Billy Brumley

20062021

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • 2021

    A Formula for Disaster: A Unified Approach to Elliptic Curve Special-Point-Based Attacks

    Sedlacek, V., Chi-Domínguez, J. J., Jancar, J. & Brumley, B. B., 2021, Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 1. Tibouchi, M. & Wang, H. (eds.). Springer, p. 130-159 30 p. (Lecture Notes in Computer Science; vol. 13090).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • Attestation Waves: Platform Trust via Remote Power Analysis

    Delgado-Lozano, I. M., Martínez-Rodríguez, M. C., Bakas, A., Brumley, B. B. & Michalas, A., 2021, Cryptology and Network Security - 20th International Conference, CANS 2021, Proceedings. Conti, M., Stevens, M. & Krenn, S. (eds.). Springer, p. 460-482 23 p. (Lecture Notes in Computer Science ; vol. 13099 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • Online Template Attacks: Revisited

    Cabrera Aldaya, A. & Brumley, B., 9 Jul 2021, In: IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). 2021, 3, p. 28-59 32 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    2 Downloads (Pure)
  • Secure IT Systems: 26th Nordic Conference, NordSec 2021, Virtual Event, November 29–30, 2021, Proceedings

    Tuveri, N. (ed.), Michalas, A. (ed.) & Brumley, B. B. (ed.), 2021, Cham: Springer Nature Switzerland AG. 213 p. (Lecture Notes in Computer Science; vol. 13115)

    Research output: Book/ReportAnthologyScientificpeer-review

  • SoK: Remote Power Analysis

    Martínez-Rodríguez, M. C., Delgado-Lozano, I. M. & Brumley, B. B., 17 Aug 2021, 16th International Conference on Availability, Reliability and Security, ARES 2021. ACM, 12 p. 7. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • 2020

    Certified Side Channels

    Pereida García, C., Hassan, S. U., Tuveri, N., Gridin, I., Cabrera Aldaya, A. & Brumley, B. B., 2020, 29th USENIX Security Symposium, USENIX Security 2020. p. 2021-2038 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • Déjà Vu: Side-Channel Analysis of Mozilla's NSS

    Hassan, S. U., Gridin, I., Delgado-Lozano, I. M., García, C. P., Chi-Domínguez, J. J., Aldaya, A. C. & Brumley, B. B., 30 Oct 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 1887-1902 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    29 Downloads (Pure)
  • From A to Z - Projective coordinates leakage in the wild

    Cabrera Aldaya, A., Pereida García, C. & Brumley, B. B., Jun 2020, In: IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). 2020, 3, p. 428-453

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    198 Downloads (Pure)
  • Set It and Forget It! Turnkey ECC for Instant Integration

    Belyavsky, D., Brumley, B. B., Chi-Domínguez, J-J., Rivera-Zamarripa, L. & Ustinov, I., 2020, Annual Computer Security Applications Conference (ACSAC). ACM, p. 760-771 12 p. 3427291

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    4 Downloads (Pure)
  • When one vulnerable primitive turns viral - Novel single-trace attacks on ECDSA and RSA

    Cabrera Aldaya, A. & Brumley, B. B., 2020, In: IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). 2020, 2, p. 196-221

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    80 Downloads (Pure)
  • 2019

    Batch Binary Weierstrass

    Brumley, B. B., Hassan, S. U., Shaindlin, A., Tuveri, N. & Vuojärvi, K., 2 Oct 2019, Progress in Cryptology - LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019, Proceedings. Schwabe, P. & Thériault, N. (eds.). Springer Verlag, p. 364-384 21 p. (Lecture Notes in Computer Science; vol. 11774).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • Cache-Timing Attacks on RSA Key Generation

    Aldaya, A. C., Pereida García, C., Alvarez Tapia, L. M. & Brumley, B. B., 2019, In: IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). 2019, 4, p. 213-242 30 p.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
  • Port Contention for Fun and Profit

    Cabrera Aldaya, A., Brumley, B. B., ul Hassan, S., Pereida García, C. & Tuveri, N., 20 May 2019, 2019 IEEE Symposium on Security and Privacy (SP) (2019). San Francisco, CA, US: IEEE, p. 1037-1054 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    22 Citations (Scopus)
  • Start your ENGINEs: Dynamically Loadable Contemporary Crypto

    Tuveri, N. & Brumley, B., Sep 2019, 2019 IEEE Cybersecurity Development (SecDev).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    24 Downloads (Pure)
  • Triggerflow: Regression Testing by Advanced Execution Path Inspection

