Follow
Miro Haller
Title
Cited by
Cited by
Year
Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend
I Puddu, M Schneider, M Haller, S Čapkun
30th USENIX Security Symposium (USENIX Security 21), 663-680, 2021
552021
{HECO}: Fully Homomorphic Encryption Compiler
A Viand, P Jattke, M Haller, A Hithnawi
32nd USENIX Security Symposium (USENIX Security 23), 4715-4732, 2023
46*2023
MEGA: Malleable Encryption Goes Awry
M Backendal, M Haller, KG Paterson
2023 IEEE Symposium on Security and Privacy (SP), 146-163, 2023
222023
Caveat Implementor! Key Recovery Attacks on MEGA
MR Albrecht, M Haller, L Mareková, KG Paterson
Advances in Cryptology–EUROCRYPT 2023: 42nd Annual International Conference …, 2023
92023
Cloud Storage Systems: From Bad Practice to Practical Attacks
M Haller
ETH Zurich, 2022
42022
A formal treatment of end-to-end encrypted cloud storage
M Backendal, H Davis, F Günther, M Haller, KG Paterson
Annual International Cryptology Conference, 40-74, 2024
32024
End-to-End Encrypted Cloud Storage
M Backendal, M Haller, K Paterson
IEEE Security & Privacy 22 (2), 69-74, 2024
22024
{RADIUS/UDP} Considered Harmful
S Goldberg, M Haller, N Heninger, M Milano, D Shumow, M Stevens, ...
33rd USENIX Security Symposium (USENIX Security 24), 7429-7446, 2024
22024
Revisiting Microarchitectural Side-Channels
M Haller
12020
An Empirical Analysis on the Use and Reporting of National Security Letters
A Bellon, M Haller, A Labunets, E Liu, S Savage
arXiv preprint arXiv:2403.02768, 2024
2024
MFKDF: Multiple Factors Knocked Down Flat
M Scarlata, M Backendal, M Haller
Cryptology ePrint Archive, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–11