Anil Kurmus
Anil Kurmus
IBM Research - Zurich
Verified email at zurich.ibm.com - Homepage
Title
Cited by
Cited by
Year
AsyncShock: Exploiting synchronisation bugs in Intel SGX enclaves
N Weichbrodt, A Kurmus, P Pietzuch, R Kapitza
European Symposium on Research in Computer Security, 440-457, 2016
1402016
Implementation and implications of a stealth hard-drive backdoor
J Zaddach, A Kurmus, D Balzarotti, EO Blass, A Francillon, T Goodspeed, ...
Proceedings of the 29th annual computer security applications conference …, 2013
792013
Attack Surface Metrics and Automated Compile-Time OS Kernel Tailoring.
A Kurmus, R Tartler, D Dorneanu, B Heinloth, V Rothberg, A Ruprecht, ...
NDSS, 2013
702013
Secure isolation of tenant resources in a multi-tenant storage system using a security gateway
ME Factor, D Hadas, EK Kolodner, A Kurmus, A Shulman-Peleg, ...
US Patent 9,411,973, 2016
562016
SMoTherSpectre: exploiting speculative execution through port contention
A Bhattacharyya, A Sandulescu, M Neugschwandtner, A Sorniotti, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
512019
A Comparison of Secure Multi-tenancy Architectures for Filesystem Storage Clouds
A Kurmus, M Gupta, R Pletka, C Cachin, R Haas
Proceedings of the 12th International Middleware Conference, 2011
402011
Secure logical isolation for multi-tenancy in cloud storage
M Factor, D Hadas, A Harnama, N Har'El, EK Kolodner, A Kurmus, ...
2013 IEEE 29th Symposium on Mass Storage Systems and Technologies (MSST), 1-5, 2013
372013
Attack surface reduction for commodity OS kernels: trimmed garden plants may attract less bugs
A Kurmus, A Sorniotti, R Kapitza
Proceedings of the Fourth European Workshop on System Security, 6, 2011
372011
Secure cloud maintenance: protecting workloads against insider attacks
S Bleikertz, A Kurmus, ZA Nagy, M Schunter
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
312012
The {Huge }-Family of Protocols for RFID-Privacy and Authentication
EO Blass, A Kurmus, R Molva, G Noubir, A Shikfa
Dependable and Secure Computing, IEEE Transactions on, 1-1, 2011
272011
Design and implementation of a key-lifecycle management system
M Björkqvist, C Cachin, R Haas, XY Hu, A Kurmus, R Pawlitzek, M Vukolić
Financial Cryptography and Data Security, 160-174, 2010
252010
Secure isolation of tenant resources in a multi-tenant storage system using a gatekeeper
ME Factor, D Hadas, EK Kolodner, A Kurmus, A Shulman-Peleg, ...
US Patent App. 13/875,300, 2014
232014
A tale of two kernels: Towards ending kernel hardening wars with split kernel
A Kurmus, R Zippel
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
222014
Automatic {OS} Kernel {TCB} Reduction by Leveraging Compile-Time Configurability
R Tartler, A Kurmus, B Heinloth, V Rothberg, A Ruprecht, D Dorneanu, ...
Presented as part of the Eighth Workshop on Hot Topics in System Dependability, 2012
222012
PSP: private and secure payment with RFID
EO Blass, A Kurmus, R Molva, T Strufe
Proceedings of the 8th ACM workshop on Privacy in the electronic society, 51-60, 2009
222009
Quantifiable Run-time Kernel Attack Surface Reduction
A Kurmus, S Dechand, R Kapitza
DIMVA'14, 2014
162014
From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks
A Kurmus, N Ioannou, M Neugschwandtner, N Papandreou, T Parnell
11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17), 2017
152017
Deletion of content in storage systems
C Cachin, R Haas, A Hafner, A Kurmus, A Sorniotti
US Patent App. 14/363,000, 2014
122014
A transparent defense against USB eavesdropping attacks
M Neugschwandtner, A Beitler, A Kurmus
Proceedings of the 9th European Workshop on System Security, 1-6, 2016
102016
PSP: Private and secure payment with RFID
EO Blass, A Kurmus, R Molva, T Strufe
Computer Communications 36 (4), 468-480, 2013
82013
The system can't perform the operation now. Try again later.
Articles 1–20