Seguir
Radhesh Krishnan Konoth
Radhesh Krishnan Konoth
Qualcomm Product Security
Dirección de correo verificada de qti.qualcomm.com - Página principal
Título
Citado por
Citado por
Año
Minesweeper: An in-depth look into drive-by cryptocurrency mining and its defense
RK Konoth, E Vineti, V Moonsamy, M Lindorfer, C Kruegel, H Bos, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2022018
Throwhammer: Rowhammer Attacks over the Network and Defenses
A Tatar, RK Konoth, E Athanasopoulos, C Giuffrida, H Bos, K Razavi
The 2018 USENIX Annual Technical Conference (USENIX ATC '18), 2018
1882018
ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks
RK Konoth, M Oliverio, A Tatar, D Andriesse, H Bos, C Giuffrida, K Razavi
13th USENIX Symposium on Operating Systems Design and Implementation (OSDI'18), 2018
952018
How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication
RK Konoth, V van der Veen, H Bos
Proceedings of the 20th International Conference on Financial Cryptography …, 2016
762016
Malicious cryptocurrency miners: Status and Outlook
RK Konoth, R van Wegberg, V Moonsamy, H Bos
arXiv preprint arXiv:1901.10794, 2019
192019
Towards Automated Discovery of Crash-Resistant Primitives in Binary Executables
B Kollenda, E Göktaş, T Blazytko, P Koppe, R Gawlik, RK Konoth, ...
47th Annual IEEE/IFIP International Conference on Dependable Systems and …, 2017
172017
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions
R Konoth, B Fischer, W Fokkink, K Razavi, E Athanasopoulos, H Bos
5th IEEE European Symposium on Security and Privacy (EuroS&P 2020), 2020
152020
An in-depth look into drive-by mining and its defense
RK Konoth, E Vineti, V Moonsamy, M Lindorfer, C Kruegel, H Bos, ...
Proc. of ACM Conference on Computer and Communications Security (CCS) 10 …, 2018
52018
Device and method for secure communication
HJ Bos, E Athanasopoulos, RK Konoth, K Razavi
US Patent 11,972,031, 2024
2024
VULNERABLE BY DESIGN: MITIGATING DESIGN FLAWS IN HARDWARE AND SOFTWARE
RK Konoth
2020
VU Research Portal
RK Konoth, V van der Veen, H Bos
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–11