Find Research Outputs

Search in all content

Filters for Research Outputs

Search concepts
Selected filters

Publication Year

  • 2020
  • 2019
  • 2018
  • 2016

Author

  • Daniel Gruss
2018

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks

Schwarz, M., Lipp, M. & Gruss, D., 18 Feb 2018, Network and Distributed System Security Symposium 2018. p. 15

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2019

Wait a second: Playing Hanabi without giving hints

Eger, M. & Gruss, D., 26 Aug 2019, Proceedings of the 14th International Conference on the Foundations of Digital Games, FDG 2019. Khosmood, F., Pirker, J., Apperley, T. & Deterding, S. (eds.). New York, NY: Association of Computing Machinery, 14. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software-basierte Mikroarchitekturangriffe

Gruss, D., Jan 2019, Ausgezeichnete Informatikdissertationen 2017. Hölldobler, S. (ed.). Bonn: Gesellschaft für Informatik e.V., p. 81-90

Research output: Chapter in Book/Report/Conference proceedingChapter

2016

Prefetch Side-Channel Attacks: Bypassing SMAP and kernel ASLR

Gruss, D., Maurice, C., Fogh, A., Lipp, M. & Mangard, S., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association of Computing Machinery, Vol. 24-28-October-2016. p. 368-379 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2018

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features

Schwarz, M., Gruss, D., Lipp, M., Maurice, C., Schuster, T., Fogh, A. & Mangard, S., 4 Jun 2018, AsiaCCS' 18, Proceedings of the 2018 on Asia Conference on Computer and Communications Security . New York, NY: Association of Computing Machinery, p. 587-600

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kernel Isolation: From an Academic Idea to an Efficient Patch for Every Computer

Gruss, D., Hansen, D. & Gregg, B., Dec 2018, In : ;login: the USENIX Magazine. 43, 4, p. 10-14 5 p.

Research output: Contribution to journalArticle

2019

SGXJail: Defeating Enclave Malware via Confinement

Weiser, S., Mayr, L., Schwarz, M. & Gruß, D., Sep 2019, RAID 2019 Proceedings: Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses. USENIX Association, p. 353-366

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

NetSpectre: Read Arbitrary Memory over Network

Schwarz, M., Schwarzl, M., Lipp, M., Masters, J. & Gruß, D., Sep 2019, Computer Security - ESORICS 2019: 24th European Symposium on Research in Computer Security, Luxembourg, September 23–27, 2019, Proceedings. Cham: Springer, Vol. 1. p. 279-299 (Lecture Notes in Computer Science; vol. 11735).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

Meltdown

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. & Hamburg, M., 3 Jan 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticle

2016

Drammer: Deterministic Rowhammer attacks on mobile platforms

Van Der Veen, V., Fratantonio, Y., Lindorfer, M., Gruss, D., Maurice, C. L. N., Vigna, G., Bos, H., Razavi, K. & Giuffrida, C., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association of Computing Machinery, Vol. 24-28-October-2016. p. 1675-1689 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2019

A Systematic Evaluation of Transient Execution Attacks and Defenses

Canella, C., Bulck, J. V., Schwarz, M., Lipp, M., Berg, B. V., Ortner, P., Piessens, F., Evtyushkin, D. & Gruss, D., 14 Aug 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 249-266 17 p. (arXiv.org e-Print archive).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2020

ConTExT: A Generic Approach for Mitigating Spectre

Schwarz, M., Lipp, M., Canella, C. A., Schilling, R., Kargl, F. & Gruß, D., Feb 2020, Network and Distributed System Security Symposium 2020. 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

File

Nethammer: Inducing Rowhammer Faults through Network Requests

Lipp, M., Schwarz, M., Raab, L., Lamster, L., Aga, M. T., Maurice, C. & Gruß, D., 19 Jun 2020, (Submitted) SILM 2020 Workshop.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86

Schrammel, D., Weiser, S., Steinegger, S., Schwarzl, M., Schwarz, M., Mangard, S. & Gruß, D., 2020, Proceedings of the 29th USENIX Security Symposium. USENIX Association

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
2016

Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript

Gruss, D., Maurice, C. & Mangard, S., 1 Jul 2016, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). Springer Vieweg, (DIMVA).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2020

The Evolution of Transient-Execution Attacks

Canella, C. A., Khasawneh, K. N. & Gruß, D., 7 Sep 2020, (Accepted/In press) GLSVLSI 2020 - Proceedings of the 30th Great Lakes Symposium on VLSI 2020. ACM/IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File

KASLR: Breakt It, Fix It, Repeat

Canella, C. A., Schwarz, M., Haubenwallner, M., Schwarzl, M. & Gruß, D., 5 Oct 2020, (Accepted/In press) ASIA CCS 2020 - Proceedings of the 15th ACM Asia Conference on Computer and Communications Security. ACM/IEEE, 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2018

Another Flip in the Wall of Rowhammer Defenses

Gruss, D., Lipp, M., Schwarz, M., Genkin, D., Juffinger, J., O'Connell, S., Schoechl, W. & Yarom, Y., 31 Jan 2018, 39th IEEE Symposium on Security and Privacy 2018.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File

Software-based microarchitectural attacks

Gruss, D., Sep 2018, In : IT - Information technology.

Research output: Contribution to journalArticle

Nethammer: Inducing Rowhammer Faults through Network Requests

Lipp, M., Aga, M. T., Schwarz, M., Gruss, D., Maurice, C., Raab, L. & Lamster, L., 13 May 2018, In : arXiv.org e-Print archive. 10 p.

Research output: Contribution to journalArticle

File

Use-after-FreeMail: Generalizing the use-after-free problem and applying it to email services

Gruss, D., Schwarz, M., Wübbeling, M., Guggi, S., Malderle, T., More, S. & Lipp, M., 29 May 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association of Computing Machinery, p. 297-311 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2016

ARMageddon: Last-Level Cache Attacks on Mobile Devices

Lipp, M., Gruss, D., Spreitzer, R., Maurice, C. & Mangard, S., 2016, 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, p. 549-564 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File

Flush+Flush: A fast and stealthy cache attack

Gruss, D., Maurice, C., Wagner, K. & Mangard, S., 2016, Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Proceedings. Springer-Verlag Italia, Vol. 9721. p. 279-299 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9721).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2020

Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors

Lipp, M., Hadzic, V., Schwarz, M., Perais, A., Maurice, C. L. N. & Gruß, D., 5 Oct 2020, (Accepted/In press) ASIA CCS 2020 - Proceedings of the 15th ACM Asia Conference on Computer and Communications Security. ACM/IEEE

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

Meltdown: Reading Kernel Memory from User Space

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Fogh, A., Horn, J., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. & Hamburg, M., 15 Aug 2018, 27th USENIX Security Symposium. p. 973-990 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2019

Page Cache Attacks

Gruss, D., Kraft, E., Tiwari, T., Schwarz, M., Trachtenberg, A., Hennessey, J., Ionescu, A. & Fogh, A., 12 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM/IEEE, p. 167-180

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks

Schwarz, M., Lipp, M., Gruss, D., Weiser, S., Maurice, C. L. N., Spreitzer, R. & Mangard, S., 18 Feb 2018, Network and Distributed System Security Symposium 2018. p. 15

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2019

Practical Enclave Malware with Intel SGX

Schwarz, M., Weiser, S. & Gruss, D., 8 Feb 2019, In : arXiv.org e-Print archive. arXiv:1902.03256 .

Research output: Contribution to journalArticle

Practical Enclave Malware with Intel SGX

Schwarz, M., Weiser, S. & Gruß, D., Jun 2019, Detection of Intrusions and Malware, and Vulnerability Assessment: 16th International Conference, DIMVA 2019, 2019. Cham: Springer International, p. 177-196 (Lecture Notes in Computer Science; vol. 11543).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

File
2018

NetSpectre: Read Arbitrary Memory over Network

Schwarz, M., Schwarzl, M., Lipp, M. & Gruss, D., 27 Jul 2018, In : arXiv.org e-Print archive.

Research output: Contribution to journalArticle

File
2019

Fallout: Leaking Data on Meltdown-resistant CPUs

Canella, C. A., Genkin, D., Giner, L., Gruß, D., Lipp, M., Minkin, M., Moghimi, D., Piessens, F., Schwarz, M., Sunar, B., Bulck, J. V. & Yarom, Y., 12 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM/IEEE, p. 769-784 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2018

ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android

Spreitzer, R., Kirchengast, F., Gruss, D. & Mangard, S., 2018, ASIACCS '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security . p. 749-763

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2016

DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks

Peßl, P., Gruss, D., Maurice, C. L. N., Schwarz, M. & Mangard, S., 2016, Proceedings of the 25th USENIX Security Symposium. p. 565-581 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2019

JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits

Schwarz, M., Lackner, F. & Gruss, D., 24 Feb 2019, NDSS.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Spectre Attacks: Exploiting Speculative Execution

Kocher, P., Horn, J., Fogh, A., Genkin, D., Gruss, D., Haas, W., Hamburg, M., Lipp, M., Mangard, S., Prescher, T., Schwarz, M. & Yarom, Y., 20 May 2019, 40th IEEE Symposium on Security and Privacy.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

ScatterCache: Thwarting Cache Attacks via Cache Set Randomization

Werner, M., Unterluggauer, T., Giner, L., Schwarz, M., Gruß, D. & Mangard, S., Aug 2019, 28th USENIX Security Symposium (USENIX Security 19). Santa Clara, CA: USENIX Association, p. 675-692

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

ZombieLoad: Cross-Privilege-Boundary Data Sampling

Schwarz, M., Lipp, M., Moghimi, D., Bulck, J. V., Stecklina, J., Prescher, T. & Gruss, D., 12 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM/IEEE, p. 753-768

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2020

Malware Guard Extension: abusing Intel SGX to conceal cache attacks

Schwarz, M., Weiser, S., Gruß, D., Maurice, C. L. N. & Mangard, S., 2020, In : Cybersecurity. 3, 20 p., 2.

Research output: Contribution to journalArticle

Open Access

LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection

Van Bulck, J., Moghimi, D., Schwarz, M., Lipp, M., Minkin, M., Genkin, D., Yarom, Y., Sunar, B., Gruß, D. & Piessens, F., 18 May 2020, 2020 IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers, Vol. 1. p. 1452-1470

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Evolution of Defenses against Transient-Execution Attacks

Canella, C. A., Pudukotai Dinakarrao, S. M., Gruß, D. & Khasawneh, K. N., 7 Sep 2020, (Accepted/In press) GLSVLSI 2020 - Proceedings of the 30th Great Lakes Symposium on VLSI 2020. ACM/IEEE, 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
File
2019

ConTExT: Leakage-Free Transient Execution

Schwarz, M., Schilling, R., Kargl, F., Lipp, M., Canella, C. & Gruss, D., 22 May 2019, In : arXiv.org e-Print archive. 14 p.

Research output: Contribution to journalArticle