var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fcomsec.ethz.ch%2Fwp-content%2Ffiles%2Fbibtex.bib&css=none&owner=&filter=authors:Razavi,keywords:(dir_os)&fullnames=1&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fcomsec.ethz.ch%2Fwp-content%2Ffiles%2Fbibtex.bib&css=none&owner=&filter=authors:Razavi,keywords:(dir_os)&fullnames=1&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fcomsec.ethz.ch%2Fwp-content%2Ffiles%2Fbibtex.bib&css=none&owner=&filter=authors:Razavi,keywords:(dir_os)&fullnames=1&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2022\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n DupeFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels.\n \n \n \n \n\n\n \n Andrei Bacs; Saidgani Musaev; Kaveh Razavi; Cristiano Giuffrida; and Herbert Bos.\n\n\n \n\n\n\n In FAST, February 2022. \n \n\n\n\n
\n\n\n\n \n \n \"DupeFS:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 127 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{dupefs_bacs_2022,\n\ttitle = {DupeFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/dupefs_fast22.pdf},\n\tbooktitle = {{FAST}},\n\tauthor = {Bacs, Andrei and Musaev, Saidgani and Razavi, Kaveh and Giuffrida, Cristiano and Bos, Herbert},\n\tmonth = feb,\n\tyear = {2022},\n\tkeywords = {dir\\_os, dir\\_peripheral, type\\_conf, type\\_tier1}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Speculative Probing: Hacking Blind in the Spectre Era.\n \n \n \n \n\n\n \n Enes Goktas; Kaveh Razavi; Georgios Portokalidis; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In CCS, November 2020. \n Pwnie Award for the Most Innovative Research\n\n\n\n
\n\n\n\n \n \n \"SpeculativePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 677 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{goktas_speculative_2020,\n\ttitle = {Speculative {Probing}: {Hacking} {Blind} in the {Spectre} {Era}},\n\turl = {https://comsec.ethz.ch/wp-content/files/blindside_ccs20.pdf},\n\tbooktitle = {{CCS}},\n\tauthor = {Goktas, Enes and Razavi, Kaveh and Portokalidis, Georgios and Bos, Herbert and Giuffrida, Cristiano},\n\tnote = {Pwnie Award for the Most Innovative Research},\n\tmonth = nov,\n\tyear = {2020},\n\tkeywords = {dir\\_microarch, dir\\_os, proj\\_mfs, type\\_conf, type\\_tier1}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions.\n \n \n \n \n\n\n \n Radhesh Krishnan Konoth; Björn Fischer; Wan Fokkink; Elias Athanasopoulos; Kaveh Razavi; and Herbert Bos.\n\n\n \n\n\n\n In EuroS&P, September 2020. \n Best Paper Award, US Patent App. 17/775,322\n\n\n\n
\n\n\n\n \n \n \"SecurePay:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 92 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{konoth_securepay_2020,\n\ttitle = {{SecurePay}: {Strengthening} {Two}-{Factor} {Authentication} for {Arbitrary} {Transactions}},\n\turl = {https://comsec.ethz.ch/wp-content/files/securepay_eurosp20.pdf},\n\tbooktitle = {{EuroS\\&P}},\n\tauthor = {Konoth, Radhesh Krishnan and Fischer, Björn and Fokkink, Wan and Athanasopoulos, Elias and Razavi, Kaveh and Bos, Herbert},\n\tnote = {Best Paper Award, US Patent App. 17/775,322},\n\tmonth = sep,\n\tyear = {2020},\n\tkeywords = {dir\\_os, type\\_award, proj\\_mfs, type\\_conf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs.\n \n \n \n \n\n\n \n Jakob Koschel; Cristiano Giuffrida; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In EuroS&P, September 2020. \n \n\n\n\n
