Find Research Outputs

Search in all content

Filters for Research Outputs

Search concepts
Selected filters

Publication Year

  • 2020
  • 2018
  • 2017
  • 2016

Author

  • Daniel Gruss
2017

Software-based Microarchitectural Attacks

Gruss, D., 14 Jun 2017

Research output: ThesisDoctoral Thesis

Open Access
File
2018

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks

Schwarz, M., Lipp, M. & Gruss, D., 18 Feb 2018, Network and Distributed System Security Symposium 2018. p. 15

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2016

Prefetch Side-Channel Attacks: Bypassing SMAP and kernel ASLR

Gruss, D., Maurice, C., Fogh, A., Lipp, M. & Mangard, S., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association of Computing Machinery, Vol. 24-28-October-2016. p. 368-379 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2018

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

Schwarz, M., Gruss, D., Lipp, M., Maurice, C., Schuster, T., Fogh, A. & Mangard, S., 4 Jun 2018, AsiaCCS' 18, Proceedings of the 2018 on Asia Conference on Computer and Communications Security . New York, NY: Association of Computing Machinery, p. 587-600

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kernel Isolation: From an Academic Idea to an Efficient Patch for Every Computer

Gruss, D., Hansen, D. & Gregg, B., Dec 2018, In : ;login: the USENIX Magazine. 43, 4, p. 10-14 5 p.

Research output: Contribution to journalArticle

Meltdown

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. & Hamburg, M., 3 Jan 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticle

2016

Drammer: Deterministic Rowhammer attacks on mobile platforms

Van Der Veen, V., Fratantonio, Y., Lindorfer, M., Gruss, D., Maurice, C. L. N., Vigna, G., Bos, H., Razavi, K. & Giuffrida, C., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association of Computing Machinery, Vol. 24-28-October-2016. p. 1675-1689 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2020

ConTExT: A Generic Approach for Mitigating Spectre

Schwarz, M., Lipp, M., Canella, C. A., Schilling, R., Kargl, F. & Gruß, D., Feb 2020, Network and Distributed System Security Symposium 2020. 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

File

Nethammer: Inducing Rowhammer Faults through Network Requests

Lipp, M., Schwarz, M., Raab, L., Lamster, L., Aga, M. T., Maurice, C. & Gruß, D., 19 Jun 2020, (Submitted) SILM 2020 Workshop.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86

Schrammel, D., Weiser, S., Steinegger, S., Schwarzl, M., Schwarz, M., Mangard, S. & Gruß, D., 2020, Proceedings of the 29th USENIX Security Symposium. USENIX Association

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
2016

Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript

Gruss, D., Maurice, C. & Mangard, S., 1 Jul 2016, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Springer Vieweg, (DIMVA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2020

The Evolution of Transient-Execution Attacks

Canella, C. A., Khasawneh, K. N. & Gruß, D., 7 Sep 2020, (Accepted/In press) GLSVLSI 2020 - Proceedings of the 30th Great Lakes Symposium on VLSI 2020. ACM/IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2017

Malware guard extension: Using SGX to conceal cache attacks

Schwarz, M., Weiser, S., Gruss, D., Maurice, C. & Mangard, S., 2017, Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017. Springer-Verlag Italia, Vol. 10327 LNCS. p. 3-24 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10327 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2020

KASLR: Breakt It, Fix It, Repeat

Canella, C. A., Schwarz, M., Haubenwallner, M., Schwarzl, M. & Gruß, D., 5 Oct 2020, (Accepted/In press) ASIA CCS 2020 - Proceedings of the 15th ACM Asia Conference on Computer and Communications Security. ACM/IEEE, 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2018

Use-after-FreeMail: Generalizing the use-after-free problem and applying it to email services

Gruss, D., Schwarz, M., Wübbeling, M., Guggi, S., Malderle, T., More, S. & Lipp, M., 29 May 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association of Computing Machinery, p. 297-311 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Another Flip in the Wall of Rowhammer Defenses

Gruss, D., Lipp, M., Schwarz, M., Genkin, D., Juffinger, J., O'Connell, S., Schoechl, W. & Yarom, Y., 31 Jan 2018, 39th IEEE Symposium on Security and Privacy 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File

Software-based microarchitectural attacks

Gruss, D., Sep 2018, In : IT - Information technology.

