Berk Sunar

Follow

Generating author description...

All published works
Action Title Year Authors
+ Euclidean Algorithm 2025 Berk Sunar
+ Binary Euclidean Algorithm 2025 Berk Sunar
+ PDF Chat Non-Halting Queries: Exploiting Fixed Points in LLMs 2024 Ghaith Hammouri
Kemal Derya
Berk Sunar
+ PDF Chat Mayhem: Targeted Corruption of Register and Stack Variables 2024 Andrew J. Adiletta
M. Caner Tol
Yarkın Doröz
Berk Sunar
+ PDF Chat FAULT+PROBE: A Generic Rowhammer-based Bit Recovery Attack 2024 Kemal Derya
M. Caner Tol
Berk Sunar
+ PDF Chat LeapFrog: The Rowhammer Instruction Skip Attack 2024 Andrew J. Adiletta
Caner Tol
Berk Sunar
+ PDF Chat IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems 2023 Thore Tiemann
Zane Weissman
Thomas Eisenbarth
Berk Sunar
+ PDF Chat Don't Knock! Rowhammer at the Backdoor of DNN Models 2023 M. Caner Tol
Saad Islam
Andrew J. Adiletta
Berk Sunar
Ziming Zhang
+ ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching 2023 M. Caner Tol
Berk Sunar
+ Mayhem: Targeted Corruption of Register and Stack Variables 2023 Andrew J. Adiletta
M. Caner Tol
Yarkın Doröz
Berk Sunar
+ Microarchitectural Security of AWS Firecracker VMM for Serverless Cloud Platforms 2023 Zane Weissman
Thore Tiemann
Thomas Eisenbarth
Berk Sunar
+ PDF Chat Signature Correction Attack on Dilithium Signature Scheme 2022 Saad Islam
Koksal Mus
Richa Singh
Patrick Schaumont
Berk Sunar
+ IOTLB-SC: An Accelerator-Independent Leakage Source in Modern Cloud Systems 2022 Thore Tiemann
Zane Weissman
Thomas Eisenbarth
Berk Sunar
+ Signature Correction Attack on Dilithium Signature Scheme 2022 Saad Islam
Koksal Mus
Richa Singh
Patrick Schaumont
Berk Sunar
+ An End-to-End Analysis of EMFI on Bit-sliced Post-Quantum Implementations 2022 Richa Singh
Saad Islam
Berk Sunar
Patrick Schaumont
+ An Optimization Perspective on Realizing Backdoor Injection Attacks on Deep Neural Networks in Hardware. 2021 M. Caner Tol
Saad Islam
Berk Sunar
Ziming Zhang
+ PDF Chat FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings 2021 M. Caner Tol
Berk Gülmezoğlu
Koray Yurtseven
Berk Sunar
+ Don't Knock! Rowhammer at the Backdoor of DNN Models 2021 M. Caner Tol
Saad Islam
Andrew J. Adiletta
Berk Sunar
Ziming Zhang
+ FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings 2020 M. Caner Tol
Koray Yurtseven
Berk Gülmezoğlu
Berk Sunar
+ PDF Chat JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms 2020 Zane Weissman
Thore Tiemann
Daniel Moghimi
Evan Custodio
Thomas Eisenbarth
Berk Sunar
+ CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction. 2020 Daniel Moghimi
Jo Van Bulck
Nadia Heninger
Frank Piessens
Berk Sunar
+ CopyCat: Controlled Instruction-Level Attacks on Enclaves 2020 Daniel Moghimi
Jo Van Bulck
Nadia Heninger
Frank Piessens
Berk Sunar
+ FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings 2020 M. Caner Tol
Berk Gülmezoğlu
Koray Yurtseven
Berk Sunar
+ PDF Chat JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms 2019 Zane Weissman
Thore Tiemann
Daniel Moghimi
Evan Custodio
Thomas Eisenbarth
Berk Sunar
