Another flip in the wall of rowhammer defenses D Gruss, M Lipp, M Schwarz, D Genkin, J Juffinger, S O'Connell, ... 2018 IEEE Symposium on Security and Privacy (SP), 245-261, 2018 | 272 | 2018 |
{Half-Double}: Hammering from the next row over A Kogler, J Juffinger, S Qazi, Y Kim, M Lipp, N Boichat, E Shiu, M Nissler, ... 31st USENIX Security Symposium (USENIX Security 22), 3807-3824, 2022 | 56 | 2022 |
CSI: Rowhammer–Cryptographic security and integrity against rowhammer J Juffinger, L Lamster, A Kogler, M Eichlseder, M Lipp, D Gruss 2023 IEEE Symposium on Security and Privacy (SP), 1702-1718, 2023 | 34 | 2023 |
Squip: Exploiting the scheduler queue contention side channel S Gast, J Juffinger, M Schwarzl, G Saileshwar, A Kogler, S Franza, M Köstl, ... 2023 IEEE Symposium on Security and Privacy (SP), 2256-2272, 2023 | 15 | 2023 |
Pt-guard: Integrity-protected page tables to defend against breakthrough rowhammer attacks A Saxena, G Saileshwar, J Juffinger, A Kogler, D Gruss, M Qureshi 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2023 | 8 | 2023 |
{Collide+ Power}: Leaking Inaccessible Data with Software-based Power Side Channels A Kogler, J Juffinger, L Giner, L Gerlach, M Schwarzl, M Schwarz, D Gruss, ... 32nd USENIX Security Symposium (USENIX Security 23), 7285-7302, 2023 | 6 | 2023 |
Suit: Secure undervolting with instruction traps J Juffinger, S Kalinin, D Gruss, F Mueller Proceedings of the 29th ACM International Conference on Architectural …, 2024 | 1 | 2024 |
Remote scheduler contention attacks S Gast, J Juffinger, L Maar, C Royer, A Kogler, D Gruss arXiv preprint arXiv:2404.07042, 2024 | 1 | 2024 |
IdleLeak: Exploiting Idle State Side Effects for Information Leakage F Rauscher, A Kogler, J Juffinger, D Gruss Network and Distributed System Security (NDSS) Symposium 2024, 2024 | | 2024 |
Side-Channel Security J Juffinger | | 2023 |
Presshammer: Rowhammer and Rowpress without Physical Address Information J Juffinger, SR Neela, M Heckel, L Schwarz, F Adamsky, D Gruss | | |
Rowhammer Exploits are still possible J Juffinger | | |