We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Spectre attacks
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
Communications of the ACM, Vol. 63(7), 2020
Meltdown
Lipp M., Schwarz M., Gruß D., Prescher T., Haas W., Horn J., Mangard S., Kocher P., Genkin D., Yarom Y., Hamburg M., Strackx R.
Communications of the ACM, Vol. 63(6), 2020
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
Van Bulck J., Moghimi D., Schwarz M., Lipp M., Minkin M., Genkin D., Yarom Y., Sunar B., Gruß D., Piessens F.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020
Plundervolt
Murdock K., Oswald D., Garcia F., Van Bulck J., Gruß D., Piessens F.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020
RAMBleed
Kwong A., Genkin D., Gruß D., Yarom Y.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020
ConTExT: A Generic Approach for Mitigating Spectre
Schwarz M., Lipp M., Canella C., Schilling R., Kargl F., Gruß D.
Network and Distributed System Security Symposium 2020
Fallout: Leaking Data on Meltdown-resistant CPUs
Canella C., Genkin D., Giner L., Gruß D., Lipp M., Minkin M., Moghimi D., Piessens F., Schwarz M., Sunar B., Bulck J., Yarom Y.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
ZombieLoad
Schwarz M., Lipp M., Moghimi D., Bulck J., Stecklina J., Prescher T., Gruß D.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Page Cache Attacks
Gruß D., Kraft E., Tiwari T., Schwarz M., Trachtenberg A., Hennessey J., Ionescu A., Fogh A.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
SGXJail: Defeating Enclave Malware via Confinement
Weiser S., Mayr L., Schwarz M., Gruß D.
RAID 2019 Proceedings
NetSpectre: Read Arbitrary Memory over Network
Schwarz M., Schwarzl M., Lipp M., Masters J., Gruß D.
Computer Security - ESORICS 2019
Wait a second
Eger M., Gruß D.
Proceedings of the 14th International Conference on the Foundations of Digital Games, FDG 2019
A Systematic Evaluation of Transient Execution Attacks and Defenses
Canella C., Bulck J., Schwarz M., Lipp M., Berg B., Ortner P., Piessens F., Evtyushkin D., Gruß D.
Proceedings of the 28th USENIX Security Symposium
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization
Werner M., Unterluggauer T., Giner L., Schwarz M., Gruß D., Mangard S.
28th USENIX Security Symposium (USENIX Security 19)
Practical Enclave Malware with Intel SGX
Schwarz M., Weiser S., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment
ConTExT: Leakage-Free Transient Execution
Schwarz M., Schilling R., Kargl F., Lipp M., Canella C., Gruß D.
2019
Spectre Attacks: Exploiting Speculative Execution
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
40th IEEE Symposium on Security and Privacy
JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits
Schwarz M., Lackner F., Gruß D.
NDSS
Software-basierte Mikroarchitekturangriffe
Gruß D.
Ausgezeichnete Informatikdissertationen 2017, Gesellschaft für Informatik e.V., 81-90, 2019