+ PDF Chat DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes 2019 Mehmet Sinan İnci
Thomas Eisenbarth
Berk Sunar
+ TPM-FAIL: TPM meets Timing and Lattice Attacks 2019 Daniel Moghimi
Berk Sunar
Thomas Eisenbarth
Nadia Heninger
+ Undermining User Privacy on Mobile Devices Using AI 2019 Berk Gülmezoğlu
Andreas Zankl
M. Caner Tol
Saad Islam
Thomas Eisenbarth
Berk Sunar
+ SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks 2019 Saad Islam
Daniel Moghimi
Ida Bruhns
Moritz Krebbel
Berk Gülmezoğlu
Thomas Eisenbarth
Berk Sunar
+ Credential Masquerading and OpenSSL Spy: Exploring ROS 2 using DDS security 2019 Vincenzo DiLuoffo
William R. Michalson
Berk Sunar
+ Fallout: Reading Kernel Writes From User Space 2019 Marina Minkin
Daniel Moghimi
Moritz Lipp
Michael Schwarz
Jo Van Bulck
Daniel Genkin
Daniel Gruss
Frank Piessens
Berk Sunar
Yuval Yarom
+ FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning 2019 Berk Gülmezoğlu
Daniel Moghimi
Thomas Eisenbarth
Berk Sunar
+ TPM-FAIL: TPM meets Timing and Lattice Attacks 2019 Daniel Moghimi
Berk Sunar
Thomas Eisenbarth
Nadia Heninger
+ JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms 2019 Zane Weissman
Thore Tiemann
Daniel Moghimi
Evan Custodio
Thomas Eisenbarth
Berk Sunar
+ PDF Chat MicroWalk 2018 Jan Wichelmann
Daniel Moghimi
Thomas Eisenbarth
Berk Sunar
+ PDF Chat MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations 2018 Daniel Moghimi
Jan Wichelmann
Thomas Eisenbarth
Berk Sunar
+ Undermining User Privacy on Mobile Devices Using AI 2018 Berk Gülmezoğlu
Andreas Zankl
M. Caner Tol
Saad Islam
Thomas Eisenbarth
Berk Sunar
+ DeepCloak: Adversarial Crafting As a Defensive Measure to Cloak Processes 2018 Mehmet Sinan İnci
Thomas Eisenbarth
Berk Sunar
+ PerfWeb: How to Violate Web Privacy with Hardware Performance Events 2017 Berk Gülmezoğlu
Andreas Zankl
Thomas Eisenbarth
Berk Sunar
+ PDF Chat PerfWeb: How to Violate Web Privacy with Hardware Performance Events 2017 Berk Gülmezoğlu
Andreas Zankl
Thomas Eisenbarth
Berk Sunar
+ Did we learn from LLC Side Channel Attacks? A Cache Leakage Detection Tool for Crypto Libraries 2017 Gorka Irazoqui
Kai Cong
Xiaofei Guo
Hareesh Khattri
Arun K. Kanuparthi
Thomas Eisenbarth
Berk Sunar
+ PerfWeb: How to Violate Web Privacy with Hardware Performance Events 2017 Berk Gülmezoğlu
Andreas Zankl
Thomas Eisenbarth
Berk Sunar
+ Euclidean Algorithm 2011 Berk Sunar
+ A Euclidean Algorithm for Normal Bases 2006 Berk Sunar
+ Optimal tower fields for hyperelliptic curve cryptosystems 2005 Selçuk Baktır
Jan Pelzl
Thomas Wollinger
Berk Sunar
Christof Paar
Common Coauthors
Commonly Cited References
Action Title Year Authors # of times referenced
+ PDF Chat Flush+Flush: A Fast and Stealthy Cache Attack 2016 Daniel Gruss
Clémentine Maurice
Klaus W. Wagner
Stefan Mangard
9
+ PDF Chat Another Flip in the Wall of Rowhammer Defenses 2018 Daniel Gruss
Moritz Lipp
Michael Schwarz
Daniel Genkin
Jonas Juffinger
Sioli O’Connell
Wolfgang Schoechl
Yuval Yarom
7
+ PDF Chat Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript 2016 Daniel Gruss
Clémentine Maurice
Stefan Mangard
6
