Alert button
Picture for Berk Sunar

Berk Sunar

Alert button

ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching

Add code
Bookmark button
Alert button
Aug 24, 2023
M. Caner Tol, Berk Sunar

Figure 1 for ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching
Figure 2 for ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching
Figure 3 for ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching
Figure 4 for ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching
Viaarxiv icon

An Optimization Perspective on Realizing Backdoor Injection Attacks on Deep Neural Networks in Hardware

Add code
Bookmark button
Alert button
Oct 14, 2021
M. Caner Tol, Saad Islam, Berk Sunar, Ziming Zhang

Figure 1 for An Optimization Perspective on Realizing Backdoor Injection Attacks on Deep Neural Networks in Hardware
Figure 2 for An Optimization Perspective on Realizing Backdoor Injection Attacks on Deep Neural Networks in Hardware
Figure 3 for An Optimization Perspective on Realizing Backdoor Injection Attacks on Deep Neural Networks in Hardware
Figure 4 for An Optimization Perspective on Realizing Backdoor Injection Attacks on Deep Neural Networks in Hardware
Viaarxiv icon

FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings

Add code
Bookmark button
Alert button
Jun 25, 2020
M. Caner Tol, Koray Yurtseven, Berk Gulmezoglu, Berk Sunar

Figure 1 for FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings
Figure 2 for FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings
Figure 3 for FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings
Figure 4 for FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings
Viaarxiv icon

FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning

Add code
Bookmark button
Alert button
Jul 08, 2019
Berk Gulmezoglu, Ahmad Moghimi, Thomas Eisenbarth, Berk Sunar

Figure 1 for FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning
Figure 2 for FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning
Figure 3 for FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning
Figure 4 for FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning
Viaarxiv icon

Undermining User Privacy on Mobile Devices Using AI

Add code
Bookmark button
Alert button
Nov 27, 2018
Berk Gulmezoglu, Andreas Zankl, Caner Tol, Saad Islam, Thomas Eisenbarth, Berk Sunar

Figure 1 for Undermining User Privacy on Mobile Devices Using AI
Figure 2 for Undermining User Privacy on Mobile Devices Using AI
Figure 3 for Undermining User Privacy on Mobile Devices Using AI
Figure 4 for Undermining User Privacy on Mobile Devices Using AI
Viaarxiv icon