default search action
Daniel Gruss
Person information
- affiliation: Graz University of Technology, Institute for Applied Information Processing and Communications, Austria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c71]Lukas Giner, Roland Czerny, Christoph Gruber, Fabian Rauscher, Andreas Kogler, Daniel De Almeida Braga, Daniel Gruss:
Generic and Automated Drive-by GPU Cache Attacks from the Browser. AsiaCCS 2024 - [c70]Jonas Juffinger, Stepan Kalinin, Daniel Gruss, Frank Mueller:
SUIT: Secure Undervolting with Instruction Traps. ASPLOS (2) 2024: 1128-1145 - [c69]Jonas Juffinger, Sudheendra Raghav Neela, Martin Heckel, Lukas Schwarz, Florian Adamsky, Daniel Gruss:
Presshammer: Rowhammer and Rowpress Without Physical Address Information. DIMVA 2024: 460-479 - [c68]Fabian Rauscher, Andreas Kogler, Jonas Juffinger, Daniel Gruss:
IdleLeak: Exploiting Idle State Side Effects for Information Leakage. NDSS 2024 - [c67]Stefan Gast, Roland Czerny, Jonas Juffinger, Fabian Rauscher, Simone Franza, Daniel Gruss:
SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript. USENIX Security Symposium 2024 - [i33]Stefan Gast, Jonas Juffinger, Lukas Maar, Christoph Royer, Andreas Kogler, Daniel Gruss:
Remote Scheduler Contention Attacks. CoRR abs/2404.07042 (2024) - 2023
- [c66]Martin Schwarzl, Erik Kraft, Daniel Gruss:
Layered Binary Templating. ACNS (1) 2023: 33-58 - [c65]Lukas Maar, Martin Schwarzl, Fabian Rauscher, Daniel Gruss, Stefan Mangard:
DOPE: DOmain Protection Enforcement with PKS. ACSAC 2023: 662-676 - [c64]Anish Saxena, Gururaj Saileshwar, Jonas Juffinger, Andreas Kogler, Daniel Gruss, Moinuddin K. Qureshi:
PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks. DSN 2023: 95-108 - [c63]Martin Schwarzl, Pietro Borrello, Gururaj Saileshwar, Hanna Müller, Michael Schwarz, Daniel Gruss:
Practical Timing Side-Channel Attacks on Memory Compression. SP 2023: 1186-1203 - [c62]Jonas Juffinger, Lukas Lamster, Andreas Kogler, Maria Eichlseder, Moritz Lipp, Daniel Gruss:
CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer. SP 2023: 1702-1718 - [c61]Stefan Gast, Jonas Juffinger, Martin Schwarzl, Gururaj Saileshwar, Andreas Kogler, Simone Franza, Markus Köstl, Daniel Gruss:
SQUIP: Exploiting the Scheduler Queue Contention Side Channel. SP 2023: 2256-2272 - [c60]Lukas Giner, Stefan Steinegger, Antoon Purnal, Maria Eichlseder, Thomas Unterluggauer, Stefan Mangard, Daniel Gruss:
Scatter and Split Securely: Defeating Cache Contention and Occupancy Attacks. SP 2023: 2273-2287 - [c59]Sihang Liu, Suraaj Kanniwadi, Martin Schwarzl, Andreas Kogler, Daniel Gruss, Samira Manabi Khan:
Side-Channel Attacks on Optane Persistent Memory. USENIX Security Symposium 2023: 6807-6824 - [c58]Andreas Kogler, Jonas Juffinger, Lukas Giner, Lukas Gerlach, Martin Schwarzl, Michael Schwarz, Daniel Gruss, Stefan Mangard:
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels. USENIX Security Symposium 2023: 7285-7302 - [e2]Daniel Gruss, Federico Maggi, Mathias Fischer, Michele Carminati:
Detection of Intrusions and Malware, and Vulnerability Assessment - 20th International Conference, DIMVA 2023, Hamburg, Germany, July 12-14, 2023, Proceedings. Lecture Notes in Computer Science 13959, Springer 2023, ISBN 978-3-031-35503-5 [contents] - [i32]Jinghao Jia, YiFei Zhu, Dan Williams, Andrea Arcangeli, Claudio Canella, Hubertus Franke, Tobin Feldman-Fitzthum, Dimitrios Skarlatos, Daniel Gruss, Tianyin Xu:
Programmable System Call Security with eBPF. CoRR abs/2302.10366 (2023) - 2022
- [c57]Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Michael Schwarz, Daniel Gruss:
Robust and Scalable Process Isolation Against Spectre in the Cloud. ESORICS (2) 2022: 167-186 - [c56]Amir Naseredini, Stefan Gast, Martin Schwarzl, Pedro Miguel Sousa Bernardo, Amel Smajic, Claudio Canella, Martin Berger, Daniel Gruss:
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks. ICISSP 2022: 48-59 - [c55]Martin Schwarzl, Erik Kraft, Moritz Lipp, Daniel Gruss:
Remote Memory-Deduplication Attacks. NDSS 2022 - [c54]Andreas Kogler, Daniel Weber, Martin Haubenwallner, Moritz Lipp, Daniel Gruss, Michael Schwarz:
Finding and Exploiting CPU Features using MSR Templating. SP 2022: 1474-1490 - [c53]Moritz Lipp, Daniel Gruss, Michael Schwarz:
AMD Prefetch Attacks through Power and Time. USENIX Security Symposium 2022: 643-660 - [c52]Lukas Giner, Andreas Kogler, Claudio Canella, Michael Schwarz, Daniel Gruss:
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX. USENIX Security Symposium 2022: 3111-3127 - [c51]Andreas Kogler, Jonas Juffinger, Salman Qazi, Yoongu Kim, Moritz Lipp, Nicolas Boichat, Eric Shiu, Mattias Nissler, Daniel Gruss:
Half-Double: Hammering From the Next Row Over. USENIX Security Symposium 2022: 3807-3824 - [c50]Catherine Easdon, Michael Schwarz, Martin Schwarzl, Daniel Gruss:
Rapid Prototyping for Microarchitectural Attacks. USENIX Security Symposium 2022: 3861-3877 - [c49]Pietro Borrello, Andreas Kogler, Martin Schwarzl, Moritz Lipp, Daniel Gruss, Michael Schwarz:
ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture. USENIX Security Symposium 2022: 3917-3934 - [c48]Andreas Kogler, Daniel Gruss, Michael Schwarz:
Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks. USENIX Security Symposium 2022: 4147-4164 - [e1]Lorenzo Cavallaro, Daniel Gruss, Giancarlo Pellegrino, Giorgio Giacinto:
Detection of Intrusions and Malware, and Vulnerability Assessment - 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 - July 1, 2022, Proceedings. Lecture Notes in Computer Science 13358, Springer 2022, ISBN 978-3-031-09483-5 [contents] - [i31]Claudio Canella, Sebastian Dorn, Daniel Gruss, Michael Schwarz:
SFIP: Coarse-Grained Syscall-Flow-Integrity Protection in Modern Systems. CoRR abs/2202.13716 (2022) - [i30]Martin Schwarzl, Erik Kraft, Daniel Gruss:
Layered Binary Templating: Efficient Detection of Compiler- and Linker-introduced Leakage. CoRR abs/2208.02093 (2022) - 2021
- [c47]Claudio Canella, Mario Werner, Daniel Gruss, Michael Schwarz:
Automating Seccomp Filter Generation for Linux Applications. CCSW 2021: 139-151 - [c46]Martin Schwarzl, Claudio Canella, Daniel Gruss, Michael Schwarz:
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation. Financial Cryptography (1) 2021: 293-310 - [c45]Martin Schwarzl, Thomas Schuster, Michael Schwarz, Daniel Gruss:
Speculative Dereferencing: Reviving Foreshadow. Financial Cryptography (1) 2021: 311-330 - [c44]Moritz Lipp, Andreas Kogler, David F. Oswald, Michael Schwarz, Catherine Easdon, Claudio Canella, Daniel Gruss:
PLATYPUS: Software-based Power Side-Channel Attacks on x86. SP 2021: 355-371 - [c43]Antoon Purnal, Lukas Giner, Daniel Gruss, Ingrid Verbauwhede:
Systematic Analysis of Randomization-based Protected Cache Architectures. SP 2021: 987-1002 - [i29]Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, Michael Schwarz:
Dynamic Process Isolation. CoRR abs/2110.04751 (2021) - [i28]Martin Schwarzl, Pietro Borrello, Gururaj Saileshwar, Hanna Müller, Michael Schwarz, Daniel Gruss:
Practical Timing Side Channel Attacks on Memory Compression. CoRR abs/2111.08404 (2021) - [i27]Martin Schwarzl, Erik Kraft, Moritz Lipp, Daniel Gruss:
Remote Memory-Deduplication Attacks. CoRR abs/2111.08553 (2021) - [i26]Claudio Canella, Andreas Kogler, Lukas Giner, Daniel Gruss, Michael Schwarz:
Domain Page-Table Isolation. CoRR abs/2111.10876 (2021) - [i25]Amir Naseredini, Stefan Gast, Martin Schwarzl, Pedro Miguel Sousa Bernardo, Amel Smajic, Claudio Canella, Martin Berger, Daniel Gruss:
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks. CoRR abs/2111.12528 (2021) - 2020
