Skip to main content

Yuval Yarom
Researcher; Senior Lecturer, UofA

Research Interests

Yuval's main research interests are computer security and cryptography, with a current focus on microarchitectural attacks and defences.

Contact Details

Email:Yuval.Yarom@data61.csiro.au
Twitter:@yuvalyarom

More contact information is available at the Contact page.

Publication List

Projects

Current

Collaborations

Yuval's past and present collaborations include:

  • Ben Gurion University
  • The University of Bristol
  • University of Campinas
  • Cornell University
  • Eindhoven University of Technology
  • Graz University of Technology
  • KU Leuven
  • Princeton University
  • Radboud University
  • Tampere University of Technology
  • Tel-Aviv University
  • University of Michigan
  • University of Pennsylvania
  • Worcester Polytechnic Institute

Qualifications

Yuval has a Bachelor of Mathematics and Computer Science and a Master of Computer Science from the Hebrew University of Jerusalem.

Patents

Program Committees and Editorial Boards

  • ASPLOS 2019 (external PC)
  • CARDIS 2018
  • CHES 2018, 2019
  • Kangacrypt 2018 (co-chair)
  • Latincrypt 2017
  • RWC 2019
  • SAC 2019
  • SPACE 2017, 2018 (co-chair)
  • SYSTOR 2015
  • SysTEX 2018
  • USENIX ATC 2019
  • USENIX Security 2017, 2019

Publications

Data61 Papers

2019

Abstract PDF Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Haburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwartz and Yuval Yarom
Spectre attacks: Exploiting speculative execution
IEEE Symposium on Security and Privacy, pp. 19-37, San Francisco, May, 2019

2018

Abstract
Slides
PDF Qian Ge, Yuval Yarom and Gernot Heiser
No security without time protection: we need a new hardware-software contract
Asia-Pacific Workshop on Systems (APSys), Korea, August, 2018
Best Paper Award! Complete timing-channel data for evaluated x86 and Arm platforms.
Abstract PDF Moritz Lipp, Michael Schwartz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom and Mike Hamburg
Meltdown: reading kernel memory from user space
USENIX Security Symposium, pp. -, Baltimore, MD, USA, August, 2018
Abstract PDF Jo Van Bulck, Marina Minkin, Ofir Weiss, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom and Raoul Stracks
Foreshadow: Extracting the keys to the intel SGX kingdom with transient out-of-order execution
USENIX Security Symposium, pp. 991–1008, Baltimore, August, 2018
Abstract PDF Daniel Genkin, Lev Pachmanov, Eran Tromer and Yuval Yarom
Drive-by key-extraction cache attacks from portable code
Applied Cryptography and Network Security, pp. 83–102, Leuven, Belgium, July, 2018
Abstract PDF Fergus Dall, Gabrielle De Micheli, Thomas Eisenbarth, Daniel Genkin, Nadia Heninger, Ahmad Moghimi and Yuval Yarom
CacheQuote: Efficiently recovering long-term secrets of SGX EPID via cache attacks
CHES, pp. 171-191, Amsterdam, NL, May, 2018
Abstract PDF Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl and Yuval Yarom
Another flip in the wall of rowhammer defenses
IEEE Symposium on Security and Privacy, pp. 489-505, San Francisco, CA, US, May, 2018
Abstract PDF Qian Ge, Yuval Yarom, David Cock and Gernot Heiser
A survey of microarchitectural timing attacks and countermeasures on contemporary hardware
Journal of Cryptographic Engineering, Volume 8, Issue 1, pp. 1-27, April, 2018

2017

Abstract PDF Daniel Genkin, Luke Valenta and Yuval Yarom
May the fourth be with you: A microarchitectural side channel attack on a real-world applications of curve25519
CCS, pp. 845-858, Dallas, October, 2017
Abstract PDF Peter Pessl, Leon Groot Bruinderink and Yuval Yarom
To BLISS-B or not to be - attacking strongSwan's implementation of post-quantum signatures
CCS, pp. 1843-1855, Dallas, TX, US, October, 2017
Abstract PDF Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal and Yuval Yarom
Sliding right into disaster: left-to-right sliding windows leak
CHES, pp. 555-576, Taipei, Taiwan, September, 2017
Abstract PDF Yang Su, Daniel Genkin, Damith Ranasinghe and Yuval Yarom
USB snooping made easy: Crosstalk leakage attacks on USB hubs
USENIX Security Symposium, pp. 1145–1161, Vancouver, BC, CA, August, 2017
Abstract PDF Yuval Yarom, Daniel Genkin and Nadia Heninger
CacheBleed: A timing attack on OpenSSL constant time RSA
Journal of Cryptographic Engineering, Volume 7, Number 2, pp. 99–112, May, 2017
Abstract PDF Paul Grubbs, Thomas Ristenpart and Yuval Yarom
Modifying an enciphering scheme after deployment
Eurocrypt, Paris, FR, April, 2017
Abstract to be published Paul Grubbs, Thomas Ristenpart and Yuval Yarom
Modifying an enciphering scheme after deployment
EuroCrypt 2017, pp. 499-527, Paris, France, April, 2017
Abstract PDF Qian Ge, Yuval Yarom, Frank Li and Gernot Heiser
Your processor leaks information — and there's nothing you can do about it
arXiv preprint arXiv:1612.04474, 2017

