@misc{tol2023zeroleak,title={ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching},author={Tol, M. Caner and Sunar, Berk},eprint={2308.13062},archiveprefix={arXiv},primaryclass={cs.CR},year={2023},}
Mayhem: Targeted Corruption of Register and Stack Variables
Andrew J. Adiletta, M. Caner Tol, Yarkın Doröz, and Berk Sunar
@misc{adiletta2023mayhem,title={Mayhem: Targeted Corruption of Register and Stack Variables},author={Adiletta, Andrew J. and Tol, M. Caner and Doröz, Yarkın and Sunar, Berk},eprint={2309.02545},archiveprefix={arXiv},primaryclass={cs.CR},year={2023},}
2022
Jolt - Recovering TLS Signing Keys via Rowhammer Faults
Koksal Mus, Yarkın Doröz, M. Caner Tol, Kristi Rahman, and Berk Sunar
In Proceedings of the 2023 IEEE Symposium on Security and Privacy (SP) 2022
@inproceedings{mus2022jolt,title={Jolt - Recovering TLS Signing Keys via Rowhammer Faults},author={Mus, Koksal and Doröz, Yarkın and Tol, M. Caner and Rahman, Kristi and Sunar, Berk},booktitle={Proceedings of the 2023 IEEE Symposium on Security and Privacy (SP)},year={2022},video={https://www.youtube.com/watch?v=Rp8-vtahyiI}}
Don’t Knock! Rowhammer at the Backdoor of DNN Models
M. Caner Tol, Saad Islam, Andrew J. Adiletta, Berk Sunar, and Ziming Zhang
In Proceedings of the 2023 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2022
@inproceedings{tol2023dont,title={Don't {K}nock! {R}owhammer at the {B}ackdoor of {DNN} {M}odels},author={Tol, M. Caner and Islam, Saad and Adiletta, Andrew J. and Sunar, Berk and Zhang, Ziming},booktitle={Proceedings of the 2023 IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)},pages={616--632},year={2022},organization={IEEE},}
2021
FastSpec- Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings
M. Caner Tol, Berk Gulmezoglu, Koray Yurtseven, and Berk Sunar
In Proceedings of the 2021 IEEE European Symposium on Security and Privacy (EuroS&P) 2021
@inproceedings{tol2021fastspec,title={FastSpec- Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings},author={Tol, M. Caner and Gulmezoglu, Berk and Yurtseven, Koray and Sunar, Berk},booktitle={Proceedings of the 2021 IEEE European Symposium on Security and Privacy (EuroS\&P)},pages={616--632},year={2021},organization={IEEE},video={https://www.youtube.com/watch?v=WskRnEY7oCs}}
2020
Gimme That Model!- A Trusted ML Model Trading Protocol
Laia Amorós, Syed Mahbub Hafiz, Keewoo Lee, and M Caner Tol
Protecting Privacy through Homomorphic Encryption 2020
@article{amoros2021gimme,title={Gimme That Model!- A Trusted ML Model Trading Protocol},author={Amor{\'o}s, Laia and Hafiz, Syed Mahbub and Lee, Keewoo and Tol, M Caner},journal={Protecting Privacy through Homomorphic Encryption},pages={147--155},publisher={Springer},year={2020},video={https://www.youtube.com/watch?v=E8PPHkTQzYc}}
2019
Undermining User Privacy on Mobile Devices Using AI
Berk Gulmezoglu, Andreas Zankl, M. Caner Tol, Saad Islam, Thomas Eisenbarth, and Berk Sunar
In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security 2019
@inproceedings{gulmezoglu2019undermining,title={Undermining User Privacy on Mobile Devices Using AI},author={Gulmezoglu, Berk and Zankl, Andreas and Tol, M. Caner and Islam, Saad and Eisenbarth, Thomas and Sunar, Berk},booktitle={Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security},pages={214--227},year={2019},}