Daniel
Genkin

General Information

Email:
genkin@gatech.edu
Phone:
404-894-5592
Location - Building:
Coda
Location - Room:
E0948B
Roles:
Professor (any rank)
Primary Unit:
College of Computing

Details

Degrees with subject and Postdoc Experience:
Degree Type
B.S.
Subject
Computer Science
Year
2008
Institution
The Open University of Israel
Location
Israel
Degree Type
M.S
Subject
Computer Science
Year
2011
Institution
Technion --- Israel Institute of Technology
Location
Israel
Degree Type
Ph.D.
Subject
Computer Science
Year
2016
Institution
Technion --- Israel Institute of Technology
Location
Israel
Degree Type
Postdoctoral Scholar
Subject
Computer Science
Year
2016-2018
Institution
University of Pennsylvania and University of Maryland
Location
Pennsylvania and Maryland
Statement of Research Interests:

My research interests are in system security and cryptography. I'm interested in both theory and practice with particular interests in side-channel attacks, hardware security, cryptanalysis, secure multiparty computation (MPC), verifiable computation and SNARKS. Checkout my lab at architecture.fail

Statement of Teaching Interests:

I enjoy teaching computer security, with a strong focus on practicality in addition to solid academic foundations. I usually teach introduction to computer security, which you can checkout here: GT InfoSec;

Selection of recent research, scholarly, and creative activities:
  • Spectre Attacks: Exploiting Speculative Execution Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom IEEE Symposium on Security and Privacy 2019 
    🏆 IEEE Security and Privacy 2019 Distinguished Paper Award
  • Meltdown: Reading Kernel Memory from User Space Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg USENIX Security Symposium 2018 
    🏆 Black Hat 2018 Pwnie Award for Most Innovative Research 
    🏆 Black Hat 2018 Pwnie Award for Best Privilege Escalation Bug
  • Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, Raoul Strackx USENIX Security Symposium 2018 
    🏆 IEEE Micro 2019 Top Picks
  • RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis Daniel Genkin, Adi Shamir, Eran Tromer IACR CRYPTO 2014 
    🏆 Black Hat 2013 Pwnie Award for Most Innovative Research