We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
Schwarz M., Lipp M., Gruß D., Weiser S., Maurice C., Spreitzer R., Mangard S.
Network and Distributed System Security Symposium 2018, Network and Distributed System Security Symposium 2018, 15
JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks
Schwarz M., Lipp M., Gruß D.
Network and Distributed System Security Symposium 2018, Network and Distributed System Security Symposium 2018, 15
Another Flip in the Wall of Rowhammer Defenses
Gruß D., Lipp M., Schwarz M., Genkin D., Juffinger J., O'Connell S., Schoechl W., Yarom Y.
39th IEEE Symposium on Security and Privacy 2018
ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android
Spreitzer R., Kirchengast F., Gruß D., Mangard S.
ASIACCS '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security , 749-763
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory
Gruß D., Lettner J., Schuster F., Ohrimenko O., Haller I., Costa M.
2017 Proceedings of the 26th USENIX Security Symposium
Software-based Microarchitectural Attacks
Gruß D.
, Doctoral Thesis
KASLR is Dead
Gruß D., Lipp M., Schwarz M., Fellner R., Maurice C., Mangard S.
Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Proceedings, 9th International Symposium on Engineering Secure Software and Systems, ESSoS 2017, 161-176, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10379 LNCS)
Practical Keystroke Timing Attacks in Sandboxed JavaScript
Lipp M., Gruß D., Schwarz M., Bidner D., Maurice C., Mangard S.
Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings, 22nd European Symposium on Research in Computer Security, ESORICS 2017, 191-209, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10493 LNCS)
Malware guard extension
Schwarz M., Weiser S., Gruß D., Maurice C., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment - 14th International Conference, DIMVA 2017, 2017, 14th International Conference on Detection of Intrusions and Malware, and Vulnerability Assess, DIMVA 2017, 3-24, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10327 LNCS)
Fantastic timers and where to find them
Schwarz M., Maurice C., Gruß D., Mangard S.
Financial Cryptography and Data Security - 21st International Conference, FC 2017, Revised Selected Papers, 21st International Conference on Financial Cryptography and Data Security, 247-267, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10322 LNCS)
Prefetch Side-Channel Attacks
Gruß D., Maurice C., Fogh A., Lipp M., Mangard S.
CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 23rd ACM Conference on Computer and Communications Security, 368-379
Drammer
Van Der Veen V., Fratantonio Y., Lindorfer M., Gruß D., Maurice C., Vigna G., Bos H., Razavi K., Giuffrida C.
CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 23rd ACM Conference on Computer and Communications Security, 1675-1689
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
Gruß D., Maurice C., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), Springer, (DIMVA)
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
Peßl P., Gruß D., Maurice C., Schwarz M., Mangard S.
Proceedings of the 25th USENIX Security Symposium, 565-581
Flush+Flush
Gruß D., Maurice C., Wagner K., Mangard S.
Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Proceedings, 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, 279-299, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9721)
ARMageddon: Last-Level Cache Attacks on Mobile Devices
Lipp M., Gruß D., Spreitzer R., Maurice C., Mangard S.
25th USENIX Security Symposium (USENIX Security 16), USENIX Association, 549-564
Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches
Gruß D., Spreitzer R., Mangard S.
24th USENIX Security Symposium, Washington, D.C., USA, August 12-14, 2015, 24th USENIX Security Symposium, 897-912
Practical memory deduplication attacks in sandboxed javascript
Gruß D., Bidner D., Mangard S.
Computer Security – ESORICS 2015 - 20th European Symposium on Research in Computer Security, Proceedings, 20th European Symposium on Research in Computer Security, ESORICS 2015, 108-122, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9326)
Multi-platform Operating System Kernels
Gruß D.
, Master's Thesis