var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fcomsec.ethz.ch%2Fwp-content%2Ffiles%2Fbibtex.bib&css=none&owner=&filter=authors:Razavi,keywords:(dir_microarch)&fullnames=1&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fcomsec.ethz.ch%2Fwp-content%2Ffiles%2Fbibtex.bib&css=none&owner=&filter=authors:Razavi,keywords:(dir_microarch)&fullnames=1&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fcomsec.ethz.ch%2Fwp-content%2Ffiles%2Fbibtex.bib&css=none&owner=&filter=authors:Razavi,keywords:(dir_microarch)&fullnames=1&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2023\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Phantom: Exploiting Decoder-detectable Mispredictions.\n \n \n \n \n\n\n \n Johannes Wikner; Daniël Trujillo; and Kaveh Razavi.\n\n\n \n\n\n\n In MICRO, October 2023. \n Best Paper Award, ETH medal\n\n\n\n
\n\n\n\n \n \n \"Phantom:Paper\n  \n \n \n \"Phantom:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 198 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{wikner_phantom_2023,\n\ttitle = {{Phantom: Exploiting Decoder-detectable Mispredictions}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/phantom_micro23.pdf URL=https://comsec.ethz.ch/research/microarch/inception},\n\tbooktitle = {{MICRO}},\n\tnote = {Best Paper Award, ETH medal},\n\tauthor = {Wikner, Johannes and Trujillo, Daniël and Razavi, Kaveh},\n\tmonth = oct,\n\tyear = {2023},\n\tkeywords = {dir\\_microarch, type\\_tier1, proj\\_promise}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Inception: Exposing New Attack Surfaces with Training in Transient Execution.\n \n \n \n \n\n\n \n Daniël Trujillo; Johannes Wikner; and Kaveh Razavi.\n\n\n \n\n\n\n In USENIX Security, August 2023. \n ETH medal\n\n\n\n
\n\n\n\n \n \n \"Inception:Paper\n  \n \n \n \"Inception:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 144 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{trujillo_inception_2023,\n\ttitle = {{Inception: Exposing New Attack Surfaces with Training in Transient Execution}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/inception_sec23.pdf URL=https://comsec.ethz.ch/research/microarch/inception},\n\tbooktitle = {{USENIX Security}},\n\tnote = {ETH medal},\n\tauthor = {Trujillo, Daniël and Wikner, Johannes and Razavi, Kaveh},\n\tmonth = aug,\n\tyear = {2023},\n\tkeywords = {dir\\_microarch, type\\_tier1, proj\\_promise}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Retbleed: Arbitrary Speculative Code Execution with Return Instructions.\n \n \n \n \n\n\n \n Johannes Wikner; and Kaveh Razavi.\n\n\n \n\n\n\n In USENIX Security, August 2022. \n Intel Bounty Reward, CSAW Europe finalist\n\n\n\n
\n\n\n\n \n \n \"Retbleed:Paper\n  \n \n \n \"Retbleed:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 66 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{wikner_retbleed_2022,\n\ttitle = {{Retbleed: Arbitrary Speculative Code Execution with Return Instructions}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/retbleed_sec22.pdf URL=https://comsec.ethz.ch/research/microarch/retbleed},\n\tbooktitle = {{USENIX Security}},\n\tauthor = {Wikner, Johannes and Razavi, Kaveh},\n\tnote = {Intel Bounty Reward, CSAW Europe finalist},\n\tmonth = aug,\n\tyear = {2022},\n\tkeywords = {dir\\_microarch, type\\_tier1, proj\\_promise}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Spring: Spectre Returning in the Browser with Speculative Load Queuing and Deep Stacks.\n \n \n \n \n\n\n \n Johannes Wikner; Cristiano Giuffrida; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In WOOT, May 2022. \n Mozilla Bounty Reward\n\n\n\n
\n\n\n\n \n \n \"Spring:Paper\n  \n \n \n \"Spring:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 131 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{wikner_spring_2022,\n\ttitle = {{Spring: Spectre Returning in the Browser with Speculative Load Queuing and Deep Stacks}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/spring_woot22.pdf URL=https://comsec.ethz.ch/research/microarch/spring},\n\tbooktitle = {{WOOT}},\n\tnote = {Mozilla Bounty Reward},\n\tauthor = {Wikner, Johannes and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = may,\n\tyear = {2022},\n\tkeywords = {dir\\_microarch, type\\_workshop}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel.\n \n \n \n \n\n\n \n Brian Johannesmeyer; Jakob Koschel; Kaveh Razavi; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In NDSS, April 2022. \n \n\n\n\n