\n\n\n\n \n \n \"TagBleed:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 39 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{koschel_tagbleed_2020,\n\ttitle = {{TagBleed}: {Breaking} {KASLR} on the Isolated Kernel Address Space using Tagged {TLBs}},\n\turl = {https://comsec.ethz.ch/wp-content/files/tagbleed_eurosp20.pdf},\n\tbooktitle = {{EuroS\\&P}},\n\tauthor = {Koschel, Jakob and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = sep,\n\tyear = {2020},\n\tkeywords = {dir\\_microarch, dir\\_os, proj\\_mfs, type\\_conf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Leave my Apps Alone! A Study on how Android Developers Access Installed Apps on User’s Device.\n \n \n \n \n\n\n \n Gian Luca Scoccia; Ibrahim Kanj; Ivano Malavolta; and Kaveh Razavi.\n\n\n \n\n\n\n In MOBILESOFT, July 2020. \n Best Paper Award\n\n\n\n
\n\n\n\n \n \n \"LeavePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{scoccia_leave_2020,\n\ttitle = {Leave my {Apps} {Alone}! {A} {Study} on how {Android} {Developers} {Access} {Installed} {Apps} on {User}’s {Device}},\n\turl = {https://comsec.ethz.ch/wp-content/files/iam_mobilesoft20.pdf},\n\tbooktitle = {{MOBILESOFT}},\n\tauthor = {Scoccia, Gian Luca and Kanj, Ibrahim and Malavolta, Ivano and Razavi, Kaveh},\n\tmonth = jul,\n\tyear = {2020},\n\tnote = {Best Paper Award},\n\tkeywords = {dir\\_os, type\\_award, type\\_conf, type\\_press}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Stratus: Clouds with Microarchitectural Resource Management.\n \n \n \n \n\n\n \n Kaveh Razavi; and Animesh Trivedi.\n\n\n \n\n\n\n In HotCloud, July 2020. \n \n\n\n\n
\n\n\n\n \n \n \"Stratus:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 8 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{razavi_stratus_2020,\n\ttitle = {{Stratus}: Clouds with Microarchitectural Resource Management},\n\turl = {https://comsec.ethz.ch/wp-content/files/stratus_hotcloud20.pdf},\n\tbooktitle = {{HotCloud}},\n\tauthor = {Razavi, Kaveh and Trivedi, Animesh},\n\tmonth = jul,\n\tyear = {2020},\n\tkeywords = {dir\\_microarch, dir\\_dram, dir\\_peripheral, dir\\_os, proj_mfs, type\\_conf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks.\n \n \n \n \n\n\n \n Radhesh Krishnan Konoth; Marco Oliverio; Andrei Tatar; Dennis Andriesse; Herbert Bos; Cristiano Giuffrida; and Kaveh Razavi.\n\n\n \n\n\n\n In OSDI, October 2018. \n US Patent App. 16/059,357\n\n\n\n
\n\n\n\n \n \n \"ZebRAM:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 40 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{konoth_zebram:_2018,\n\ttitle = {{ZebRAM}: {Comprehensive} and {Compatible} {Software} {Protection} {Against} {Rowhammer} {Attacks}},\n\turl = {https://comsec.ethz.ch/wp-content/files/zebram_osdi18.pdf},\n\tbooktitle = {{OSDI}},\n\tauthor = {Konoth, Radhesh Krishnan and Oliverio, Marco and Tatar, Andrei and Andriesse, Dennis and Bos, Herbert and Giuffrida, Cristiano and Razavi, Kaveh},\n\tmonth = oct,\n    note = {US Patent App. 16/059,357},\n\tyear = {2018},\n\tkeywords = {dir\\_dram, dir\\_os, proj\\_mfs, type\\_conf, type\\_tier1, type\\_top}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM.\n \n \n \n \n\n\n \n Victor Veen; Martina Lindorfer; Yanick Fratantonio; Harikrishnan Padmanabha Pillai; Giovanni Vigna; Christopher Kruegel; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In DIMVA, June 2018. \n Pwnie Award Nomination for the Best Privilege Escalation Bug\n\n\n\n
