Author of the publication

SMoTherSpectre: Exploiting Speculative Execution through Port Contention.

, , , , , , and . ACM Conference on Computer and Communications Security, page 785-800. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers., , , , , and . SANER, page 307-317. IEEE, (2021)Bypassing memory safety mechanisms through speculative control flow hijacks., , , , , and . CoRR, (2020)Speculator: a tool to analyze speculative execution attacks and mitigations., , , , , and . ACSAC, page 747-761. ACM, (2019)Two methods for exploiting speculative control flow hijacks., , , , and . WOOT @ USENIX Security Symposium, USENIX Association, (2019)From random block corruption to privilege escalation: A filesystem attack vector for rowhammer-like attacks., , , and . WOOT, USENIX Association, (2017)Kernel Self-Protection through Quantified Attack Surface Reduction.. Braunschweig University of Technology, Germany, (2014)A transparent defense against USB eavesdropping attacks., , and . EUROSEC, page 6:1-6:6. ACM, (2016)A Tale of Two Kernels: Towards Ending Kernel Hardening Wars with Split Kernel., and . ACM Conference on Computer and Communications Security, page 1366-1377. ACM, (2014)Bypassing memory safety mechanisms through speculative control flow hijacks., , , , , and . EuroS&P, page 633-649. IEEE, (2021)Memory Categorization: Separating Attacker-Controlled Data., , and . DIMVA, volume 11543 of Lecture Notes in Computer Science, page 263-287. Springer, (2019)