Radhesh Krishnan Konoth
Radhesh Krishnan Konoth
Adresse e-mail validée de vu.nl
Titre
Citée par
Citée par
Année
Throwhammer: Rowhammer Attacks over the Network and Defenses
A Tatar, RK Konoth, E Athanasopoulos, C Giuffrida, H Bos, K Razavi
The 2018 USENIX Annual Technical Conference (USENIX ATC '18), 2018
632018
Minesweeper: An in-depth look into drive-by cryptocurrency mining and its defense
RK Konoth, E Vineti, V Moonsamy, M Lindorfer, C Kruegel, H Bos, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
602018
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication
RK Konoth, V van der Veen, H Bos
Proceedings of the 20th International Conference on Financial Cryptography …, 2016
452016
ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks
RK Konoth, M Oliverio, A Tatar, D Andriesse, H Bos, C Giuffrida, K Razavi
13th USENIX Symposium on Operating Systems Design and Implementation (OSDI'18), 2018
202018
Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables
B Kollenda, E Göktaş, T Blazytko, P Koppe, R Gawlik, RK Konoth, ...
47th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2017
102017
Malicious cryptocurrency miners: Status and Outlook
RK Konoth, R van Wegberg, V Moonsamy, H Bos
arXiv preprint arXiv:1901.10794, 2019
52019
An in-depth look into drive-by mining and its defense
RK Konoth, E Vineti, V Moonsamy, M Lindorfer, C Kruegel, H Bos, ...
Proc. of ACM Conference on Computer and Communications Security (CCS) 10 …, 2018
52018
VULNERABLE BY DESIGN: MITIGATING DESIGN FLAWS IN HARDWARE AND SOFTWARE
RK Konoth
2020
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions
R Konoth, B Fischer, W Fokkink, K Razavi, E Athanasopoulos, H Bos
5th IEEE European Symposium on Security and Privacy (EuroS&P 2020), 2020
2020
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–9