\n\n\n\n \n \n \"GuardION:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 82 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{van_der_veen_guardion:_2018,\n\ttitle = {{GuardION}: {Practical} {Mitigation} of {DMA}-based {Rowhammer} {Attacks} on {ARM}},\n\turl = {https://comsec.ethz.ch/wp-content/files/dimva2018.pdf},\n\tbooktitle = {{DIMVA}},\n\tauthor = {van der Veen, Victor and Lindorfer, Martina and Fratantonio, Yanick and Padmanabha Pillai, Harikrishnan and Vigna, Giovanni and Kruegel, Christopher and Bos, Herbert and Razavi, Kaveh},\n\tmonth = jun,\n\tyear = {2018},\n\tnote = {Pwnie Award Nomination for the Best Privilege Escalation Bug},\n\tkeywords = {dir\\_dram, dir\\_os, type\\_award, type\\_conf, type\\_press}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Secure Page Fusion with VUsion.\n \n \n \n \n\n\n \n Marco Oliverio; Kaveh Razavi; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In SOSP, October 2017. \n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n \n \"SecureSlides\n  \n \n \n \"SecurePoster\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 67 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{oliverio_secure_2017,\n\ttitle = {Secure {Page} {Fusion} with {VUsion}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/vusion_sosp17.pdf Slides=https://docs.google.com/presentation/d/1Erf1r9gCtkj-JuCBT7BW93W7YjGiplkO8GHAAT56W9s/edit#slide=id.p3 Poster=https://comsec.ethz.ch/wp-content/files/vusion_sosp17_poster.pdf},\n\tbooktitle = {{SOSP}},\n\tauthor = {Oliverio, Marco and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = oct,\n\tyear = {2017},\n\tkeywords = {dir\\_dram, dir\\_microarch, dir\\_os, type\\_conf, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Flip Feng Shui: Rowhammering the VM's Isolation.\n \n \n \n \n\n\n \n Kaveh Razavi; Ben Gras; Erik Bosman; Bart Preneel; Cristiano Giuffrida; and Herbert Bos.\n\n\n \n\n\n\n In Black Hat Europe, November 2016. \n \n\n\n\n
\n\n\n\n \n \n \"FlipPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 65 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{razavi_flip_2016,\n\ttitle = {Flip {Feng} {Shui}: {Rowhammering} the {VM}'s {Isolation}},\n\turl = {https://comsec.ethz.ch/wp-content/files/flip-feng-shui_bheu16.pdf},\n\tbooktitle = {Black {Hat} {Europe}},\n\tauthor = {Razavi, Kaveh and Gras, Ben and Bosman, Erik and Preneel, Bart and Giuffrida, Cristiano and Bos, Herbert},\n\tmonth = nov,\n\tyear = {2016},\n\tkeywords = {dir\\_dram, dir\\_os, type\\_conf}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.\n \n \n \n \n\n\n \n Victor Veen; Yanick Fratantonio; Martina Lindorfer; Daniel Gruss; Clementine Maurice; Giovanni Vigna; Herbert Bos; Kaveh Razavi; and Cristiano Giuffrida.\n\n\n \n\n\n\n In CCS, October 2016. \n Pwnie Award for the Best Privilege Escalation Bug, Android Security Reward, CSAW Best Paper Award, DCSRP Award\n\n\n\n
\n\n\n\n \n \n \"Drammer:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 222 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{van_der_veen_drammer:_2016,\n\ttitle = {Drammer: {Deterministic} {Rowhammer} {Attacks} on {Mobile} {Platforms}},\n\turl = {https://comsec.ethz.ch/wp-content/files/drammer.pdf},\n\tbooktitle = {{CCS}},\n\tauthor = {van der Veen, Victor and Fratantonio, Yanick and Lindorfer, Martina and Gruss, Daniel and Maurice, Clementine and Vigna, Giovanni and Bos, Herbert and Razavi, Kaveh and Giuffrida, Cristiano},\n\tmonth = oct,\n\tyear = {2016},\n\tnote = {Pwnie Award for the Best Privilege Escalation Bug, Android Security Reward, CSAW Best Paper Award, DCSRP Award},\n\tkeywords = {dir\\_dram, dir\\_os, type\\_award, type\\_conf, type\\_press, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Flip Feng Shui: Hammering a Needle in the Software Stack.\n \n \n \n \n\n\n \n Kaveh Razavi; Ben Gras; Erik Bosman; Bart Preneel; Cristiano Giuffrida; and Herbert Bos.\n\n\n \n\n\n\n In USENIX Security, August 2016. \n Pwnie Award Nomination for the Best Cryptographic Attack\n\n\n\n
