Boris Köpf
Boris Köpf
Microsoft Research
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
An information-theoretic model for adaptive side-channel attacks
B Köpf, D Basin
14th ACM Conference on Computer and Communications Security (CCS), 286-296, 2007
3842007
Automatic discovery and quantification of information leaks
M Backes, B Köpf, A Rybalchenko
30th IEEE Symposium on Security and Privacy, 141-153, 2009
2232009
Cacheaudit: A tool for the static analysis of cache side channels
G Doychev, B Köpf, L Mauborgne, J Reineke
ACM Transactions on Information and System Security (TISSEC) 18 (1), 1-32, 2015
2072015
Probabilistic relational reasoning for differential privacy
G Barthe, B Köpf, F Olmedo, S Zanella Béguelin
ACM SIGPLAN Notices 47 (1), 97-110, 2012
1942012
A provably secure and efficient countermeasure against timing attacks
B Köpf, M Dürmuth
IEEE Computer Security Foundations Symposium (CSF), 324-335, 2009
1172009
Fast and simple horizontal coordinate assignment
U Brandes, B Köpf
International Symposium on Graph Drawing, 31-44, 2001
1132001
Automatic quantification of cache side-channels
B Köpf, L Mauborgne, M Ochoa
International Conference on Computer Aided Verification (CAV), 564-580, 2012
1082012
Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks
B Köpf, G Smith
IEEE Computer Security Foundations Symposium (CSF), 44-56, 2010
912010
Approximation and randomization for quantitative information-flow analysis
B Köpf, A Rybalchenko
IEEE Computer Security Foundations Symposium (CSF), 3-14, 2010
812010
Information-theoretic bounds for differentially private mechanisms
G Barthe, B Kopf
IEEE Computer Security Foundations Symposium (CSF), 191-204, 2011
762011
Visone Software for visual social network analysis
M Baur, M Benkert, U Brandes, S Cornelsen, M Gaertler, B Köpf, J Lerner, ...
International Symposium on Graph Drawing, 463-464, 2001
762001
Speaker recognition in encrypted voice streams
M Backes, G Doychev, M Dürmuth, B Köpf
European Symposium on Research in Computer Security (ESORICS), 508-523, 2010
562010
Formally bounding the side-channel leakage in unknown-message attacks
M Backes, B Köpf
European Symposium on Research in Computer Security (ESORICS), 517-532, 2008
552008
Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
M Backes, G Doychev, B Köpf
Network and Distributed Systems Symposium (NDSS), 2013
462013
Rigorous analysis of software countermeasures against cache attacks
G Doychev, B Köpf
ACM Conference on Programming Language Design and Implementation (PLDI), 406-421, 2017
382017
Loophole: Timing attacks on shared event loops in chrome
P Vila, B Köpf
26th USENIX Security Symposium (USENIX Security), 849-864, 2017
332017
Theory and practice of finding eviction sets
P Vila, B Köpf, JF Morales
40th IEEE Symposium on Security and Privacy 2019, 2018
312018
Transformational typing and unification for automatically correcting insecure programs
B Köpf, H Mantel
International Journal of Information Security 6 (2-3), 107-131, 2007
302007
Spectector: Principled Detection of Speculative Information Flows
M Guarnieri, B Köpf, JF Morales, J Reineke, A Sánchez
41st IEEE Symposium on Security and Privacy, 2020
29*2020
Leakage resilience against concurrent cache attacks
G Barthe, B Köpf, L Mauborgne, M Ochoa
International Conference on Principles of Security and Trust, 140-158, 2014
252014
The system can't perform the operation now. Try again later.
Articles 1–20