    Gridin, I., Pereida García, C., Tuveri, N. & Brumley, B. B., 2019, Detection of Intrusions and Malware, and Vulnerability Assessment - 16th International Conference, DIMVA 2019, Proceedings. Maurice, C., Giacinto, G., Perdisci, R., Almgren, M. & Perdisci, R. (eds.). Springer Verlag, p. 330-350 21 p. (Lecture Notes in Computer Science; vol. 11543).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    4 Citations (Scopus)
  • 2018

    Memory Tampering Attack on Binary GCD Based Inversion Algorithms

    Aldaya, A. C., Brumley, B. B., Sarmiento, A. J. C. & Sánchez-Solano, S., 2018, In: International Journal of Parallel Programming. p. 1-20

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    56 Downloads (Pure)
  • Side-Channel Analysis of SM2: A Late-Stage Featurization Case Study

    Tuveri, N., ul Hassan, S., Pereida Garcia, C. & Brumley, B., 3 Dec 2018, ACSAC '18 Proceedings of the 34th Annual Computer Security Applications Conference. New York: ACM, p. 147-160 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    11 Citations (Scopus)
    59 Downloads (Pure)
  • 2017

    Constant-Time Callees with Variable-Time Callers

    Pereida Garcia, C. & Brumley, B. B., 2017, 26th USENIX Security Symposium (USENIX Security 17). Vancouver, BC: The USENIX Association, p. 83-98 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    23 Citations (Scopus)
    49 Downloads (Pure)
  • 2016

    Amplifying Side Channels Through Performance Degradation

    Allan, T., Brumley, B. B., Falkner, K., van de Pol, J. & Yarom, Y., 5 Dec 2016, Proceedings of the 32nd Annual Conference on Computer Security Applications. ACM, p. 422-435 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    39 Citations (Scopus)
  • "Make Sure DSA Signing Exponentiations Really are Constant-Time"

    García, C. P., Brumley, B. B. & Yarom, Y., 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016. Weippl, E. R., Katzenbeisser, S., Kruegel, C., Myers, A. C. & Halevi, S. (eds.). ACM, p. 1639-1650 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    37 Citations (Scopus)
    98 Downloads (Pure)
  • Secure IT Systems: 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2-4, 2016. Proceedings

    Brumley, B. B. (ed.) & Röning, J. (ed.), 2016, Springer International Publishing AG. (Lecture Notes in Computer Science; vol. 10014)

    Research output: Book/ReportAnthologypeer-review

  • 2015

    Cache storage attacks

    Brumley, B. B., 2015, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 22-34 13 p. (Lecture Notes in Computer Science; vol. 9048).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    39 Downloads (Pure)
  • Faster 128-EEA3 and 128-EIA3 Software

    Avanzi, R. & Brumley, B. B., 2015, Information Security, 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings. Desmedt, Y. (ed.). Springer Verlag, Vol. 7807. p. 199-208 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Faster Binary Curve Software: A Case Study

    Brumley, B. B., 2015, Secure IT Systems - 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings. Buchegger, S. & Dam, M. (eds.). Springer Verlag, Vol. 9417. p. 91-105 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    File
    49 Downloads (Pure)
  • Faster Software for Fast Endomorphisms

    Brumley, B. B., 2015, Constructive Side-Channel Analysis and Secure Design - 6th International Workshop, COSADE 2015, Berlin, Germany, April 13-14, 2015. Revised Selected Papers. Mangard, S. & Poschmann, A. Y. (eds.). Springer Verlag, Vol. 9064. p. 127-140 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    7 Citations (Scopus)
  • WHIRLBOB, the Whirlpool Based Variant of STRIBOB

    Saarinen, M-J. O. & Brumley, B. B., 2015, Secure IT Systems - 20th Nordic Conference, NordSec 2015, Stockholm, Sweden, October 19-21, 2015, Proceedings. Buchegger, S. & Dam, M. (eds.). Springer Verlag, p. 106-122 17 p. (Lecture Notes in Computer Science; vol. 9417).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    3 Citations (Scopus)
  • 2012

    Practical realisation and elimination of an ECC-related software bug attack

    Brumley, B., Barbosa, M., Page, D. & Vercauteren, F., 2012, Topics in Cryptology, CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, Proceedings. Vol. 7178 LNCS. p. 171-186 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7178 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    21 Citations (Scopus)
  • Secure and fast implementations of two involution ciphers

    Brumley, B. B., 2012, Information Security Technology for Applications - 15th Nordic Conference on Secure IT Systems, NordSec 2010, Revised Selected Papers. Vol. 7127 LNCS. p. 269-282 14 p. (Lecture Notes in Computer Science; vol. 7127 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    1 Citation (Scopus)
  • 2011

    Bit-sliced binary normal basis multiplication

    Brumley, B. & Page, D., 2011, Proceedings - 20th IEEE Symposium on Computer Arithmetic, ARITH-20. p. 205-212 8 p. 5992128

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    1 Citation (Scopus)
  • Cache-Timing Attacks and Shared Contexts

    Brumley, B. B. & Tuveri, N., Feb 2011, p. 233-242. 10 p.

