1. ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching
    M. Caner Tol, and Berk Sunar
  2. Mayhem: Targeted Corruption of Register and Stack Variables
    Andrew J. Adiletta, M. Caner Tol, Yarkın Doröz, and Berk Sunar


  1. Jolt - Recovering TLS Signing Keys via Rowhammer Faults
    Koksal Mus, Yarkın Doröz, M. Caner Tol, Kristi Rahman, and Berk Sunar
    In Proceedings of the 2023 IEEE Symposium on Security and Privacy (SP) 2022
  2. Don’t Knock! Rowhammer at the Backdoor of DNN Models
    M. Caner Tol, Saad Islam, Andrew J. Adiletta, Berk Sunar, and Ziming Zhang
    In Proceedings of the 2023 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2022


  1. FastSpec- Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings
    M. Caner Tol, Berk Gulmezoglu, Koray Yurtseven, and Berk Sunar
    In Proceedings of the 2021 IEEE European Symposium on Security and Privacy (EuroS&P) 2021


  1. Gimme That Model!- A Trusted ML Model Trading Protocol
    Laia Amorós, Syed Mahbub Hafiz, Keewoo Lee, and M Caner Tol
    Protecting Privacy through Homomorphic Encryption 2020


  1. Undermining User Privacy on Mobile Devices Using AI
    Berk Gulmezoglu, Andreas Zankl, M. Caner Tol, Saad Islam, Thomas Eisenbarth, and Berk Sunar
    In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security 2019