Research output: Contribution to journalArticle

2017

Fantastic timers and where to find them: High-resolution microarchitectural attacks in javascript

Schwarz, M., Maurice, C., Gruss, D. & Mangard, S., 1 Jan 2017, Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers. Springer Verlag Wien, Vol. 10322 LNCS. p. 247-267 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10322 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File

Practical Keystroke Timing Attacks in Sandboxed JavaScript

Lipp, M., Gruss, D., Schwarz, M., Bidner, D., Maurice, C. & Mangard, S., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag Italia, Vol. 10493 LNCS. p. 191-209 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10493 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2018

Nethammer: Inducing Rowhammer Faults through Network Requests

Lipp, M., Aga, M. T., Schwarz, M., Gruss, D., Maurice, C., Raab, L. & Lamster, L., 13 May 2018, In : arXiv.org e-Print archive. 10 p.

Research output: Contribution to journalArticle

File
2016

ARMageddon: Last-Level Cache Attacks on Mobile Devices

Lipp, M., Gruss, D., Spreitzer, R., Maurice, C. & Mangard, S., 2016, 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, p. 549-564 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File

Flush+Flush: A fast and stealthy cache attack

Gruss, D., Maurice, C., Wagner, K. & Mangard, S., 2016, Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Proceedings. Springer-Verlag Italia, Vol. 9721. p. 279-299 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9721).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2018

Meltdown: Reading Kernel Memory from User Space

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Fogh, A., Horn, J., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. & Hamburg, M., 15 Aug 2018, 27th USENIX Security Symposium. p. 973-990 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2020

Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors

Lipp, M., Hadzic, V., Schwarz, M., Perais, A., Maurice, C. L. N. & Gruß, D., 5 Oct 2020, (Accepted/In press) ASIA CCS 2020 - Proceedings of the 15th ACM Asia Conference on Computer and Communications Security. ACM/IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks

Schwarz, M., Lipp, M., Gruss, D., Weiser, S., Maurice, C. L. N., Spreitzer, R. & Mangard, S., 18 Feb 2018, Network and Distributed System Security Symposium 2018. p. 15

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2017

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

Schwarz, M., Gruss, D., Lipp, M., Maurice, C., Schuster, T., Fogh, A. & Mangard, S., 3 Nov 2017, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticle

2018

NetSpectre: Read Arbitrary Memory over Network

Schwarz, M., Schwarzl, M., Lipp, M. & Gruss, D., 27 Jul 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticle

File

ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android

Spreitzer, R., Kirchengast, F., Gruss, D. & Mangard, S., 2018, ASIACCS '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security . p. 749-763

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2016

DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks

Peßl, P., Gruss, D., Maurice, C. L. N., Schwarz, M. & Mangard, S., 2016, Proceedings of the 25th USENIX Security Symposium. p. 565-581 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2017

Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory

Gruss, D., Lettner, J., Schuster, F., Ohrimenko, O., Haller, I. & Costa, M., 16 Aug 2017, 2017 Proceedings of the 26th USENIX Security Symposium.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File

KASLR is Dead: Long Live KASLR

Gruss, D., Lipp, M., Schwarz, M., Fellner, R., Maurice, C. & Mangard, S., 2017, Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Proceedings. Springer-Verlag Italia, Vol. 10379 LNCS. p. 161-176 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10379 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2020

Malware Guard Extension: abusing Intel SGX to conceal cache attacks

Schwarz, M., Weiser, S., Gruß, D., Maurice, C. L. N. & Mangard, S., 2020, In : Cybersecurity. 3, 20 p., 2.

Research output: Contribution to journalArticle

Open Access

LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection

Van Bulck, J., Moghimi, D., Schwarz, M., Lipp, M., Minkin, M., Genkin, D., Yarom, Y., Sunar, B., Gruß, D. & Piessens, F., 18 May 2020, 2020 IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers, Vol. 1. p. 1452-1470

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Evolution of Defenses against Transient-Execution Attacks

Canella, C. A., Pudukotai Dinakarrao, S. M., Gruß, D. & Khasawneh, K. N., 7 Sep 2020, (Accepted/In press) GLSVLSI 2020 - Proceedings of the 30th Great Lakes Symposium on VLSI 2020. ACM/IEEE, 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File