Follow
Boris Köpf
Boris Köpf
Azure Research, Microsoft
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
An information-theoretic model for adaptive side-channel attacks
B Köpf, D Basin
14th ACM Conference on Computer and Communications Security (CCS), 286-296, 2007
4422007
Cacheaudit: A tool for the static analysis of cache side channels
G Doychev, B Köpf, L Mauborgne, J Reineke
ACM Transactions on Information and System Security (TISSEC) 18 (1), 1-32, 2015
3232015
Automatic discovery and quantification of information leaks
M Backes, B Köpf, A Rybalchenko
30th IEEE Symposium on Security and Privacy, 141-153, 2009
2722009
Probabilistic relational reasoning for differential privacy
G Barthe, B Köpf, F Olmedo, S Zanella Béguelin
ACM SIGPLAN Notices 47 (1), 97-110, 2012
2572012
Automatic quantification of cache side-channels
B Köpf, L Mauborgne, M Ochoa
International Conference on Computer Aided Verification (CAV), 564-580, 2012
1522012
A provably secure and efficient countermeasure against timing attacks
B Köpf, M Dürmuth
IEEE Computer Security Foundations Symposium (CSF), 324-335, 2009
1412009
Fast and simple horizontal coordinate assignment
U Brandes, B Köpf
Graph Drawing: 9th International Symposium, GD 2001 Vienna, Austria …, 2002
1382002
Spectector: Principled Detection of Speculative Information Flows
M Guarnieri, B Köpf, JF Morales, J Reineke, A Sánchez
41st IEEE Symposium on Security and Privacy, 2020
1362020
Theory and practice of finding eviction sets
P Vila, B Köpf, JF Morales
40th IEEE Symposium on Security and Privacy 2019, 2018
1202018
Information-theoretic bounds for differentially private mechanisms
G Barthe, B Kopf
IEEE Computer Security Foundations Symposium (CSF), 191-204, 2011
1072011
Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks
B Köpf, G Smith
IEEE Computer Security Foundations Symposium (CSF), 44-56, 2010
1062010
Visone software for visual social network analysis
M Baur, M Benkert, U Brandes, S Cornelsen, M Gaertler, B Köpf, J Lerner, ...
Graph Drawing: 9th International Symposium, GD 2001 Vienna, Austria …, 2002
992002
Approximation and randomization for quantitative information-flow analysis
B Köpf, A Rybalchenko
2010 23rd IEEE Computer Security Foundations Symposium, 3-14, 2010
952010
Rigorous analysis of software countermeasures against cache attacks
G Doychev, B Köpf
ACM Conference on Programming Language Design and Implementation (PLDI), 406-421, 2017
792017
Loophole: Timing attacks on shared event loops in chrome
P Vila, B Köpf
26th USENIX Security Symposium (USENIX Security), 849-864, 2017
692017
Analyzing information leakage of updates to natural language models
S Zanella-Béguelin, L Wutschitz, S Tople, V Rühle, A Paverd, ...
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
672020
Speaker recognition in encrypted voice streams
M Backes, G Doychev, M Dürmuth, B Köpf
European Symposium on Research in Computer Security (ESORICS), 508-523, 2010
642010
Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
M Backes, G Doychev, B Köpf
Network and Distributed Systems Symposium (NDSS), 2013
592013
Formally bounding the side-channel leakage in unknown-message attacks
M Backes, B Köpf
European Symposium on Research in Computer Security (ESORICS), 517-532, 2008
562008
Hardware-software contracts for secure speculation
M Guarnieri, B Köpf, J Reineke, P Vila
2021 IEEE Symposium on Security and Privacy (SP), 1868-1883, 2021
552021
The system can't perform the operation now. Try again later.
Articles 1–20