Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 25 Similar Profiles
Malware Mathematics
Hardware Engineering & Materials Science
Cache Mathematics
Railroad cars Engineering & Materials Science
Physical addresses Engineering & Materials Science
Attack Mathematics
Containers Engineering & Materials Science
Operating Systems Mathematics

Research Output 2014 2018

  • 5 Conference contribution
  • 1 Article
  • 1 Master's Thesis

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks

Schwarz, M., Lipp, M., Gruss, D., Weiser, S., Maurice, C. L. N., Spreitzer, R. & Mangard, S. 18 Feb 2018 Network and Distributed System Security Symposium 2018. p. 15

Research output: Research - peer-reviewConference contribution

Open Access
File
Smartphones
Websites
Side channel attack
Processing
Android (operating system)

Single Trace Attack Against RSA Key Generation in Intel SGX SSL

Weiser, S., Spreitzer, R. & Bodner, L. 2018 (Accepted/In press) 13th ACM ASIA Conference on Information, Computer and Communications Security.

Research output: Research - peer-reviewConference contribution

Open Access
File
Hardware
Side channel attack
Railroad cars
Testbeds
Trucks
Radio interference
Industrial plants

Malware guard extension: Using SGX to conceal cache attacks

Schwarz, M., Weiser, S., Gruss, D., Maurice, C. & Mangard, S. 2017 Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017. Springer-Verlag Italia, Vol. 10327 LNCS, p. 3-24 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10327 LNCS)

Research output: Research - peer-reviewConference contribution

Open Access
File
Malware
Cache
Physical addresses
Attack
Hardware

SGXIO: Generic Trusted I/O Path for Intel SGX

Weiser, S. & Werner, M. 2017 Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy. p. 261-268

Research output: Research - peer-reviewConference contribution

Cloud computing
Hardware
Malware