My research examines the collision between software security theory and hardware reality.
D. Kohlbrenner and H. Shacham "On the effectiveness of mitigations against floating-point timing channels." -- slides USENIX Security. August 2017
Tools and attack details here.
C. Disselkoen, D. Kohlbrenner, L. Porter, D. Tullsen "Prime+Abort: A Timer-Free High-Precision L3 Cache Attack using Intel TSX" USENIX Security. August 2017
M. Andrysco, D. Kohlbrenner, K. Mowery, R. Jhala, S. Lerner, and H. Shacham "On Subnormal Floating Point and Abnormal Timing." IEEE Security and Privacy (Oakland), May 2015 (Updated June 2017, original)-- slides
K. Mowery, M. Wei, D. Kohlbrenner, H. Shacham, and S. Swanson "Welcome to the Entropics: Boot-Time Entropy in Embedded Devices." IEEE Security and Privacy (Oakland), May 2013
I advise the CTF (competitive security) team here at UCSD. Contact me if interested.