2016

Abstract PDF Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol and Yuval Yarom
Amplifying side channels through performance degradation
Annual Computer Security Applications Conference, pp. 422–435, Los Angeles, CA, US, December, 2016
Abstract PDF Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer and Yuval Yarom
ECDSA key extraction from mobile devices via nonintrusive electromagnetic attacks
ACM Conference on Computer and Communications Security, pp. 1626–1638, Vienna, Austria, October, 2016
Abstract PDF César Pereida García, Billy Bob Brumly and Yuval Yarom
“Make sure DSA signing exponentiations really are constant-time”
ACM Conference on Computer and Communications Security, pp. 1639–1650, Vienna, Austria, October, 2016
Abstract PDF Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange and Yuval Yarom
Flush, gauss, and reload — a cache attack on the BLISS lattice-based signature scheme
Conference on Cryptographic Hardware and Embedded Systems 2016 (CHES 2016), pp. 323–345, Santa Barbara, CA, US, August, 2016
Abstract PDF Yuval Yarom, Daniel Genkin and Nadia Heninger
CacheBleed: A timing attack on OpenSSL constant time RSA
Conference on Cryptographic Hardware and Embedded Systems 2016 (CHES 2016), pp. 346–367, Santa Barbara, CA, US, August, 2016

NICTA Papers

2016

Abstract PDF Fangfei Liu, Qian Ge, Yuval Yarom, Frank Mckeen, Carlos Rozas, Gernot Heiser and Ruby B Lee
CATalyst: defeating last-level cache side channel attacks in cloud computing
IEEE Symposium on High-Performance Computer Architecture, pp. 406–418, Barcelona, Spain, March, 2016

2015

Abstract PDF Yuval Yarom, Qian Ge, Fangfei Liu, Ruby B. Lee and Gernot Heiser
Mapping the Intel last-level cache
The Cryptology ePrint Archive, September, 2015
Abstract PDF Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser and Ruby B Lee
Last-level cache side-channel attacks are practical
IEEE Symposium on Security and Privacy, pp. 605–622, San Jose, CA, US, May, 2015

Non-NICTA Papers

2017

plain text link Mike J. Wilkinson, Claudia Szabo, Caroline S. Ford, Yuval Yarom, Adam E. Croxford, Amanda Camp and Paul Gooding
Replacing Sanger with Next Generation Sequencing to improve coverage and quality of reference DNA barcodes for plants
Scientific Reports, Volume 7, art. 46040, 2017

2014

plain text to be published Naomi Benger, Joop van de Pol, Nigel P. Smart and Yuval Yarom
``ooh aah... just a little bit'' : A small amount of side channel can go a long way
Busan, Korea, September, 2014
plain text to be published Yuval Yarom and Katrina Falkner
FLUSH+RELOAD: A high resolution, low noise, L3 cache side-channel attack
Proceedings of the 23rd USENIX Security Symposium, pp. 719–732, San Diego, California, USA, August, 2014

2008

plain text to be published Henry Detmold, Anton van den Hengel, Anthony Dick, Alex Cichowski, Rhys Hill, Ekim Kocadag, Yuval Yarom, Katrina Falkner and David S. Munro
Estimating camera overlap in large and growing networks
Distributed Smart Cameras (ICDSC), pp. 1–10, Stanford, California, USA, 2008

1995

plain text to be published Amnon Barak, Oren Laden and Yuval Yarom
The NOW MOSIX and its preemptive process migration scheme
IEEE Bulletin of the Technical Committee on Operating Systems and Application Environments, Volume 7, Number 2, pp. 5–11, 1995

Served by Apache on Linux on seL4.