- [j6]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, Raoul Strackx:
Meltdown: reading kernel memory from user space. Commun. ACM 63(6): 46-56 (2020) - [j5]Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre attacks: exploiting speculative execution. Commun. ACM 63(7): 93-101 (2020) - [j4]Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Malware Guard Extension: abusing Intel SGX to conceal cache attacks. Cybersecur. 3(1): 2 (2020) - [j3]Michael Schwarz, Daniel Gruss:
How Trusted Execution Environments Fuel Research on Microarchitectural Attacks. IEEE Secur. Priv. 18(5): 18-27 (2020) - [j2]Kit Murdock, David F. Oswald, Flavio D. Garcia, Jo Van Bulck, Frank Piessens, Daniel Gruss:
Plundervolt: How a Little Bit of Undervolting Can Create a Lot of Trouble. IEEE Secur. Priv. 18(5): 28-37 (2020) - [c42]Claudio Canella, Michael Schwarz, Martin Haubenwallner, Martin Schwarzl, Daniel Gruss:
KASLR: Break It, Fix It, Repeat. AsiaCCS 2020: 481-493 - [c41]Moritz Lipp, Vedad Hadzic, Michael Schwarz, Arthur Perais, Clémentine Maurice, Daniel Gruss:
Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors. AsiaCCS 2020: 813-825 - [c40]Moritz Lipp, Michael Schwarz, Lukas Raab, Lukas Lamster, Misiker Tadesse Aga, Clémentine Maurice, Daniel Gruss:
Nethammer: Inducing Rowhammer Faults through Network Requests. EuroS&P Workshops 2020: 710-719 - [c39]Claudio Canella, Khaled N. Khasawneh, Daniel Gruss:
The Evolution of Transient-Execution Attacks. ACM Great Lakes Symposium on VLSI 2020: 163-168 - [c38]Claudio Canella, Sai Manoj Pudukotai Dinakarrao, Daniel Gruss, Khaled N. Khasawneh:
Evolution of Defenses against Transient-Execution Attacks. ACM Great Lakes Symposium on VLSI 2020: 169-174 - [c37]Michael Schwarz, Moritz Lipp, Claudio Canella, Robert Schilling, Florian Kargl, Daniel Gruss:
ConTExT: A Generic Approach for Mitigating Spectre. NDSS 2020 - [c36]Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss, Frank Piessens:
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. SP 2020: 54-72 - [c35]Andrew Kwong, Daniel Genkin, Daniel Gruss, Yuval Yarom:
RAMBleed: Reading Bits in Memory Without Accessing Them. SP 2020: 695-711 - [c34]Kit Murdock, David F. Oswald, Flavio D. Garcia, Jo Van Bulck, Daniel Gruss, Frank Piessens:
Plundervolt: Software-based Fault Injection Attacks against Intel SGX. SP 2020: 1466-1482 - [c33]David Schrammel, Samuel Weiser, Stefan Steinegger, Martin Schwarzl, Michael Schwarz, Stefan Mangard, Daniel Gruss:
Donky: Domain Keys - Efficient In-Process Isolation for RISC-V and x86. USENIX Security Symposium 2020: 1677-1694 - [i24]Martin Schwarzl, Thomas Schuster, Michael Schwarz, Daniel Gruss:
Speculative Dereferencing of Registers: Reviving Foreshadow. CoRR abs/2008.02307 (2020) - [i23]Claudio Canella, Mario Werner, Daniel Gruss, Michael Schwarz:
Automating Seccomp Filter Generation for Linux Applications. CoRR abs/2012.02554 (2020)
2010 – 2019
- 2019
- [c32]Daniel Gruss, Erik Kraft, Trishita Tiwari, Michael Schwarz, Ari Trachtenberg, Jason Hennessey, Alex Ionescu, Anders Fogh:
Page Cache Attacks. CCS 2019: 167-180 - [c31]Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, Daniel Gruss:
ZombieLoad: Cross-Privilege-Boundary Data Sampling. CCS 2019: 753-768 - [c30]Claudio Canella, Daniel Genkin, Lukas Giner, Daniel Gruss, Moritz Lipp, Marina Minkin, Daniel Moghimi, Frank Piessens, Michael Schwarz, Berk Sunar, Jo Van Bulck, Yuval Yarom:
Fallout: Leaking Data on Meltdown-resistant CPUs. CCS 2019: 769-784 - [c29]Michael Schwarz, Samuel Weiser, Daniel Gruss:
Practical Enclave Malware with Intel SGX. DIMVA 2019: 177-196 - [c28]Michael Schwarz, Martin Schwarzl, Moritz Lipp, Jon Masters, Daniel Gruss:
NetSpectre: Read Arbitrary Memory over Network. ESORICS (1) 2019: 279-299 - [c27]Markus Eger, Daniel Gruss:
Wait a second: playing Hanabi without giving hints. FDG 2019: 14:1-14:7 - [c26]Michael Schwarz, Florian Lackner, Daniel Gruss:
JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits. NDSS 2019 - [c25]Samuel Weiser, Luca Mayr, Michael Schwarz, Daniel Gruss:
SGXJail: Defeating Enclave Malware via Confinement. RAID 2019: 353-366 - [c24]Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. IEEE Symposium on Security and Privacy 2019: 1-19 - [c23]Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss:
A Systematic Evaluation of Transient Execution Attacks and Defenses. USENIX Security Symposium 2019: 249-266 - [c22]Mario Werner, Thomas Unterluggauer, Lukas Giner, Michael Schwarz, Daniel Gruss, Stefan Mangard:
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization. USENIX Security Symposium 2019: 675-692 - [i22]Daniel Gruss, Erik Kraft, Trishita Tiwari, Michael Schwarz, Ari Trachtenberg, Jason Hennessey, Alex Ionescu, Anders Fogh:
Page Cache Attacks. CoRR abs/1901.01161 (2019) - [i21]Michael Schwarz, Samuel Weiser, Daniel Gruss:
Practical Enclave Malware with Intel SGX. CoRR abs/1902.03256 (2019) - [i20]Michael Schwarz, Claudio Canella, Lukas Giner, Daniel Gruss:
Store-to-Leak Forwarding: Leaking Data on Meltdown-resistant CPUs. CoRR abs/1905.05725 (2019) - [i19]Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, Daniel Gruss:
ZombieLoad: Cross-Privilege-Boundary Data Sampling. CoRR abs/1905.05726 (2019) - [i18]Michael Schwarz, Robert Schilling, Florian Kargl, Moritz Lipp, Claudio Canella, Daniel Gruss:
ConTExT: Leakage-Free Transient Execution. CoRR abs/1905.09100 (2019) - [i17]Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Frank Piessens, Berk Sunar, Yuval Yarom:
Fallout: Reading Kernel Writes From User Space. CoRR abs/1905.12701 (2019) - 2018
- [j1]Daniel Gruss, Dave Hansen, Brendan Gregg:
Kernel Isolation: From an Academic Idea to an Efficient Patch for Every Computer. login Usenix Mag. 43(4) (2018) - [c21]Daniel Gruss, Michael Schwarz, Matthias Wübbeling, Simon Guggi, Timo Malderle, Stefan More, Moritz Lipp:
Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services. AsiaCCS 2018: 297-311 - [c20]Michael Schwarz, Daniel Gruss, Moritz Lipp, Clémentine Maurice, Thomas Schuster, Anders Fogh, Stefan Mangard:
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features. AsiaCCS 2018: 587-600 - [c19]Raphael Spreitzer, Felix Kirchengast, Daniel Gruss, Stefan Mangard:
ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android. AsiaCCS 2018: 749-763 - [c18]Michael Schwarz, Moritz Lipp, Daniel Gruss:
JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks. NDSS 2018 - [c17]Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard:
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks. NDSS 2018 - [c16]Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom:
Another Flip in the Wall of Rowhammer Defenses. IEEE Symposium on Security and Privacy 2018: 245-261 - [c15]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown: Reading Kernel Memory from User Space. USENIX Security Symposium 2018: 973-990 - [i16]Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. CoRR abs/1801.01203 (2018) - [i15]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown. CoRR abs/1801.01207 (2018) - [i14]Moritz Lipp, Misiker Tadesse Aga, Michael Schwarz, Daniel Gruss, Clémentine Maurice, Lukas Raab, Lukas Lamster:
Nethammer: Inducing Rowhammer Faults through Network Requests. CoRR abs/1805.04956 (2018) - [i13]Michael Schwarz, Martin Schwarzl, Moritz Lipp, Daniel Gruss:
NetSpectre: Read Arbitrary Memory over Network. CoRR abs/1807.10535 (2018) - [i12]Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss:
A Systematic Evaluation of Transient Execution Attacks and Defenses. CoRR abs/1811.05441 (2018) - [i11]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown. meltdownattack.com (2018) - [i10]Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. meltdownattack.com (2018) - 2017
