We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors
Lipp M., Hadzic V., Schwarz M., Perais A., Maurice C., Gruß D.
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2020
The Evolution of Transient-Execution Attacks
Canella C., Khasawneh K., Gruß D.
GLSVLSI 2020 - Proceedings of the 2020 Great Lakes Symposium on VLSI
Evolution of Defenses against Transient-Execution Attacks
Canella C., Pudukotai Dinakarrao S., Gruß D., Khasawneh K.
GLSVLSI 2020 - Proceedings of the 2020 Great Lakes Symposium on VLSI
Plundervolt
Murdock K., Oswald D., Garcia F., Van Bulck J., Piessens F., Gruß D.
IEEE Security & Privacy, Vol. 18(5), 2020
How trusted execution environments fuel research on microarchitectural attacks
Schwarz M., Gruß D.
IEEE Security & Privacy, Vol. 18(5), 2020
Nethammer: Inducing Rowhammer Faults through Network Requests
Lipp M., Schwarz M., Raab L., Lamster L., Aga M., Maurice C., Gruß D.
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86
Schrammel D., Weiser S., Steinegger S., Schwarzl M., Schwarz M., Mangard S., Gruß D.
Proceedings of the 29th USENIX Security Symposium
Spectre attacks
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
Communications of the ACM, Vol. 63(7), 2020
Meltdown
Lipp M., Schwarz M., Gruß D., Prescher T., Haas W., Horn J., Mangard S., Kocher P., Genkin D., Yarom Y., Hamburg M., Strackx R.
Communications of the ACM, Vol. 63(6), 2020
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
Van Bulck J., Moghimi D., Schwarz M., Lipp M., Minkin M., Genkin D., Yarom Y., Sunar B., Gruß D., Piessens F.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020
Plundervolt
Murdock K., Oswald D., Garcia F., Van Bulck J., Gruß D., Piessens F.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020
RAMBleed
Kwong A., Genkin D., Gruß D., Yarom Y.
Proceedings - 2020 IEEE Symposium on Security and Privacy, SP 2020
ConTExT: A Generic Approach for Mitigating Spectre
Schwarz M., Lipp M., Canella C., Schilling R., Kargl F., Gruß D.
Network and Distributed System Security Symposium 2020
Fallout: Leaking Data on Meltdown-resistant CPUs
Canella C., Genkin D., Giner L., Gruß D., Lipp M., Minkin M., Moghimi D., Piessens F., Schwarz M., Sunar B., Bulck J., Yarom Y.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
ZombieLoad
Schwarz M., Lipp M., Moghimi D., Bulck J., Stecklina J., Prescher T., Gruß D.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
Page Cache Attacks
Gruß D., Kraft E., Tiwari T., Schwarz M., Trachtenberg A., Hennessey J., Ionescu A., Fogh A.
CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
SGXJail: Defeating Enclave Malware via Confinement
Weiser S., Mayr L., Schwarz M., Gruß D.
RAID 2019 Proceedings
NetSpectre: Read Arbitrary Memory over Network
Schwarz M., Schwarzl M., Lipp M., Masters J., Gruß D.
Computer Security - ESORICS 2019
Wait a second
Eger M., Gruß D.
Proceedings of the 14th International Conference on the Foundations of Digital Games, FDG 2019
A Systematic Evaluation of Transient Execution Attacks and Defenses
Canella C., Bulck J., Schwarz M., Lipp M., Berg B., Ortner P., Piessens F., Evtyushkin D., Gruß D.
Proceedings of the 28th USENIX Security Symposium
