Boris Köpf
Boris Köpf
Azure Research, Microsoft
Verified email at - Homepage
Cited by
Cited by
An information-theoretic model for adaptive side-channel attacks
B Köpf, D Basin
14th ACM Conference on Computer and Communications Security (CCS), 286-296, 2007
Cacheaudit: A tool for the static analysis of cache side channels
G Doychev, B Köpf, L Mauborgne, J Reineke
ACM Transactions on information and system security (TISSEC) 18 (1), 1-32, 2015
Probabilistic relational reasoning for differential privacy
G Barthe, B Köpf, F Olmedo, S Zanella Béguelin
ACM SIGPLAN Notices 47 (1), 97-110, 2012
Automatic discovery and quantification of information leaks
M Backes, B Köpf, A Rybalchenko
30th IEEE Symposium on Security and Privacy, 141-153, 2009
Spectector: Principled Detection of Speculative Information Flows
M Guarnieri, B Köpf, JF Morales, J Reineke, A Sánchez
41st IEEE Symposium on Security and Privacy, 2020
Theory and practice of finding eviction sets
P Vila, B Köpf, JF Morales
40th IEEE Symposium on Security and Privacy 2019, 2018
Fast and simple horizontal coordinate assignment
U Brandes, B Köpf
International Symposium on Graph Drawing, 31-44, 2001
Automatic quantification of cache side-channels
B Köpf, L Mauborgne, M Ochoa
International Conference on Computer Aided Verification (CAV), 564-580, 2012
A provably secure and efficient countermeasure against timing attacks
B Köpf, M Dürmuth
IEEE Computer Security Foundations Symposium (CSF), 324-335, 2009
Analyzing information leakage of updates to natural language models
S Zanella-Béguelin, L Wutschitz, S Tople, V Rühle, A Paverd, ...
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
Information-theoretic bounds for differentially private mechanisms
G Barthe, B Kopf
IEEE Computer Security Foundations Symposium (CSF), 191-204, 2011
Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks
B Köpf, G Smith
IEEE Computer Security Foundations Symposium (CSF), 44-56, 2010
Visone software for visual social network analysis
M Baur, M Benkert, U Brandes, S Cornelsen, M Gaertler, B Köpf, J Lerner, ...
International symposium on graph drawing, 463-464, 2001
Hardware-software contracts for secure speculation
M Guarnieri, B Köpf, J Reineke, P Vila
2021 IEEE Symposium on Security and Privacy (SP), 1868-1883, 2021
Approximation and randomization for quantitative information-flow analysis
B Köpf, A Rybalchenko
2010 23rd IEEE Computer Security Foundations Symposium, 3-14, 2010
Rigorous analysis of software countermeasures against cache attacks
G Doychev, B Köpf
ACM Conference on Programming Language Design and Implementation (PLDI), 406-421, 2017
Loophole: Timing attacks on shared event loops in chrome
P Vila, B Köpf
26th USENIX Security Symposium (USENIX Security), 849-864, 2017
Speaker recognition in encrypted voice streams
M Backes, G Doychev, M Dürmuth, B Köpf
European Symposium on Research in Computer Security (ESORICS), 508-523, 2010
Transformational typing and unification for automatically correcting insecure programs
B Köpf, H Mantel
International Journal of Information Security 6 (2), 107-131, 2007
Preventing Side-Channel Leaks in Web Traffic: A Formal Approach.
M Backes, G Doychev, B Köpf
Network and Distributed Systems Symposium (NDSS), 2013
The system can't perform the operation now. Try again later.
Articles 1–20