Search Results for author: Daniel Genkin

Found 5 papers, 4 papers with code

CryptOpt: Automatic Optimization of Straightline Code

1 code implementation31 May 2023 Joel Kuepper, Andres Erbsen, Jason Gross, Owen Conoly, Chuyue Sun, Samuel Tian, David Wu, Adam Chlipala, Chitchanok Chuengsatiansup, Daniel Genkin, Markus Wagner, Yuval Yarom

Manual engineering of high-performance implementations typically consumes many resources and requires in-depth knowledge of the hardware.

Revisiting Lightweight Compiler Provenance Recovery on ARM Binaries

1 code implementation6 May 2023 Jason Kim, Daniel Genkin, Kevin Leach

In this paper, we extend previous work with a shallow-learning model that efficiently and accurately recovers compiler configuration properties for ARM binaries.

CryptOpt: Verified Compilation with Randomized Program Search for Cryptographic Primitives (full version)

1 code implementation19 Nov 2022 Joel Kuepper, Andres Erbsen, Jason Gross, Owen Conoly, Chuyue Sun, Samuel Tian, David Wu, Adam Chlipala, Chitchanok Chuengsatiansup, Daniel Genkin, Markus Wagner, Yuval Yarom

Most software domains rely on compilers to translate high-level code to multiple different machine languages, with performance not too much worse than what developers would have the patience to write directly in assembly language.

Benchmarking C++ code

Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses

no code implementations8 Mar 2021 Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom

To assess the effectiveness of this approach, in this work we seek to identify those JavaScript features which are essential for carrying out a cache-based attack.

Website Fingerprinting Attacks Cryptography and Security

Meltdown

2 code implementations3 Jan 2018 Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg

The security of computer systems fundamentally relies on memory isolation, e. g., kernel address ranges are marked as non-accessible and are protected from user access.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.