Yuval Yarom
Researcher; Senior Lecturer, UofA
Research Interests
Yuval's main research interests are computer security and cryptography, with a current focus on microarchitectural attacks and defences.
Contact Details
Email: | Yuval.Yarom@data61.csiro.au |
---|---|
Twitter: | @yuvalyarom |
More contact information is available at the Contact page.
Projects
Past |
Collaborations
Yuval's past and present collaborations include:
- Ben Gurion University
- The University of Bristol
- University of Campinas
- Cornell University
- Eindhoven University of Technology
- Graz University of Technology
- KU Leuven
- Princeton University
- Radboud University
- Tampere University of Technology
- Tel-Aviv University
- University of California, San Diego
- University of Michigan
- University of Pennsylvania
- Weizmann Institute
- Worcester Polytechnic Institute
Qualifications
Yuval has a Bachelor of Mathematics and Computer Science and a Master of Computer Science from the Hebrew University of Jerusalem.
Patents
- Framework for providing visual context to WWW hyperlinks - US 6864904, US 7716569, US 8612846 , US 8782507, EP 2270682, WO 2002039207
- Method of relocating the stack in a computer system for preventing overrate by an exploit program - US 5949973
- Apparatus for and method of providing user exits on an operating system platform - US 5899987, US 5956710
Program Committees and Editorial Boards
- ASPLOS 2019 (external PC)
- CARDIS 2018, 2019
- CCS 2019
- CHES 2018 - 2020
- Eur S&P 2019
- IEEE SP 2020
- Kangacrypt 2018 (co-chair)
- Latincrypt 2017, 2019
- RWC 2019
- SAC 2019
- SPACE 2017, 2018 (co-chair), 2019
- SYSTOR 2015
- SysTEX 2018
- USENIX ATC 2019
- USENIX Security 2017, 2019, 2020
- WOOT 2019
Publications
- Google Scholar profile
- Best Papers
- Data61 Papers (2020, 2019, 2018, 2017, 2016)
- NICTA Papers (2016, 2015)
- Papers without Data61 or NICTA affiliation (2017, 2014, 2008, 1995)
Best Papers
![]() |
![]() |
Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Haburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwartz and Yuval Yarom Spectre attacks: Exploiting speculative execution IEEE Symposium on Security and Privacy, pp. 19-37, San Francisco, May, 2019 Distinguished Paper Award! |
![]() ![]() |
![]() ![]() |
Qian Ge, Yuval Yarom, Tom Chothia and Gernot Heiser Time protection: The missing OS abstraction EuroSys Conference, Dresden, Germany, March, 2019 Best Paper Award! |
![]() |
![]() |
Moritz Lipp, Michael Schwartz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom and Mike Hamburg Meltdown: reading kernel memory from user space USENIX Security Symposium, pp. -, Baltimore, MD, USA, August, 2018 |
Data61 Papers
2020
![]() |
![]() ![]() |
Andrew Kwong, Daniel Genkin, Daniel Gruss and Yuval Yarom RAMBleed: reading bits in memory without accessing them IEEE Symposium on Security and Privacy, pp. 310-326, San Francisco, CA, USA, May, 2020 |
![]() |
![]() |
Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg and Raoul Stracks Meltdown: reading kernel memory from user space Communications of the ACM, Volume 63, Issue 6, pp. 46-56, May, 2020 |
![]() |
![]() |
Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss and Frank Piessens LVI: Hijacking transient execution through microarchitectural load value injection IEEE Symposium on Security and Privacy, pp. 1452-1470, San Francisco, May, 2020 |
2019
![]() |
![]() |
Claudio Canella, Daniel Genkin, Lukas Giner, Daniel Gruss, Moritz Lipp, Marina Minkin, Ahmad Moghimi, Frank Piessens, Michael Schwarz, Berk Sunar, Jo Van Bulck and Yuval Yarom Fallout: leaking data on meltdown-resistant CPUs ACM Conference on Computer and Communications Security, pp. 769-784, London, UK, November, 2019 |
![]() |
![]() |
Daniel Genkin, Romain Poussier, Rui Qi Sim, Yuval Yarom and Yuanjing Zhao Cache vs. key-dependency: Side channeling an implementation of pilsung IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2020, Issue 1, pp. 231-255, November, 2019 |
![]() |
![]() |
Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossef Oren and Yuval Yarom Robust website fingerprinting through the cache occupancy channel USENIX Security Symposium, pp. 639-656, Santa Clara, August, 2019 |
![]() |
![]() |
Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Haburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwartz and Yuval Yarom Spectre attacks: Exploiting speculative execution IEEE Symposium on Security and Privacy, pp. 19-37, San Francisco, May, 2019 Distinguished Paper Award! |
![]() |
![]() |
Eyal Ronen, Robert Gillham, Daniel Genkin, Adi Shamir, David Wong and Yuval Yarom The 9 lives of bleichenbacher's CAT: new cache ATtacks on TLS implementations IEEE Symposium on Security and Privacy, pp. 966-983, San Francisco, May, 2019 |
![]() ![]() |
![]() ![]() |
Qian Ge, Yuval Yarom, Tom Chothia and Gernot Heiser Time protection: The missing OS abstraction EuroSys Conference, Dresden, Germany, March, 2019 Best Paper Award! |
2018
![]() ![]() |
![]() |
Qian Ge, Yuval Yarom and Gernot Heiser No security without time protection: we need a new hardware-software contract Asia-Pacific Workshop on Systems (APSys), Korea, August, 2018 Best Paper Award! Complete timing-channel data for evaluated x86 and Arm platforms. |
![]() |
![]() |
Moritz Lipp, Michael Schwartz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom and Mike Hamburg Meltdown: reading kernel memory from user space USENIX Security Symposium, pp. -, Baltimore, MD, USA, August, 2018 |
![]() |
![]() |
Jo Van Bulck, Marina Minkin, Ofir Weiss, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom and Raoul Stracks Foreshadow: Extracting the keys to the intel SGX kingdom with transient out-of-order execution USENIX Security Symposium, pp. 991–1008, Baltimore, August, 2018 |
![]() |
![]() |
Daniel Genkin, Lev Pachmanov, Eran Tromer and Yuval Yarom Drive-by key-extraction cache attacks from portable code Applied Cryptography and Network Security, pp. 83–102, Leuven, Belgium, July, 2018 |
![]() |
![]() |
Fergus Dall, Gabrielle De Micheli, Thomas Eisenbarth, Daniel Genkin, Nadia Heninger, Ahmad Moghimi and Yuval Yarom CacheQuote: Efficiently recovering long-term secrets of SGX EPID via cache attacks Workshop on Cryptographic Hardware and Embedded Systems, pp. 171-191, Amsterdam, NL, May, 2018 |
![]() |
![]() |
Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl and Yuval Yarom Another flip in the wall of Rowhammer defenses IEEE Symposium on Security and Privacy, pp. 489-505, San Francisco, CA, US, May, 2018 |
![]() |
![]() |
Qian Ge, Yuval Yarom, David Cock and Gernot Heiser A survey of microarchitectural timing attacks and countermeasures on contemporary hardware Journal of Cryptographic Engineering, Volume 8, Issue 1, pp. 1-27, April, 2018 |
2017
![]() |
![]() |
Daniel Genkin, Luke Valenta and Yuval Yarom May the fourth be with you: A microarchitectural side channel attack on a real-world applications of curve25519 ACM Conference on Computer and Communications Security, pp. 845-858, Dallas, October, 2017 |
![]() |
![]() |
Peter Pessl, Leon Groot Bruinderink and Yuval Yarom To BLISS-B or not to be - attacking strongSwan's implementation of post-quantum signatures ACM Conference on Computer and Communications Security, pp. 1843-1855, Dallas, TX, US, October, 2017 |
![]() |
![]() |
Daniel J. Bernstein, Joachim Breitner, Daniel Genkin, Leon Groot Bruinderink, Nadia Heninger, Tanja Lange, Christine van Vredendaal and Yuval Yarom Sliding right into disaster: left-to-right sliding windows leak Workshop on Cryptographic Hardware and Embedded Systems, pp. 555-576, Taipei, Taiwan, September, 2017 |
![]() |
![]() |
Yang Su, Daniel Genkin, Damith Ranasinghe and Yuval Yarom USB snooping made easy: Crosstalk leakage attacks on USB hubs USENIX Security Symposium, pp. 1145–1161, Vancouver, BC, CA, August, 2017 |
![]() |
![]() |
Yuval Yarom, Daniel Genkin and Nadia Heninger CacheBleed: A timing attack on OpenSSL constant time RSA Journal of Cryptographic Engineering, Volume 7, Number 2, pp. 99–112, May, 2017 |
![]() |
![]() |
Paul Grubbs, Thomas Ristenpart and Yuval Yarom Modifying an enciphering scheme after deployment EuroCrypt, Paris, FR, April, 2017 |
![]() |
![]() |
Qian Ge, Yuval Yarom, Frank Li and Gernot Heiser Your processor leaks information — and there's nothing you can do about it arXiv preprint arXiv:1612.04474, 2017 |
2016
![]() |
![]() |
Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol and Yuval Yarom Amplifying side channels through performance degradation Annual Computer Security Applications Conference, pp. 422–435, Los Angeles, CA, US, December, 2016 |
![]() |
![]() |
Daniel Genkin, Lev Pachmanov, Itamar Pipman, Eran Tromer and Yuval Yarom ECDSA key extraction from mobile devices via nonintrusive electromagnetic attacks ACM Conference on Computer and Communications Security, pp. 1626–1638, Vienna, Austria, October, 2016 |
![]() |
![]() |
César Pereida García, Billy Bob Brumly and Yuval Yarom “Make sure DSA signing exponentiations really are constant-time” ACM Conference on Computer and Communications Security, pp. 1639–1650, Vienna, Austria, October, 2016 |
![]() |
![]() |
Leon Groot Bruinderink, Andreas Hülsing, Tanja Lange and Yuval Yarom Flush, gauss, and reload — a cache attack on the BLISS lattice-based signature scheme Workshop on Cryptographic Hardware and Embedded Systems, pp. 323–345, Santa Barbara, CA, US, August, 2016 |
![]() |
![]() |
Yuval Yarom, Daniel Genkin and Nadia Heninger CacheBleed: A timing attack on OpenSSL constant time RSA Workshop on Cryptographic Hardware and Embedded Systems, pp. 346–367, Santa Barbara, CA, US, August, 2016 |
NICTA Papers
2016
![]() |
![]() |
Fangfei Liu, Qian Ge, Yuval Yarom, Frank Mckeen, Carlos Rozas, Gernot Heiser and Ruby B Lee CATalyst: defeating last-level cache side channel attacks in cloud computing IEEE Symposium on High-Performance Computer Architecture, pp. 406–418, Barcelona, Spain, March, 2016 |
2015
![]() |
![]() |
Yuval Yarom, Qian Ge, Fangfei Liu, Ruby B. Lee and Gernot Heiser Mapping the Intel last-level cache The Cryptology ePrint Archive, September, 2015 |
![]() |
![]() |
Fangfei Liu, Yuval Yarom, Qian Ge, Gernot Heiser and Ruby B Lee Last-level cache side-channel attacks are practical IEEE Symposium on Security and Privacy, pp. 605–622, San Jose, CA, US, May, 2015 |
Papers without NICTA or Data61 Affiliation
2017
2014
![]() |
![]() |
Naomi Benger, Joop van de Pol, Nigel P. Smart and Yuval Yarom ``ooh aah... just a little bit'' : A small amount of side channel can go a long way Busan, Korea, September, 2014 |
![]() |
![]() |
Yuval Yarom and Katrina Falkner FLUSH+RELOAD: A high resolution, low noise, L3 cache side-channel attack Proceedings of the 23rd USENIX Security Symposium, pp. 719–732, San Diego, California, USA, August, 2014 |
2008
![]() |
![]() |
Henry Detmold, Anton van den Hengel, Anthony Dick, Alex Cichowski, Rhys Hill, Ekim Kocadag, Yuval Yarom, Katrina Falkner and David S. Munro Estimating camera overlap in large and growing networks Distributed Smart Cameras (ICDSC), pp. 1–10, Stanford, California, USA, 2008 |
1995
![]() |
![]() |
Amnon Barak, Oren Laden and Yuval Yarom The NOW MOSIX and its preemptive process migration scheme IEEE Bulletin of the Technical Committee on Operating Systems and Application Environments, Volume 7, Number 2, pp. 5–11, 1995 |