We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
ConTExT: A Generic Approach for Mitigating Spectre
Schwarz M., Lipp M., Canella C., Schilling R., Kargl F., Gruß D.
Network and Distributed System Security Symposium 2020, Network and Distributed System Security Symposium 2020
Fallout: Leaking Data on Meltdown-resistant CPUs
Canella C., Genkin D., Giner L., Gruß D., Lipp M., Minkin M., Moghimi D., Piessens F., Schwarz M., Sunar B., Bulck J., Yarom Y.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 26th ACM Conference on Computer and Communications Security, 769-784
ZombieLoad
Schwarz M., Lipp M., Moghimi D., Bulck J., Stecklina J., Prescher T., Gruß D.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 26th ACM Conference on Computer and Communications Security, 753-768
Page Cache Attacks
Gruß D., Kraft E., Tiwari T., Schwarz M., Trachtenberg A., Hennessey J., Ionescu A., Fogh A.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 26th ACM Conference on Computer and Communications Security, 167-180
SGXJail: Defeating Enclave Malware via Confinement
Weiser S., Mayr L., Schwarz M., Gruß D.
RAID 2019 Proceedings, RAiD 2019, 353-366
NetSpectre: Read Arbitrary Memory over Network
Schwarz M., Schwarzl M., Lipp M., Masters J., Gruß D.
Computer Security - ESORICS 2019, ESORICS 2019, 279-299, (Lecture Notes in Computer Science; vol. 11735)
Wait a second
Eger M., Gruß D.
Proceedings of the 14th International Conference on the Foundations of Digital Games, FDG 2019, 14th International Conference on the Foundations of Digital Games, FDG 2019, (ACM International Conference Proceeding Series)
A Systematic Evaluation of Transient Execution Attacks and Defenses
Canella C., Bulck J., Schwarz M., Lipp M., Berg B., Ortner P., Piessens F., Evtyushkin D., Gruß D.
Proceedings of the 28th USENIX Security Symposium, USENIX Association, 249-266
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization
Werner M., Unterluggauer T., Giner L., Schwarz M., Gruß D., Mangard S.
28th USENIX Security Symposium (USENIX Security 19), USENIX Association, 675-692
Practical Enclave Malware with Intel SGX
Schwarz M., Weiser S., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment, 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 177-196, (Lecture Notes in Computer Science; vol. 11543)
ConTExT: Leakage-Free Transient Execution
Schwarz M., Schilling R., Kargl F., Lipp M., Canella C., Gruß D.
, Cornell University Library, (arXiv.org e-Print archive)
Spectre Attacks: Exploiting Speculative Execution
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
40th IEEE Symposium on Security and Privacy
Store-to-Leak Forwarding
Schwarz M., Canella C., Giner L., Gruß D.
, Cornell University Library, (arXiv.org e-Print archive)
JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits
Schwarz M., Lackner F., Gruß D.
NDSS, Network and Distributed System Security Symposium 2018
Software-basierte Mikroarchitekturangriffe
Gruß D.
Ausgezeichnete Informatikdissertationen 2017, Gesellschaft für Informatik e.V., 81-90
Kernel Isolation
Gruß D., Hansen D., Gregg B.
;login: , Vol. 43(4), 10-14
Software-based microarchitectural attacks
Gruß D.
Information Technology
Meltdown: Reading Kernel Memory from User Space
Lipp M., Schwarz M., Gruß D., Prescher T., Haas W., Fogh A., Horn J., Mangard S., Kocher P., Genkin D., Yarom Y., Hamburg M.
27th USENIX Security Symposium, 27th USENIX Security Symposium, 973-990
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features
Schwarz M., Gruß D., Lipp M., Maurice C., Schuster T., Fogh A., Mangard S.
AsiaCCS' 18, Proceedings of the 2018 on Asia Conference on Computer and Communications Security , 13th ACM ASIA Conference on Information, Computer and Communications Security, 587-600
Use-after-FreeMail
Gruß D., Schwarz M., Wübbeling M., Guggi S., Malderle T., More S., Lipp M.
ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security, 13th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2018, 297-311