We research cyber security and teach future’s experts
to ensure secure technology in everyone’s life.
NetSpectre: Read Arbitrary Memory over Network
Schwarz M., Schwarzl M., Lipp M., Masters J., Gruß D.
Computer Security - ESORICS 2019, ESORICS 2019, 279-299, (Lecture Notes in Computer Science; vol. 11735)
Wait a second
Eger M., Gruß D.
Proceedings of the 14th International Conference on the Foundations of Digital Games, FDG 2019, 14th International Conference on the Foundations of Digital Games, FDG 2019, (ACM International Conference Proceeding Series)
A Systematic Evaluation of Transient Execution Attacks and Defenses
Canella C., Bulck J., Schwarz M., Lipp M., Berg B., Ortner P., Piessens F., Evtyushkin D., Gruß D.
Proceedings of the 28th USENIX Security Symposium, USENIX Association, 249-266
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization
Werner M., Unterluggauer T., Giner L., Schwarz M., Gruß D., Mangard S.
28th USENIX Security Symposium (USENIX Security 19), USENIX Association, 675-692
Practical Enclave Malware with Intel SGX
Schwarz M., Weiser S., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment, 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 177-196, (Lecture Notes in Computer Science; vol. 11543)
ConTExT: Leakage-Free Transient Execution
Schwarz M., Schilling R., Kargl F., Lipp M., Canella C., Gruß D.
, Cornell University Library, (arXiv.org e-Print archive)
Spectre Attacks: Exploiting Speculative Execution
Kocher P., Horn J., Fogh A., Genkin D., Gruß D., Haas W., Hamburg M., Lipp M., Mangard S., Prescher T., Schwarz M., Yarom Y.
40th IEEE Symposium on Security and Privacy
Store-to-Leak Forwarding
Schwarz M., Canella C., Giner L., Gruß D.
, Cornell University Library, (arXiv.org e-Print archive)
JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits
Schwarz M., Lackner F., Gruß D.
NDSS, Network and Distributed System Security Symposium 2018
Software-basierte Mikroarchitekturangriffe
Gruß D.
Ausgezeichnete Informatikdissertationen 2017, Gesellschaft für Informatik e.V., 81-90
Kernel Isolation
Gruß D., Hansen D., Gregg B.
;login: , Vol. 43(4), 10-14
Software-based microarchitectural attacks
Gruß D.
Information Technology
Meltdown: Reading Kernel Memory from User Space
Lipp M., Schwarz M., Gruß D., Prescher T., Haas W., Fogh A., Horn J., Mangard S., Kocher P., Genkin D., Yarom Y., Hamburg M.
27th USENIX Security Symposium, 27th USENIX Security Symposium, 973-990
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features
Schwarz M., Gruß D., Lipp M., Maurice C., Schuster T., Fogh A., Mangard S.
AsiaCCS' 18, Proceedings of the 2018 on Asia Conference on Computer and Communications Security , 13th ACM ASIA Conference on Information, Computer and Communications Security, 587-600
Use-after-FreeMail
Gruß D., Schwarz M., Wübbeling M., Guggi S., Malderle T., More S., Lipp M.
ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security, 13th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2018, 297-311
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
Schwarz M., Lipp M., Gruß D., Weiser S., Maurice C., Spreitzer R., Mangard S.
Network and Distributed System Security Symposium 2018, Network and Distributed System Security Symposium 2018, 15
JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks
Schwarz M., Lipp M., Gruß D.
Network and Distributed System Security Symposium 2018, Network and Distributed System Security Symposium 2018, 15
Another Flip in the Wall of Rowhammer Defenses
Gruß D., Lipp M., Schwarz M., Genkin D., Juffinger J., O'Connell S., Schoechl W., Yarom Y.
39th IEEE Symposium on Security and Privacy 2018
ProcHarvester: Fully Automated Analysis of Procfs Side-Channel Leaks on Android
Spreitzer R., Kirchengast F., Gruß D., Mangard S.
ASIACCS '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security , 749-763
Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory
Gruß D., Lettner J., Schuster F., Ohrimenko O., Haller I., Costa M.
2017 Proceedings of the 26th USENIX Security Symposium