    Research output: Other conference contributionAbstractScientific

    Open Access
    File
    56 Downloads (Pure)
  • Remote timing attacks are still practical

    Brumley, B. & Tuveri, N., 2011, Computer Security, ESORICS 2011 - 16th European Symposium on Research in Computer Security, Proceedings. Vol. 6879 LNCS. p. 355-371 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6879 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    97 Citations (Scopus)
  • 2010

    Consecutive S-box lookups: A timing attack on SNOW 3G

    Brumley, B. B., Hakala, R. M., Nyberg, K. & Sovio, S., 1 Dec 2010, Information and Communications Security - 12th International Conference, ICICS 2010, Proceedings. p. 171-185 15 p. (Lecture Notes in Computer Science; vol. 6476).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    13 Citations (Scopus)
  • Conversion algorithms and implementations for koblitz curve cryptography

    Brumley, B. B. & Jarvinen, K. U., 4 Jan 2010, In: IEEE Transactions on Computers. 59, 1, p. 81-92 12 p., 5255226.

    Research output: Contribution to journalArticleScientificpeer-review

    19 Citations (Scopus)
  • New results on instruction cache attacks

    AcIiçmez, O., Brumley, B. B. & Grabher, P., 5 Nov 2010, Cryptographic Hardware and Embedded Systems, CHES 2010 - 12th International Workshop, Proceedings. p. 110-124 15 p. (Lecture Notes in Computer Science; vol. 6225).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    83 Citations (Scopus)
  • 2009

    Cache-timing template attacks

    Brumley, B. B. & Hakala, R. M., 28 Dec 2009, Advances in Cryptology - ASIACRYPT 2009 - 15th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 667-684 18 p. (Lecture Notes in Computer Science; vol. 5912).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
    78 Citations (Scopus)
  • On modular decomposition of integers

    Brumley, B. B. & Nyberg, K., 9 Nov 2009, Progress in Cryptology - AFRICACRYPT 2009 - Second International Conference on Cryptology in Africa, Proceedings. p. 386-402 17 p. (Lecture Notes in Computer Science; vol. 5580).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    2 Citations (Scopus)
  • 2008

    Attacks on Message Stream Encryption

    Brumley, B. B. & Valkonen, J., 2008, Proceedings of the 13th Nordic Workshop on Secure IT Systems, NordSec 2008. Nielson, H. R. & Probst, C. W. (eds.). Technical University of Denmark, p. 163-173 11 p. (IMM Technical Reports).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
  • Fast point decompression for standard elliptic curves

    Brumley, B. B. & Järvinen, K. U., 1 Jul 2008, Public Key Infrastructure - 5th European PKI Workshop: Theory and Practice, EuroPKI 2008, Proceedings. p. 134-149 16 p. (Lecture Notes in Computer Science; vol. 5057).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    5 Citations (Scopus)
  • Implementing cryptography for packet level authentication

    Brumley, B. B., 2008, Proceedings of the 2008 International Conference on Security and Management, SAM 2008. CSREA Press, p. 475-480 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

  • 2007

    Differential properties of elliptic curves and blind signatures

    Brumley, B. B. & Nyberg, K., 1 Dec 2007, Information Security - 10th International Conference, ISC 2007, Proceedings. p. 376-389 14 p. (Lecture Notes in Computer Science; vol. 4779).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    3 Citations (Scopus)
  • Koblitz curves and integer equivalents of frobenius expansions

    Brumley, B. B. & Järvinen, K., 1 Dec 2007, Selected Areas in Cryptography - 14th International Workshop, SAC 2007, Revised Selected Papers. p. 126-137 12 p. (Lecture Notes in Computer Science; vol. 4876).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    9 Citations (Scopus)
  • 2006

    Efficient three-term simultaneous elliptic scalar multiplication with applications

    Brumley, B. B., 2006, 11th Nordic Conference on Secure IT Systems, NordSec 2006, Linköping, Sweden, October 19-20, 2006, Proceedings. Fåk, V. (ed.). p. 105-116 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    Open Access
  • Left-to-right signed-bit τ -adic representations of n integers

    Brumley, B. B., 1 Jan 2006, Information and Communications Security - 8th International Conference, ICICS 2006, Proceedings. Springer Verlag, p. 469-478 10 p. (Lecture Notes in Computer Science; vol. 4307).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

    3 Citations (Scopus)