关注
Stefan Gast
标题
引用次数
引用次数
年份
SQUIP: Exploiting the Scheduler Queue Contention Side Channel
S Gast, J Juffinger, M Schwarzl, G Saileshwar, A Kogler, S Franza, M Köstl, ...
2023 IEEE Symposium on Security and Privacy (SP), 2256-2272, 2023
202023
SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel
L Maar, S Gast, M Unterguggenberger, M Oberhuber, S Mangard
USENIX Security Symposium, 4051-4068, 2024
22024
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
A Naseredini, S Gast, M Schwarzl, PMS Bernardo, A Smajic, C Canella, ...
arXiv preprint arXiv:2111.12528, 2021
22021
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
RL Schröder, S Gast, Q Guo
USENIX Security Symposium, 6669-6686, 2024
12024
Remote Scheduler Contention Attacks
S Gast, J Juffinger, L Maar, C Royer, A Kogler, D Gruss
Financial Cryptography and Data Security, 2024
12024
SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript
S Gast, R Czerny, J Juffinger, F Rauscher, S Franza, D Gruss
USENIX Security Symposium, 2315-2332, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–6