\n\n\n\n \n \n \"Kasper:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 517 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{johannesmeyer_kasper_2022,\n\ttitle = {Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/kasper_ndss22.pdf},\n\tbooktitle = {{NDSS}},\n\tauthor = {Johannesmeyer, Brian and Koschel, Jakob and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = apr,\n\tyear = {2022},\n\tkeywords = {dir\\_microarch, type\\_conf, type\\_tier1}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript.\n \n \n \n \n\n\n \n Finn Ridder; Pietro Frigo; Emanuele Vannacci; Herbert Bos; Cristiano Giuffrida; and Kaveh Razavi.\n\n\n \n\n\n\n In USENIX Security, August 2021. \n Pwnie Nomination for the Most Underhyped Research\n\n\n\n
\n\n\n\n \n \n \"SMASH:Paper\n  \n \n \n \"SMASH:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 796 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{deridder_smash_2021,\n\ttitle = {{SMASH}: {Synchronized} {Many-sided} {Rowhammer} {Attacks} from {JavaScript}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/smash_sec21.pdf URL=https://comsec.ethz.ch/research/dram/smash},\n\tbooktitle = {{USENIX Security}},\n\tauthor = {de Ridder, Finn and Frigo, Pietro and Vannacci, Emanuele and Bos, Herbert and Giuffrida, Cristiano and Razavi, Kaveh},\n\tnote = {Pwnie Nomination for the Most Underhyped Research},\n\tmonth = aug,\n\tyear = {2021},\n\tkeywords = {dir\\_dram, dir\\_microarch, proj\\_mfs, type\\_mscthesis, type\\_conf, type\\_tier1}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n CrossTalk: Speculative Data Leaks Across Cores Are Real.\n \n \n \n \n\n\n \n Hany Ragab; Alyssa Milburn; Kaveh Razavi; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In S&P, May 2021. \n Intel Bounty Reward\n\n\n\n
\n\n\n\n \n \n \"CrossTalk:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 541 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{ragab_crosstalk_2021,\n\ttitle = {{CrossTalk}: Speculative Data Leaks Across Cores Are Real},\n\turl = {https://comsec.ethz.ch/wp-content/files/crosstalk_sp21.pdf},\n\tbooktitle = {{S\\&P}},\n\tauthor = {Ragab, Hany and Milburn, Alyssa and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = May,\n\tnote = {Intel Bounty Reward},\n\tyear = {2021},\n\tkeywords = {dir\\_microarch, type\\_conf, type\\_press, type\\_tier1}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Speculative Probing: Hacking Blind in the Spectre Era.\n \n \n \n \n\n\n \n Enes Goktas; Kaveh Razavi; Georgios Portokalidis; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In CCS, November 2020. \n Pwnie Award for the Most Innovative Research\n\n\n\n
\n\n\n\n \n \n \"SpeculativePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 676 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{goktas_speculative_2020,\n\ttitle = {Speculative {Probing}: {Hacking} {Blind} in the {Spectre} {Era}},\n\turl = {https://comsec.ethz.ch/wp-content/files/blindside_ccs20.pdf},\n\tbooktitle = {{CCS}},\n\tauthor = {Goktas, Enes and Razavi, Kaveh and Portokalidis, Georgios and Bos, Herbert and Giuffrida, Cristiano},\n\tnote = {Pwnie Award for the Most Innovative Research},\n\tmonth = nov,\n\tyear = {2020},\n\tkeywords = {dir\\_microarch, dir\\_os, proj\\_mfs, type\\_conf, type\\_tier1}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs.\n \n \n \n \n\n\n \n Jakob Koschel; Cristiano Giuffrida; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In EuroS&P, September 2020. \n \n\n\n\n
\n\n\n\n \n \n \"TagBleed:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 39 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{koschel_tagbleed_2020,\n\ttitle = {{TagBleed}: {Breaking} {KASLR} on the Isolated Kernel Address Space using Tagged {TLBs}},\n\turl = {https://comsec.ethz.ch/wp-content/files/tagbleed_eurosp20.pdf},\n\tbooktitle = {{EuroS\\&P}},\n\tauthor = {Koschel, Jakob and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = sep,\n\tyear = {2020},\n\tkeywords = {dir\\_microarch, dir\\_os, proj\\_mfs, type\\_conf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Stratus: Clouds with Microarchitectural Resource Management.\n \n \n \n \n\n\n \n Kaveh Razavi; and Animesh Trivedi.\n\n\n \n\n\n\n In HotCloud, July 2020. \n \n\n\n\n
