Meltdown: Reading Kernel Memory from User Space

Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Original languageEnglish
Title of host publication27th USENIX Security Symposium
Pages973-990
Number of pages19
ISBN (Electronic)978 -1- 931971- 4 6 -1
Publication statusPublished - 15 Aug 2018
Event27th USENIX Security Symposium: USENIX Security 18 - Baltimore, United States
Duration: 15 Aug 201817 Aug 2018

Conference

Conference27th USENIX Security Symposium
CountryUnited States
CityBaltimore
Period15/08/1817/08/18

Keywords

  • mine

Projects

EU - SOPHIA - Securing Software against Physical Attacks

Mangard, S.

1/09/1631/08/21

Project: Research project

Cite this

Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Fogh, A., ... Hamburg, M. (2018). Meltdown: Reading Kernel Memory from User Space. In 27th USENIX Security Symposium (pp. 973-990)