\n\n\n\n \n \n \"FlipPaper\n  \n \n \n \"FlipSlides\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 120 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{razavi_flip_2016-1,\n\ttitle = {Flip {Feng} {Shui}: {Hammering} a {Needle} in the {Software} {Stack}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/flip-feng-shui_sec16.pdf Slides=https://comsec.ethz.ch/wp-content/files/flip-feng-shui_sec16_pres.pdf},\n\tbooktitle = {{USENIX} {Security}},\n\tauthor = {Razavi, Kaveh and Gras, Ben and Bosman, Erik and Preneel, Bart and Giuffrida, Cristiano and Bos, Herbert},\n\tmonth = aug,\n\tyear = {2016},\n\tnote = {Pwnie Award Nomination for the Best Cryptographic Attack},\n\tkeywords = {dir\\_dram, dir\\_os, type\\_award, type\\_conf, type\\_press, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Over the Edge: Silently Owning Windows 10's Secure Browser.\n \n \n \n \n\n\n \n E. Bosman; K. Razavi; H. Bos; and C. Giuffrida.\n\n\n \n\n\n\n In Black Hat USA, July 2016. \n \n\n\n\n
\n\n\n\n \n \n \"OverPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 42 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{bosman_over_2016,\n\ttitle = {Over the {Edge}: {Silently} {Owning} {Windows} 10's {Secure} {Browser}},\n\turl = {https://comsec.ethz.ch/wp-content/files/over-the-edge_bhusa16.pdf},\n\tbooktitle = {Black {Hat} {USA}},\n\tauthor = {Bosman, E. and Razavi, K. and Bos, H. and Giuffrida, C.},\n\tmonth = jul,\n\tyear = {2016},\n\tkeywords = {dir\\_dram, dir\\_os, type\\_ast, type\\_conf}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector.\n \n \n \n \n\n\n \n Erik Bosman; Kaveh Razavi; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In S&P, May 2016. \n Pwnie Award for the Most Innovative Research\n\n\n\n
\n\n\n\n \n \n \"DedupPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 94 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{bosman_dedup_2016,\n\ttitle = {Dedup {Est} {Machina}: {Memory} {Deduplication} as an {Advanced} {Exploitation} {Vector}},\n\turl = {https://comsec.ethz.ch/wp-content/files/dedup-est-machina_sp16.pdf},\n\tbooktitle = {{S\\&P}},\n\tauthor = {Bosman, Erik and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = may,\n\tyear = {2016},\n\tnote = {Pwnie Award for the Most Innovative Research},\n\tkeywords = {dir\\_dram, dir\\_os, type\\_award, type\\_conf, type\\_press, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n CAIN: Silently Breaking ASLR in the Cloud.\n \n \n \n \n\n\n \n Antonio Barresi; Kaveh Razavi; Mathias Payer; and Thomas R. Gross.\n\n\n \n\n\n\n In WOOT, August 2015. \n \n\n\n\n
\n\n\n\n \n \n \"CAIN:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{barresi_cain:_2015,\n\ttitle = {{CAIN}: {Silently} {Breaking} {ASLR} in the {Cloud}},\n\turl = {https://comsec.ethz.ch/wp-content/files/woot15.pdf},\n\tbooktitle = {{WOOT}},\n\tauthor = {Barresi, Antonio and Razavi, Kaveh and Payer, Mathias and Gross, Thomas R.},\n\tmonth = aug,\n\tyear = {2015},\n\tkeywords = {dir\\_os, type\\_conf, type\\_sidechannel}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);