+ PDF Chat PerfWeb: How to Violate Web Privacy with Hardware Performance Events 2017 Berk Gülmezoğlu
Andreas Zankl
Thomas Eisenbarth
Berk Sunar
5
+ PDF Chat CacheZoom: How SGX Amplifies the Power of Cache Attacks 2017 Daniel Moghimi
Gorka Irazoqui
Thomas Eisenbarth
5
+ PDF Chat Spectre Attacks: Exploiting Speculative Execution 2019 Paul Kocher
Jann Horn
Anders Fogh
Daniel Genkin
Daniel Gruss
Werner Haas
Mike Hamburg
Moritz Lipp
Stefan Mangard
Thomas Prescher
5
+ PDF Chat TRRespass: Exploiting the Many Sides of Target Row Refresh 2020 Pietro Frigo
Emanuele Vannacc
Hasan Hassan
Victor van der Veen
Onur Mutlu
Cristiano Giuffrida
Herbert Bos
Kaveh Razavi
4
+ SgxPectre: Stealing Intel Secrets from SGX Enclaves Via Speculative Execution 2019 Guoxing Chen
Sanchuan Chen
Yuan Xiao
Yinqian Zhang
Zhiqiang Lin
Ten H. Lai
4
+ LazyFP: Leaking FPU Register State using Microarchitectural Side-Channels 2018 Julian Stecklina
Thomas Prescher
4
+ PDF Chat Are We Susceptible to Rowhammer? An End-to-End Methodology for Cloud Providers 2020 Lucian Cojocar
Jeremie Kim
Minesh Patel
Lillian Tsai
Stefan Saroiu
Alec Wolman
Onur Mutlu
4
+ FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning 2019 Berk Gülmezoğlu
Daniel Moghimi
Thomas Eisenbarth
Berk Sunar
3
+ The thirteen books of Euclid's Elements 1956 Euclid
3
+ Speculative Buffer Overflows: Attacks and Defenses 2018 Vladimir Kiriansky
Carl A. Waldspurger
3
+ PDF Chat Nethammer: Inducing Rowhammer Faults through Network Requests 2020 Moritz Lipp
Michael Schwarz
Lukas Raab
Lukas Lamster
Misiker Tadesse Aga
Clémentine Maurice
Daniel Gruss
3
+ PDF Chat A Software Approach to Defeating Side Channels in Last-Level Caches 2016 Ziqiao Zhou
Michael K. Reiter
Yinqian Zhang
3
+ PDF Chat ret2spec 2018 Giorgi Maisuradze
Christian Rossow
3
+ PDF Chat Unsupervised Anomaly-Based Malware Detection Using Hardware Features 2014 Adrian Tang
Simha Sethumadhavan
Salvatore J. Stolfo
3
+ Attention is All you Need 2017 Ashish Vaswani
Noam Shazeer
Niki Parmar
Jakob Uszkoreit
Llion Jones
Aidan N. Gomez
Łukasz Kaiser
Illia Polosukhin
2
+ PDF Chat Long Text Generation via Adversarial Training with Leaked Information 2018 Jiaxian Guo
Sidi Lu
Han Cai
Weinan Zhang
Yong Yu
Jun Wang
2
+ Neural Machine Translation Inspired Binary Code Similarity Comparison beyond Function Pairs 2019 Fei Zuo
Xiaopeng Li
P.G. Young
Lannan Luo
Qiang Zeng
Zhexin Zhang
2
+ PDF Chat Theory and Practice of Finding Eviction Sets 2019 Pepe Vila
Boris Köpf
José F. Morales
2
+ Generative Adversarial Text to Image Synthesis 2016 Scott Reed
Zeynep Akata
Xinchen Yan
Lajanugen Logeswaran
Bernt Schiele
Honglak Lee
2
+ Efficient Estimation of Word Representations in Vector Space 2013 Tomáš Mikolov
Kai Chen
Greg S. Corrado
Jay B. Dean
2
+ PDF Chat Grad-CAM: Visual Explanations from Deep Networks via Gradient-Based Localization 2017 Ramprasaath R. Selvaraju
Michael Cogswell
Abhishek Das
Ramakrishna Vedantam
Devi Parikh
Dhruv Batra
2
+ PDF Chat High-Resolution Image Synthesis and Semantic Manipulation with Conditional GANs 2018 Ting-Chun Wang
Ming-Yu Liu
Jun-Yan Zhu
Andrew Tao
Jan Kautz
Bryan Catanzaro
2
+ PDF Chat A Style-Based Generator Architecture for Generative Adversarial Networks 2019 Tero Karras
Samuli Laine
Timo Aila
2
+ Euclid's Algorithm for Large Numbers 1938 D. H. Lehmer
2
+ PDF Chat Spectre Returns! Speculation Attacks using the Return Stack Buffer 2024 Esmaeil Mohammadian Koruyeh
Khaled N. Khasawneh
Chengyu Song
Nael Abu‐Ghazaleh
2
+ PDF Chat Rigorous analysis of software countermeasures against cache attacks 2017 Goran Doychev
Boris Köpf
2
+ SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks 2019 Saad Islam
Daniel Moghimi
Ida Bruhns
Moritz Krebbel
Berk Gülmezoğlu
Thomas Eisenbarth
Berk Sunar
2
+ PDF Chat SAFE: Self-Attentive Function Embeddings for Binary Similarity 2019 Luca Massarelli
Giuseppe Antonio Di Luna
Fabio Petroni
Roberto Baldoni
Leonardo Querzoni
2
+ PDF Chat RowHammer: A Retrospective 2019 Onur Mutlu
Jeremie S. Kim
2
+ PDF Chat MicroWalk 2018 Jan Wichelmann
Daniel Moghimi
Thomas Eisenbarth
Berk Sunar
2
+ Sequence to Sequence Learning with Neural Networks 2014 Ilya Sutskever
Oriol Vinyals
Quoc V. Le
2
+ A Systematic Evaluation of Transient Execution Attacks and Defenses 2018 Claudio Canella
Jo Van Bulck
Michael Schwarz
Moritz Lipp
Benjamin von Berg
Philipp Ortner
Frank Piessens
Dmitry Evtyushkin
Daniel Gruss
2
+ ConTExT: Leakage-Free Transient Execution 2019 Michael Schwarz
Robert Schilling
Florian Kargl
Moritz Lipp
Claudio Canella
Daniel Gruss
2
+ Generating Videos with Scene Dynamics 2016 Carl Vondrick
Hamed Pirsiavash
Antonio Torralba
2
+ Sequence Aggregation Rules for Anomaly Detection in Computer Network Traffic 2018 Benjamin J. Radford
Bartley D. Richardson
Shawn Davis
2
+ ARMageddon: Cache Attacks on Mobile Devices 2015 Moritz Lipp
Daniel Gruss
Raphael Spreitzer
Clémentine Maurice
Stefan Mangard
2
+ PDF Chat Deep neural networks are easily fooled: High confidence predictions for unrecognizable images 2015 Anh‐Tu Nguyen
Jason Yosinski
Jeff Clune
2
+ Explaining and Harnessing Adversarial Examples 2014 Ian Goodfellow
Jonathon Shlens
Christian Szegedy
2
+ Spectre Returns! Speculation Attacks using the Return Stack Buffer 2018 Esmaeil Mohammadian Koruyeh
Khaled N. Khasawneh
Chengyu Song
Nael Abu‐Ghazaleh
2
+ MaskGAN: Better Text Generation via Filling in the______ 2018 William Fedus
Ian Goodfellow
Andrew M. Dai
2
+ PDF Chat Adversarial Learning for Neural Dialogue Generation 2017 Jiwei Li
Will Monroe
Tianlin Shi
Sébastien Jean
Alan Ritter
Dan Jurafsky
2
+ A Cross-Architecture Instruction Embedding Model for Natural Language Processing-Inspired Binary Code Analysis 2018 Kimberly Redmond
Lannan Luo
Qiang Zeng
2
+ PDF Chat Practical Black-Box Attacks against Machine Learning 2017 Nicolas Papernot
Patrick McDaniel
Ian Goodfellow
Somesh Jha
Z. Berkay Celik
Ananthram Swami
2
+ Hardware Trojan Attacks on Neural Networks 2018 Joseph Clements
Yingjie Lao
2
+ An analysis of Lehmer's Euclidean GCD algorithm 1995 Jonathan Sorenson
2
+ BadNets: Identifying Vulnerabilities in the Machine Learning Model Supply Chain 2017 Tianyu Gu
Brendan Dolan-Gavitt
Siddharth Garg
2
+ A Course in Computational Algebraic Number Theory 1993 Henri Cohen
2