Volgen
Anil Kurmus
Anil Kurmus
IBM Research - Zurich
Geverifieerd e-mailadres voor zurich.ibm.com - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
AsyncShock: Exploiting synchronisation bugs in Intel SGX enclaves
N Weichbrodt, A Kurmus, P Pietzuch, R Kapitza
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
2602016
Smotherspectre: exploiting speculative execution through port contention
A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
2282019
Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring.
A Kurmus, R Tartler, D Dorneanu, B Heinloth, V Rothberg, A Ruprecht, ...
NDSS, 2013
1132013
Secure isolation of tenant resources in a multi-tenant storage system using a security gateway
ME Factor, D Hadas, EK Kolodner, A Kurmus, A Shulman-Peleg, ...
US Patent 9,411,973, 2016
1052016
Implementation and implications of a stealth hard-drive backdoor
J Zaddach, A Kurmus, D Balzarotti, EO Blass, A Francillon, T Goodspeed, ...
Proceedings of the 29th annual computer security applications conference …, 2013
1052013
Attack surface reduction for commodity OS kernels: trimmed garden plants may attract less bugs
A Kurmus, A Sorniotti, R Kapitza
Proceedings of the Fourth European Workshop on System Security, 6, 2011
532011
Secure logical isolation for multi-tenancy in cloud storage
M Factor, D Hadas, A Harnama, N Har'El, EK Kolodner, A Kurmus, ...
2013 IEEE 29th Symposium on Mass Storage Systems and Technologies (MSST), 1-5, 2013
492013
A Comparison of Secure Multi-tenancy Architectures for Filesystem Storage Clouds
A Kurmus, M Gupta, R Pletka, C Cachin, R Haas
Proceedings of the 12th International Middleware Conference, 2011
462011
Secure isolation of tenant resources in a multi-tenant storage system using a gatekeeper
ME Factor, D Hadas, EK Kolodner, A Kurmus, A Shulman-Peleg, ...
US Patent App. 13/875,300, 2014
422014
Secure cloud maintenance: protecting workloads against insider attacks
S Bleikertz, A Kurmus, ZA Nagy, M Schunter
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
372012
Speculator: a tool to analyze speculative execution attacks and mitigations
A Mambretti, M Neugschwandtner, A Sorniotti, E Kirda, W Robertson, ...
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
362019
A tale of two kernels: Towards ending kernel hardening wars with split kernel
A Kurmus, R Zippel
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
352014
Quantifiable Run-time Kernel Attack Surface Reduction
A Kurmus, S Dechand, R Kapitza
DIMVA'14, 2014
352014
Design and implementation of a key-lifecycle management system
M Björkqvist, C Cachin, R Haas, XY Hu, A Kurmus, R Pawlitzek, M Vukolić
Financial Cryptography and Data Security, 160-174, 2010
352010
Automatic {OS} Kernel {TCB} Reduction by Leveraging {Compile-Time} Configurability
R Tartler, A Kurmus, B Heinloth, V Rothberg, A Ruprecht, D Dorneanu, ...
Eighth Workshop on Hot Topics in System Dependability (HotDep 12), 2012
322012
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks
A Kurmus, N Ioannou, M Neugschwandtner, N Papandreou, T Parnell
11th USENIX Workshop on Offensive Technologies (WOOT 17), 2017
312017
The {Huge }-Family of Protocols for RFID-Privacy and Authentication
EO Blass, A Kurmus, R Molva, G Noubir, A Shikfa
Dependable and Secure Computing, IEEE Transactions on, 1-1, 2011
302011
PSP: private and secure payment with RFID
EO Blass, A Kurmus, R Molva, T Strufe
Proceedings of the 8th ACM workshop on Privacy in the electronic society, 51-60, 2009
232009
Secure isolation of tenant resources in a multi-tenant storage systemwith inter-server communication
ME Factor, D Hadas, EK Kolodner, A Kurmus, A Shulman-Peleg, ...
US Patent App. 13/875,303, 2014
222014
A transparent defense against USB eavesdropping attacks
M Neugschwandtner, A Beitler, A Kurmus
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
212016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20