Publications
CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP
Gast S., Weissteiner H., Schröder R., Gruß D.
Network and Distributed System Security (NDSS) Symposium 2025, Network and Distributed System Security Symposium 2025
SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript
Gast S., Czerny R., Juffinger J., Rauscher F., Franza S., Gruß D.
Proceedings of the 33rd USENIX Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 2315-2332
SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel
Maar L., Gast S., Unterguggenberger M., Oberhuber M., Mangard S.
Proceedings of the 33rd USENIX Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 4051-4068, (Proceedings of the 33rd USENIX Security Symposium)
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
Schröder R., Gast S., Guo Q.
Proceedings of the 33rd USENIX Security Symposium, 33rd USENIX Security Symposium: USENIX Security 2024, 6669-6686
Remote Scheduler Contention Attacks
Gast S., Juffinger J., Maar L., Royer C., Kogler A., Gruß D.
Financial Cryptography and Data Security - 28th International Conference, FC 2024, Revised Selected Papers, Financial Cryptography and Data Security 2024, 365-383, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics))