Follow
Andrew Kwong
Andrew Kwong
Verified email at cs.unc.edu - Homepage
Title
Cited by
Cited by
Year
RAMBleed: Reading Bits in Memory Without Accessing Them
A Kwong, D Genkin, D Gruss, Y Yarom
41st IEEE Symposium on Security and Privacy (S&P), 2020
1842020
CacheOut: Leaking data on Intel CPUs via cache evictions
S van Schaik, M Minkin, A Kwong, D Genkin, Y Yarom
42nd IEEE Symposium on Security and Privacy (S&P), 2021
1492021
SGAxe: How SGX fails in practice
S Van Schaik, A Kwong, D Genkin, Y Yarom
2020. https://sgaxe. com/files/SGAxe. pdf, 2020
105*2020
Hard Drive of Hearing: Disks that Eavesdrop with a Synthesized Microphone
A Kwong, W Xu, K Fu
40th IEEE Symposium on Security and Privacy (S&P), 2019
532019
Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems
C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu
39th IEEE Symposium on Security and Privacy (S&P), 2018
462018
Pseudorandom Black Swans: Cache Attacks on CTR DRBG
S Cohney, A Kwong, S Paz, D Genkin, N Heninger, E Ronen, Y Yarom
41st IEEE Symposium on Security and Privacy (S&P), 2020
442020
SpecHammer: Combining Spectre and Rowhammer for New Speculative Attacks
Y Tobah, A Kwong, I Kang, D Genkin, KG Shin
43rd IEEE Symposium on Security and Privacy (S&P), 2022
432022
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer
M Fahr Jr, H Kippen, A Kwong, T Dang, J Lichtinger, D Dachman-Soled, ...
29th ACM Conference on Computer and Communications Security (CCS), 2022
252022
Why Do You Trust Sensors? Analog Cybersecurity Attack Demos
A Kwong, C Bolton, T Trippel, W Xu, K Fu
12017
Go Go Gadget Hammer: Flipping Nested Pointers for Arbitrary Data Leakage
Y Tobah, A Kwong, I Kang, D Genkin, KG Shin
USENIX Security Symposium (USENIX Security), 2024
2024
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism
I Kang, W Wang, J Kim, S van Schaik, Y Tobah, D Genkin, A Kwong, ...
USENIX Security Symposium (USENIX Security), 2024
2024
Applying Software-Based Side-Channels to Hardware Vulnerabilities
A Kwong
2023
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's Password Leak Detect Protocol
A Kwong, W Wang, J Kim, J Berger, D Genkin, E Ronen, H Shacham, ...
USENIX Security Symposium (USENIX Security), 2023
2023
Poster: Blue Note-How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems
C Bolton, S Rampazzi, C Li, A Kwong, W Xu, K Fu
The system can't perform the operation now. Try again later.
Articles 1–14