nosajmik@gthwsec:~$ whoami
Hello! My name is Jason Kim, and I am a fourth-year PhD student in the Hardware Security Lab advised by Prof. Daniel Genkin. I am part of the School of Cybersecurity and Privacy at the Georgia Institute of Technology. I graduated from the
University of Michigan in May 2021 with my bachelor's
degree in computer science, where I worked on projects with Daniel and Prof. Kevin Leach.
Update: I am seeking a research internship in microarchitectural, CPU, and/or hardware security for Summer 2025. Please reach out to me over LinkedIn or email if you are hiring!
nosajmik@gthwsec:~$ cat research.txt
I am interested in offensive hardware security and side channels. My work is to scrutinize
exotic optimizations in microarchitecture, and investigate if these optimizations carry
implications for security. Within this field, my focus is on recent heavyweight ARM SoCs and
the
security
of web browser engines.
Before side channels, I worked on machine learning models for binary analysis, network
security and intrusion detection systems, and a little bit of bioinformatics alongside my
undergraduate minor in biology. I was also on the course staff of Michigan's computer security course for two years as a teaching
assistant, and brought components of it over to Georgia Tech's Introduction to Information Security over a year's tenure.
nosajmik@gthwsec:~$ cat misc.txt
Outside of work, I enjoy cooking, movies, hiking, traveling, road tripping, working
on cars, tubing/boating near Atlanta, and discovering new restaurants and bars.
My desk is at Suite E0952J of the Coda Building, at 756 W Peachtree St NW, Atlanta,
GA 30308, and my email is nosajmik (at) gatech (dot) edu. That's kimjason spelled
backwards, and originally was my username at Michigan.
nosajmik@gthwsec:~$ ls publications/
-
Jason Kim, Daniel Genkin, and Yuval Yarom.
Title Redacted Due to Ongoing Vulnerability Disclosure.
To appear at IEEE Symposium on Security and Privacy (S&P), 2025.
-
Ingab Kang, Walter Wang, Jason Kim, Stephan van Schaik, Youssef Tobah,
Daniel Genkin, Andrew Kwong, and Yuval Yarom.
SledgeHammer: Amplifying Rowhammer via Bank-level Parallelism.
USENIX Security Symposium, 2024.
-
Hritvik Taneja, Jason Kim, Jie Jeff Xu, Stephan van Schaik, Daniel
Genkin, and Yuval Yarom.
Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM
SoCs.
USENIX Security Symposium, 2023.
CSAW Applied Research Competition (North America), 2023, Finalist.
-
Andrew Kwong, Walter Wang, Jason Kim, Jonathan Berger, Daniel Genkin,
Eyal Ronen, Hovav Shacham, Riad Wahby, and Yuval Yarom.
Checking Passwords on Leaky Computers: A Side Channel Analysis of Chrome's
Password Leak Detection Protocol.
USENIX Security Symposium, 2023.
-
Jason Kim, Stephan van Schaik, Daniel Genkin, and Yuval Yarom.
iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple
Devices.
ACM Conference on Computer and Communications Security (CCS), 2023.
CSAW Applied Research Competititon (North America), 2023, Finalist.
-
Jason Kim, Daniel Genkin, and Kevin Leach.
Revisiting Lightweight Compiler Provenance Recovery on ARM Binaries.
International Conference on Program Comprehension (ICPC), RENE Track, 2023.
- Ayush Agarwal, Sioli O'Connell, Jason Kim, Shaked Yehezkel,
Daniel
Genkin, Eyal Ronen, and Yuval Yarom.
Spook.js: Attacking Chrome Strict Site Isolation via Speculative
Execution.
IEEE Symposium on Security and Privacy (S&P), 2022.