Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Moritz Lipp"'
Autor:
Andreas Kogler, Daniel Weber, Martin Haubenwallner, Moritz Lipp, Daniel Gruss, Michael Schwarz
Publikováno v:
2022 IEEE Symposium on Security and Privacy (SP).
Autor:
Michael Schwarz, Daniel Genkin, Daniel Gruss, Raoul Strackx, Jann Horn, Mike Hamburg, Yuval Yarom, Moritz Lipp, Werner Haas, Stefan Mangard, Thomas Prescher, Paul C. Kocher
Publikováno v:
Communications of the ACM. 63:46-56
Lessons learned from Meltdown's exploitation of the weaknesses in today's processors.
Autor:
Jürgen von Hagen, Bernd Kubista, Ernst-Moritz Lipp, Stefan Lutz, Manfred J. M. Neumann, Tommaso Padoa-Schioppa, Bernd Rudolph, Jürgen Siebke
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::43b94e24df9ddfcadc442660c26c1555
https://doi.org/10.2307/j.ctv28hj3p4
https://doi.org/10.2307/j.ctv28hj3p4
Memory utilization can be reduced by merging identical memory blocks into copy-on-write mappings. Previous work showed that this so-called memory deduplication can be exploited in local attacks to break ASLR, spy on other programs,and determine the p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a03fbd475e873c617ecf2c57a5dda33e
http://arxiv.org/abs/2111.08553
http://arxiv.org/abs/2111.08553
Autor:
Claudio Canella, Moritz Lipp, Andreas Kogler, Catherine Easdon, Michael Schwarz, Daniel Gruss, David Oswald
Publikováno v:
2021 IEEE Symposium on Security and Privacy (SP)
IEEE Symposium on Security and Privacy
IEEE Symposium on Security and Privacy
Power side-channel attacks exploit variations in power consumption to extract secrets from a device, e.g., cryptographic keys. Prior attacks typically required physical access to the target device and specialized equipment such as probes and a high-r
Publikováno v:
IEEE Access, Vol 12, Pp 43039-43052 (2024)
The safety approval of Highly Automated Vehicles (HAV) still faces the automotive industry with economic and legal challenges. For verification and validation, it is essential to describe the intended behavior of an HAV in the development process in
Externí odkaz:
https://doaj.org/article/ede5c466bb6c416cbb08840189467a38
Publikováno v:
NDSS
Publikováno v:
Proceedings of the 15th ACM Asia Conference on Computer and Communications Security
15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2020)
15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2020), 2020, Taipei, Taiwan. ⟨10.1145/3320269.3384746⟩
AsiaCCS
15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2020)
15th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2020), 2020, Taipei, Taiwan. ⟨10.1145/3320269.3384746⟩
AsiaCCS
International audience; To optimize the energy consumption and performance of their CPUs, AMD introduced a way predictor for the L1-data (L1D) cache to predict in which cache way a certain address is located. Consequently, only this way is accessed,
Autor:
Thomas Prescher, Daniel Genkin, Werner Haas, Moritz Lipp, Michael Schwarz, Stefan Mangard, Daniel Gruss, Paul C. Kocher, Mike Hamburg, Anders Fogh, Yuval Yarom, Jann Horn
Publikováno v:
IEEE Symposium on Security and Privacy
2019 IEEE Symposium on Security and Privacy (SP)
2019 IEEE Symposium on Security and Privacy (SP)
Modern processors use branch prediction and speculative execution to maximize performance. For example, if the destination of a branch depends on a memory value that is in the process of being read, CPUs will try to guess the destination and attempt