University Staff Directory The University of Adelaide Australia
Faculties & Divisions | People A to Z | Media Expertise | Phonebook
Public browsing [Login]
Text Zoom: S | M | L

Dr Yuval Yarom

Telephone +61 8 8313 4727
Position Research Associate
Building Ingkarni Wardli
Floor/Room 4 42
Campus North Terrace
Org Unit School of Computer Science

To link to this page, please use the following URL:

Teaching Interests

2015 - Computer System Security

2014 - Computer System Security

Research Interests

My main research interest is in the area of computer and network security, with a current focus on microarchitectural attacks and on cryptography.  I am the leader of the security research area within the Centre for Distributed and Intelligent Technologies (CDIT) in the school of computer science.

Current Research Students

  • Lachlan Kang - Redefining anonymity (PhD)
  • Michelle McClintock - Enterprise security architecture - an organizational framework (PhD)
  • Tom Allan - Side channel attacks in Web browsers (Honours)
  • Jungtaek Oh - Cryptographic attacks on modern CPUs (Master of Computer Science)

Past Research Students 

  • Gefei Li - Cryptanalysis of lightweight cryptographic primitives, MCS, 2015
  • Sam Jaeschke - Mitigation of the Flush+Reload Attack, Honours, 2015

Research Funding

Assessment and OS-Level Mitigation of Timing Channels. Y.Yarom and K. Falkner, NICTA CRP Research Agreement ($132,378) (2015-2016)

Computing Infrastructure Performance and Interoperability Research - Security. K. Falkner and Y. Yarom, DSTO Research Contract ($170,000) (2015).

Assessment and OS-Level Mitigation of Timing Channels. K. Falkner and Y. Yarom, NICTA CRP ($232,167) (2014-2015).

Model Driven Systems Engineering: Advanced Modelling of Communication Protocols. K. Falkner and Y. Yarom, DSTO Research Contract ($110,000) (2014).


Journal Articles

A.Barak, O. Laden and Y. Yarom, The NOW MOSIX and its Preemptive Process Migration Scheme, Bulletin of the IEEE Technical Committee on Operating Systems and Application Environments (TCOS), Vol. 7, No. 2

Refereed Conference and Workshop Publications

F. Liu, Q. Ge, Y. Yarom, F. Mckeen, C. Rozas, G. Heiser, R. B. Lee, CATalyst: Defeating Last-Level Cache Side Channel Attacks in Cloud Computing, HPCA 2016, Barcelona, Spain, March 2016.

Y. Yarom, G. Li and D. C. Ranasinghe, Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher, ACNS 2015, New York, NY, USA, June 2015.

F. Liu, Y. Yarom, Q. Ge, G. Heiser and R. B. Lee, Last-Level Cache Side-Channel Attacks are Practical, IEEE S&P 2015, pages 605-622, San Jose, CA, USA, May 2015.

J. van de Pol, N. P. Smart and Y. Yarom, Just a Little Bit More, CT-RSA 2015 pages 3-21, San Francisco, CA, USA, April 2015

N.Benger, J. van de Pol, N. P. Smart and Y. Yarom, “Ooh Aah... Just a Little Bit” : A small amount of side channel can go a long way, CHES 2014, pages 73-92, Busan, Korea,  September 2014

Y. Yarom and K. Falkner, FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack, Proceedings of the 23rd USENIX Security Symposium, pages 719-732, San Diego, CA, USA, August 2014.

Y. Yarom, K. Falkner and D.S. Munro, S-RVM: a Secure Design for a High-Performance Java Virtual Machine, Proceedings of the 6th International Workshop on Virtual Machines and Intermediate Languages (VMIL 2012), October 2012, DOI: 10.1145/2414740.2414745

H. Detmold, A. van den Hengel, A. Dick, A. Cichowski, R. Hill, E. Kocadag, Y. Yarom, K. Falkner and D. S. Munro, Estimating camera overlap in large and growing networks, Proceedings of the 2nd ACM/IEEE International Conference on Distributed Smart Cameras (ICDCS 2008), Stanford University, California, USA, 7-11 September 2008, DOI: 10.1109/ICDSC.2008.4635694.

D. Dolev and D. Malkhi and Y. Yarom, Warm Backup Using Snooping, Proceedings of the First International Workshop on Services in Distributed and Networked Environments (SDNE 1994), Prague, Czech Republic, 27-28 June 1994, DOI: 10.1109/SDNE.1994.337777


L. Groot Bruinderink, A. Hülsing, T. Lange and Y. Yarom, Flush, Gauss, and Reload – A Cache Attack on the BLISS Lattice-Based Signature Scheme, Crptology ePrint archive 2016/300.

D. Genkin, L. Pachmanov, I. Pipman, E. Tromer and Y. Yarom, ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels, Cryptology ePrint archive 2016/230.

Y. Yarom, D. Genkin and N. Heninger, CacheBleed: A Timing Attack on OpenSSL Constant Time RSA, Cryptology ePrint archive 2016/224.

T. Allan, B. B. Brumley, K. Falkner, J. van de Pol and Y. Yarom, Amplifying Side Channels Through Performance Degradation, Cryptology ePrint archive 2015/1141.

G. Li, Y. Yarom and D. C. Ranasinghe, Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs, Cryptology ePrint archive 2015/1045.

Y. Yarom, Q. Ge, F. Liu, R. B. Lee and G. Heiser, Mapping the Intel Last-Level Cache, Cryptology ePrint archive 2015/905.

Y. Yarom and N. Benger, Recovering OpenSSL ECDSA Nonces Using the Flush+Reload Cache Side-channel Attack, Cryptology ePrint archive 2014/140.

Invited Talks

Im in ur Cache Keepin ur Bitez, Fourth NICTA Software Systems Summer School, SSSS 2016, Sydney, Australia, 8-9 Feb. 2016.

Last-level cache side-channel attacks are practical, I-CORE Day, Tel Aviv, Israel, 1 Apr. 2015.

Side channel attack on OpenSSL ECDSA, 18th Workshop on Elliptic Curve Cryptography, ECC 2014, Chennai, India, 8-10 Oct. 2014.


Community Service

PC Member

Journal reviews

  • Journal of Cryptology
  • Microprocessors and Microsystems
  • Transactions on Computers

External Reviewer

  • SPT-Iot 2016
  • AsiaCCS 2015



Entry last updated: Monday, 2 May 2016

The information in this directory is provided to support the academic, administrative and business activities of the University of Adelaide. To facilitate these activities, entries in the University Phone Directory are not limited to University employees. The use of information provided here for any other purpose, including the sending of unsolicited commercial material via email or any other electronic format, is strictly prohibited. The University reserves the right to recover all costs incurred in the event of breach of this policy.