\n\n\n\n \n \n \"Stratus:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 8 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{razavi_stratus_2020,\n\ttitle = {{Stratus}: Clouds with Microarchitectural Resource Management},\n\turl = {https://comsec.ethz.ch/wp-content/files/stratus_hotcloud20.pdf},\n\tbooktitle = {{HotCloud}},\n\tauthor = {Razavi, Kaveh and Trivedi, Animesh},\n\tmonth = jul,\n\tyear = {2020},\n\tkeywords = {dir\\_microarch, dir\\_dram, dir\\_peripheral, dir\\_os, proj_mfs, type\\_conf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n NetCAT: Practical Cache Attacks from the Network.\n \n \n \n \n\n\n \n Michael Kurth; Ben Gras; Dennis Andriesse; Cristiano Giuffrida; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In S&P, May 2020. \n Intel Bounty Reward, Pwnie Award Nomination for the Most Innovative Research\n\n\n\n
\n\n\n\n \n \n \"NetCAT:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 367 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{kurth_netcat_2020,\n\ttitle = {{NetCAT}: {Practical} {Cache} {Attacks} from the {Network}},\n\turl = {https://comsec.ethz.ch/wp-content/files/netcat_sp20.pdf},\n\tbooktitle = {{S\\&P}},\n\tauthor = {Kurth, Michael and Gras, Ben and Andriesse, Dennis and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = may,\n\tyear = {2020},\n\tnote = {Intel Bounty Reward, Pwnie Award Nomination for the Most Innovative Research},\n\tkeywords = {dir\\_microarch, dir\\_peripheral, proj\\_mfs, type\\_conf, type\\_mscthesis, type\\_press, type\\_tier1}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures.\n \n \n \n \n\n\n \n Ben Gras; Cristiano Giuffrida; Michael Kurth; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In NDSS, February 2020. \n \n\n\n\n
\n\n\n\n \n \n \"ABSynthe:Paper\n  \n \n \n \"ABSynthe:Slides\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 65 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{gras_absynthe_2020,\n\ttitle = {{ABSynthe}: {Automatic} {Blackbox} {Side}-channel {Synthesis} on {Commodity} {Microarchitectures}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/absynthe_ndss20.pdf Slides=https://comsec.ethz.ch/wp-content/files/absynthe_ndss20_pres.pdf},\n\tbooktitle = {{NDSS}},\n\tauthor = {Gras, Ben and Giuffrida, Cristiano and Kurth, Michael and Bos, Herbert and Razavi, Kaveh},\n\tmonth = feb,\n\tyear = {2020},\n\tkeywords = {dir\\_microarch, proj\\_mfs, type\\_conf, type\\_tier1}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n RIDL: Rogue In-flight Data Load.\n \n \n \n \n\n\n \n Stephan Schaik; Alyssa Milburn; Sebastian Österlund; Pietro Frigo; Giorgi Maisuradze; Kaveh Razavi; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In S&P, May 2019. \n DCSRP Award, Intel Bounty Reward, Pwnie Award Nomination for the Most Innovative Research, CSAW Best Paper Award Runner-up\n\n\n\n
\n\n\n\n \n \n \"RIDL:Paper\n  \n \n \n \"RIDL:Slides\n  \n \n \n \"RIDL:Web\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 108 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{van_schaik_ridl_2019,\n\ttitle = {{RIDL}: {Rogue} {In}-flight {Data} {Load}},\n\turl = {Paper=https://mdsattacks.com/files/ridl.pdf Slides=https://mdsattacks.com/slides/slides.html Web=https://mdsattacks.com},\n\tbooktitle = {{S\\&P}},\n\tauthor = {van Schaik, Stephan and Milburn, Alyssa and Österlund, Sebastian and Frigo, Pietro and Maisuradze, Giorgi and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = may,\n\tyear = {2019},\n\tnote = {DCSRP Award, Intel Bounty Reward, Pwnie Award Nomination for the Most Innovative Research, CSAW Best Paper Award Runner-up},\n\tkeywords = {dir\\_microarch, proj\\_mfs, type\\_award, type\\_conf, type\\_press, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks.\n \n \n \n \n\n\n \n Ben Gras; Kaveh Razavi; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In USENIX Security, August 2018. \n Pwnie Award Nomination for the Most Innovative Research\n\n\n\n
\n\n\n\n \n \n \"TranslationPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 459 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{gras_translation_2018,\n\ttitle = {Translation {Leak}-aside {Buffer}: {Defeating} {Cache} {Side}-channel {Protections} with {TLB} {Attacks}},\n\turl = {https://comsec.ethz.ch/wp-content/files/tlbleed_sec18.pdf},\n\tbooktitle = {{USENIX} {Security}},\n\tauthor = {Gras, Ben and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = aug,\n\tyear = {2018},\n\tnote = {Pwnie Award Nomination for the Most Innovative Research},\n\tkeywords = {dir\\_microarch, type\\_award, type\\_conf, type\\_press, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think.\n \n \n \n \n\n\n \n Stephan Schaik; Cristiano Giuffrida; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In USENIX Security, August 2018. \n \n\n\n\n