- [c14]Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Malware Guard Extension: Using SGX to Conceal Cache Attacks. DIMVA 2017: 3-24 - [c13]Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, Clémentine Maurice, Stefan Mangard:
Practical Keystroke Timing Attacks in Sandboxed JavaScript. ESORICS (2) 2017: 191-209 - [c12]Daniel Gruss, Moritz Lipp, Michael Schwarz, Richard Fellner, Clémentine Maurice, Stefan Mangard:
KASLR is Dead: Long Live KASLR. ESSoS 2017: 161-176 - [c11]Michael Schwarz, Clémentine Maurice, Daniel Gruss, Stefan Mangard:
Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript. Financial Cryptography 2017: 247-267 - [c10]Clémentine Maurice, Manuel Weber, Michael Schwarz, Lukas Giner, Daniel Gruss, Carlo Alberto Boano, Stefan Mangard, Kay Römer:
Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud. NDSS 2017 - [c9]Daniel Gruss, Julian Lettner, Felix Schuster, Olga Ohrimenko, István Haller, Manuel Costa:
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory. USENIX Security Symposium 2017: 217-233 - [p1]Daniel Gruss:
Software-basierte Mikroarchitekturangriffe. Ausgezeichnete Informatikdissertationen 2017: 81-90 - [i9]Michael Schwarz, Samuel Weiser, Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Malware Guard Extension: Using SGX to Conceal Cache Attacks. CoRR abs/1702.08719 (2017) - [i8]Daniel Gruss:
Software-based Microarchitectural Attacks. CoRR abs/1706.05973 (2017) - [i7]Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard:
KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks. CoRR abs/1706.06381 (2017) - [i6]Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom:
Another Flip in the Wall of Rowhammer Defenses. CoRR abs/1710.00551 (2017) - [i5]Michael Schwarz, Daniel Gruss, Moritz Lipp, Clémentine Maurice, Thomas Schuster, Anders Fogh, Stefan Mangard:
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features. CoRR abs/1711.01254 (2017) - 2016
- [c8]Daniel Gruss, Clémentine Maurice, Anders Fogh, Moritz Lipp, Stefan Mangard:
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR. CCS 2016: 368-379 - [c7]Victor van der Veen, Yanick Fratantonio, Martina Lindorfer, Daniel Gruss, Clémentine Maurice, Giovanni Vigna, Herbert Bos, Kaveh Razavi, Cristiano Giuffrida:
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. CCS 2016: 1675-1689 - [c6]Daniel Gruss, Clémentine Maurice, Klaus Wagner, Stefan Mangard:
Flush+Flush: A Fast and Stealthy Cache Attack. DIMVA 2016: 279-299 - [c5]Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. DIMVA 2016: 300-321 - [c4]Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Clémentine Maurice, Stefan Mangard:
ARMageddon: Cache Attacks on Mobile Devices. USENIX Security Symposium 2016: 549-564 - [c3]Peter Pessl, Daniel Gruss, Clémentine Maurice, Michael Schwarz, Stefan Mangard:
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. USENIX Security Symposium 2016: 565-581 - 2015
- [c2]Daniel Gruss, David Bidner, Stefan Mangard:
Practical Memory Deduplication Attacks in Sandboxed Javascript. ESORICS (1) 2015: 108-122 - [c1]Daniel Gruss, Raphael Spreitzer, Stefan Mangard:
Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches. USENIX Security Symposium 2015: 897-912 - [i4]Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript. CoRR abs/1507.06955 (2015) - [i3]Daniel Gruss, Clémentine Maurice, Klaus Wagner:
Flush+Flush: A Stealthier Last-Level Cache Attack. CoRR abs/1511.04594 (2015) - [i2]Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Stefan Mangard:
ARMageddon: Last-Level Cache Attacks on Mobile Devices. CoRR abs/1511.04897 (2015) - [i1]Peter Pessl, Daniel Gruss, Clémentine Maurice, Stefan Mangard:
Reverse Engineering Intel DRAM Addressing and Exploitation. CoRR abs/1511.08756 (2015)