual machine, Timing attack and Cryptography. Yuval Yarom interconnects Computer network and Information leakage in the investigation of issues within Virtual machine. His Cryptography research incorporates themes from Ciphertext-only attack and ElGamal encryption.

His most cited work include:

  • FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack (679 citations)
  • Spectre Attacks: Exploiting Speculative Execution (593 citations)
  • Last-Level Cache Side-Channel Attacks are Practical (497 citations)

What are the main themes of his work throughout his whole career to date?

Yuval Yarom focuses on Computer security, Side channel attack, Cache, Embedded system and Exploit. His study brings together the fields of Speculative execution and Computer security. His research integrates issues of Dram, Virtual machine, Ciphertext and Public-key cryptography in his study of Side channel attack.

In general Cache study, his work on CPU cache often relates to the realm of Implementation, thereby connecting several areas of interest. His research investigates the link between Exploit and topics such as User space that cross with problems in Address space. His research in Central processing unit tackles topics such as Branch predictor which are related to areas like Instruction set and Microarchitecture.

He most often published in these fields:

  • Computer security (32.58%)
  • Side channel attack (31.46%)
  • Cache (29.21%)

What were the highlights of his more recent work (between 2019-2021)?

  • Side channel attack (31.46%)
  • Cache (29.21%)
  • Computer network (17.98%)

In recent papers he was focusing on the following fields of study:

Yuval Yarom mostly deals with Side channel attack, Cache, Computer network, Computer security and Central processing unit. His Side channel attack research is multidisciplinary, relying on both Dram and Information sensitivity. His Cache study contributes to a more complete understanding of Operating system.

His Computer network research integrates issues from Random access memory, Memory module and Reading. His work on Cryptographic nonce is typically connected to Most significant bit, Scalar multiplication, Special case and Elliptic Curve Digital Signature Algorithm as part of general Computer security study, connecting several disciplines of science. His studies in Central processing unit integrate themes in fields like Microcode and Branch predictor.

Between 2019 and 2021, his most popular works were:

  • LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection (43 citations)
  • RAMBleed: Reading Bits in Memory Without Accessing Them (27 citations)
  • CacheOut: Leaking Data on Intel CPUs via Cache Evictions (16 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Central processing unit
  • Computer network

Central processing unit, Side channel attack, Microcode, Cache and Computer security are his primary areas of study. His study explores the link between Central processing unit and topics such as Branch predictor that cross with problems in Microarchitecture, x86 and Embedded system. Yuval Yarom combines subjects such as Random access memory, Computer network, Memory module and Reading with his study of Side channel attack.

Yuval Yarom has included themes like Virtual machine, CPU cache, Compiler and Memory hierarchy in his Microcode study. His work deals with themes such as Speculative execution, Process and Instruction set, which intersect with Cache. Many of his research projects under Computer security are closely connected to Elliptic Curve Digital Signature Algorithm, Leakage, Montgomery ladder and Special case with Elliptic Curve Digital Signature Algorithm, Leakage, Montgomery ladder and Special case, tying the diverse disciplines of science together.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Spectre Attacks: Exploiting Speculative Execution

Paul Kocher;Jann Horn;Anders Fogh;Daniel Genkin.
ieee symposium on security and privacy (2019)

1406 Citations

FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack

Yuval Yarom;Katrina Falkner.
usenix security symposium (2014)

1268 Citations

FLUSH+RELOAD: a high resolution, low noise, L3 cache side-channel attack

Yuval Yarom;Katrina Falkner.
usenix security symposium (2014)

1268 Citations

Last-Level Cache Side-Channel Attacks are Practical

Fangfei Liu;Yuval Yarom;Qian Ge;Gernot Heiser.
ieee symposium on security and privacy (2015)

944 Citations

Last-Level Cache Side-Channel Attacks are Practical

Fangfei Liu;Yuval Yarom;Qian Ge;Gernot Heiser.
ieee symposium on security and privacy (2015)

944 Citations

Meltdown: reading kernel memory from user space

Moritz Lipp;Michael Schwarz;Daniel Gruss;Thomas Prescher.
usenix security symposium (2018)

840 Citations

Meltdown: reading kernel memory from user space

Moritz Lipp;Michael Schwarz;Daniel Gruss;Thomas Prescher.
usenix security symposium (2018)

840 Citations

Foreshadow: extracting the keys to the intel SGX kingdom with transient out-of-order execution

Jo Van Bulck;Marina Minkin;Ofir Weisse;Daniel Genkin.
usenix security symposium (2018)

734 Citations

Foreshadow: extracting the keys to the intel SGX kingdom with transient out-of-order execution

Jo Van Bulck;Marina Minkin;Ofir Weisse;Daniel Genkin.
usenix security symposium (2018)

734 Citations

CacheBleed: a timing attack on OpenSSL constant-time RSA

Yuval Yarom;Daniel Genkin;Daniel Genkin;Nadia Heninger.
Journal of Cryptographic Engineering (2017)

566 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Yuval Yarom

Thomas Eisenbarth

Thomas Eisenbarth

University of Lübeck

Publications: 54

Berk Sunar

Berk Sunar

Worcester Polytechnic Institute

Publications: 43

Stefan Mangard

Stefan Mangard

Graz University of Technology

Publications: 26

Onur Mutlu

Onur Mutlu

ETH Zurich

Publications: 24

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 24

Cristiano Giuffrida

Cristiano Giuffrida

Vrije Universiteit Amsterdam

Publications: 22

Nael Abu-Ghazaleh

Nael Abu-Ghazaleh

University of California, Riverside

Publications: 21

Christof Fetzer

Christof Fetzer

TU Dresden

Publications: 21

Josep Torrellas

Josep Torrellas

University of Illinois at Urbana-Champaign

Publications: 20

Pascal Felber

Pascal Felber

University of Neuchâtel

Publications: 19

Herbert Bos

Herbert Bos

Vrije Universiteit Amsterdam

Publications: 19

Gilles Barthe

Gilles Barthe

Max Planck Institute for Security and Privacy

Publications: 17

Dean M. Tullsen

Dean M. Tullsen

University of California, San Diego

Publications: 16

Frank Piessens

Frank Piessens

KU Leuven

Publications: 16

Surya Nepal

Surya Nepal

Commonwealth Scientific and Industrial Research Organisation

Publications: 15

Ruby B. Lee

Ruby B. Lee

Princeton University

Publications: 14

Trending Scientists

Michael M. Hutchison

Michael M. Hutchison

University of California, Santa Cruz

David A. Maltz

David A. Maltz

Microsoft (United States)

Yongguang Yu

Yongguang Yu

Beijing Jiaotong University

Francis E. H. Tay

Francis E. H. Tay

National University of Singapore

William A. Pryor

William A. Pryor

Louisiana State University

Nikhil Gupta

Nikhil Gupta

New York University

Lee Chow

Lee Chow

University of Central Florida

Stefan Schillberg

Stefan Schillberg

Fraunhofer Society

Vineet N. KewalRamani

Vineet N. KewalRamani

National Institutes of Health

Massimiliano Favalli

Massimiliano Favalli

National Institute of Geophysics and Volcanology

Brian J. Soden

Brian J. Soden

University of Miami

Bernard J. Poiesz

Bernard J. Poiesz

SUNY Upstate Medical University

Miguel López

Miguel López

University of Santiago de Compostela

Craig Morgan

Craig Morgan

King's College London

Piero Olliaro

Piero Olliaro

University of Oxford

Cornelia Betsch

Cornelia Betsch

University of Erfurt

Something went wrong. Please try again later.