\n\n\n\n \n \n \"MaliciousPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 91 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{van_schaik_malicious_2018,\n\ttitle = {Malicious {Management} {Unit}: {Why} {Stopping} {Cache} {Attacks} in {Software} is {Harder} {Than} {You} {Think}},\n\turl = {https://comsec.ethz.ch/wp-content/files/xlate_sec18.pdf},\n\tbooktitle = {{USENIX} {Security}},\n\tauthor = {van Schaik, Stephan and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = aug,\n\tyear = {2018},\n\tkeywords = {dir\\_microarch, type\\_conf, type\\_mscthesis, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Secure Page Fusion with VUsion.\n \n \n \n \n\n\n \n Marco Oliverio; Kaveh Razavi; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In SOSP, October 2017. \n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n \n \"SecureSlides\n  \n \n \n \"SecurePoster\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 67 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{oliverio_secure_2017,\n\ttitle = {Secure {Page} {Fusion} with {VUsion}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/vusion_sosp17.pdf Slides=https://docs.google.com/presentation/d/1Erf1r9gCtkj-JuCBT7BW93W7YjGiplkO8GHAAT56W9s/edit#slide=id.p3 Poster=https://comsec.ethz.ch/wp-content/files/vusion_sosp17_poster.pdf},\n\tbooktitle = {{SOSP}},\n\tauthor = {Oliverio, Marco and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = oct,\n\tyear = {2017},\n\tkeywords = {dir\\_dram, dir\\_microarch, dir\\_os, type\\_conf, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches.\n \n \n \n \n\n\n \n Stephan Schaik; Kaveh Razavi; Ben Gras; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In EuroSec, April 2017. \n \n\n\n\n
\n\n\n\n \n \n \"RevAnC:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 138 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{van_schaik_revanc:_2017,\n\ttitle = {{RevAnC}: {A} {Framework} for {Reverse} {Engineering} {Hardware} {Page} {Table} {Caches}},\n\turl = {https://comsec.ethz.ch/wp-content/files/revanc_eurosec17.pdf},\n\tbooktitle = {{EuroSec}},\n\tauthor = {van Schaik, Stephan and Razavi, Kaveh and Gras, Ben and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = apr,\n\tyear = {2017},\n\tkeywords = {dir\\_microarch, type\\_mscthesis, type\\_workshop}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Reverse Engineering Hardware Page Table Caches Using Side-Channel Attacks on the MMU.\n \n \n \n \n\n\n \n Stephan Schaik; Kaveh Razavi; Ben Gras; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n Technical Report IR-CS-51, VU Amsterdam, February 2017.\n \n\n\n\n
\n\n\n\n \n \n \"ReversePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@techreport{van_schaik_reverse_2017,\n\ttitle = {Reverse {Engineering} {Hardware} {Page} {Table} {Caches} {Using} {Side}-{Channel} {Attacks} on the {MMU}},\n\turl = {https://comsec.ethz.ch/wp-content/files/revanc_ir-cs-77.pdf},\n\tnumber = {IR-CS-51},\n\tinstitution = {VU Amsterdam},\n\tauthor = {van Schaik, Stephan and Razavi, Kaveh and Gras, Ben and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = feb,\n\tyear = {2017},\n\tkeywords = {dir\\_microarch}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ASLR on the Line: Practical Cache Attacks on the MMU.\n \n \n \n \n\n\n \n Ben Gras; Kaveh Razavi; Erik Bosman; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In NDSS, February 2017. \n Pwnie Award for the Most Innovative Research, DCSRP Award\n\n\n\n
\n\n\n\n \n \n \"ASLRPaper\n  \n \n \n \"ASLRSlides\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 253 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{gras_aslr_2017,\n\ttitle = {{ASLR} on the {Line}: {Practical} {Cache} {Attacks} on the {MMU}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/anc_ndss17.pdf Slides=https://comsec.ethz.ch/wp-content/files/anc_ndss17_talk.pdf},\n\tbooktitle = {{NDSS}},\n\tauthor = {Gras, Ben and Razavi, Kaveh and Bosman, Erik and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = feb,\n\tyear = {2017},\n\tnote = {Pwnie Award for the Most Innovative Research, DCSRP Award},\n\tkeywords = {dir\\_microarch, type\\_award, type\\_conf, type\\_press, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);