|The University of Adelaide||Home | Faculties & Divisions | Search|
|Faculties & Divisions | People A to Z | Media Expertise | Phonebook||
|Public browsing [Login]|
Dr Yuval Yarom
To link to this page, please use the following URL:
2015 - Computer System Security
2014 - Computer System Security
My main research interest is in the area of computer and network security, with a current focus on microarchitectural attacks and on cryptography. I am the leader of the security research area within the Centre for Distributed and Intelligent Technologies (CDIT) in the school of computer science.
Current Research Students
Past Research Students
Assessment and OS-Level Mitigation of Timing Channels. Y.Yarom and K. Falkner, NICTA CRP Research Agreement ($132,378) (2015-2016)
Computing Infrastructure Performance and Interoperability Research - Security. K. Falkner and Y. Yarom, DSTO Research Contract ($170,000) (2015).
Assessment and OS-Level Mitigation of Timing Channels. K. Falkner and Y. Yarom, NICTA CRP ($232,167) (2014-2015).
Model Driven Systems Engineering: Advanced Modelling of Communication Protocols. K. Falkner and Y. Yarom, DSTO Research Contract ($110,000) (2014).
A.Barak, O. Laden and Y. Yarom, The NOW MOSIX and its Preemptive Process Migration Scheme, Bulletin of the IEEE Technical Committee on Operating Systems and Application Environments (TCOS), Vol. 7, No. 2
Refereed Conference and Workshop Publications
F. Liu, Q. Ge, Y. Yarom, F. Mckeen, C. Rozas, G. Heiser, R. B. Lee, CATalyst: Defeating Last-Level Cache Side Channel Attacks in Cloud Computing, HPCA 2016, Barcelona, Spain, March 2016.
Y. Yarom, G. Li and D. C. Ranasinghe, Evaluation and Cryptanalysis of the Pandaka Lightweight Cipher, ACNS 2015, New York, NY, USA, June 2015.
F. Liu, Y. Yarom, Q. Ge, G. Heiser and R. B. Lee, Last-Level Cache Side-Channel Attacks are Practical, IEEE S&P 2015, pages 605-622, San Jose, CA, USA, May 2015.
J. van de Pol, N. P. Smart and Y. Yarom, Just a Little Bit More, CT-RSA 2015 pages 3-21, San Francisco, CA, USA, April 2015
N.Benger, J. van de Pol, N. P. Smart and Y. Yarom, “Ooh Aah... Just a Little Bit” : A small amount of side channel can go a long way, CHES 2014, pages 73-92, Busan, Korea, September 2014
Y. Yarom and K. Falkner, FLUSH+RELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack, Proceedings of the 23rd USENIX Security Symposium, pages 719-732, San Diego, CA, USA, August 2014.
Y. Yarom, K. Falkner and D.S. Munro, S-RVM: a Secure Design for a High-Performance Java Virtual Machine, Proceedings of the 6th International Workshop on Virtual Machines and Intermediate Languages (VMIL 2012), October 2012, DOI: 10.1145/2414740.2414745
H. Detmold, A. van den Hengel, A. Dick, A. Cichowski, R. Hill, E. Kocadag, Y. Yarom, K. Falkner and D. S. Munro, Estimating camera overlap in large and growing networks, Proceedings of the 2nd ACM/IEEE International Conference on Distributed Smart Cameras (ICDCS 2008), Stanford University, California, USA, 7-11 September 2008, DOI: 10.1109/ICDSC.2008.4635694.
D. Dolev and D. Malkhi and Y. Yarom, Warm Backup Using Snooping, Proceedings of the First International Workshop on Services in Distributed and Networked Environments (SDNE 1994), Prague, Czech Republic, 27-28 June 1994, DOI: 10.1109/SDNE.1994.337777
L. Groot Bruinderink, A. Hülsing, T. Lange and Y. Yarom, Flush, Gauss, and Reload – A Cache Attack on the BLISS Lattice-Based Signature Scheme, Crptology ePrint archive 2016/300.
D. Genkin, L. Pachmanov, I. Pipman, E. Tromer and Y. Yarom, ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels, Cryptology ePrint archive 2016/230.
Y. Yarom, D. Genkin and N. Heninger, CacheBleed: A Timing Attack on OpenSSL Constant Time RSA, Cryptology ePrint archive 2016/224.
T. Allan, B. B. Brumley, K. Falkner, J. van de Pol and Y. Yarom, Amplifying Side Channels Through Performance Degradation, Cryptology ePrint archive 2015/1141.
G. Li, Y. Yarom and D. C. Ranasinghe, Exploiting Transformations of the Galois Configuration to Improve Guess-and-Determine Attacks on NFSRs, Cryptology ePrint archive 2015/1045.
Y. Yarom, Q. Ge, F. Liu, R. B. Lee and G. Heiser, Mapping the Intel Last-Level Cache, Cryptology ePrint archive 2015/905.
Y. Yarom and N. Benger, Recovering OpenSSL ECDSA Nonces Using the Flush+Reload Cache Side-channel Attack, Cryptology ePrint archive 2014/140.
Im in ur Cache Keepin ur Bitez, Fourth NICTA Software Systems Summer School, SSSS 2016, Sydney, Australia, 8-9 Feb. 2016.
Last-level cache side-channel attacks are practical, I-CORE Day, Tel Aviv, Israel, 1 Apr. 2015.
Side channel attack on OpenSSL ECDSA, 18th Workshop on Elliptic Curve Cryptography, ECC 2014, Chennai, India, 8-10 Oct. 2014.
Copyright © 2013 The University of Adelaide
Last Modified 26/07/2013 Marketing & Communications
CRICOS Provider Number 00123M