\n \n \n
\n
\n \n 2023\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n Phantom: Exploiting Decoder-detectable Mispredictions.\n \n \n \n \n\n\n \n Johannes Wikner; Daniël Trujillo; and Kaveh Razavi.\n\n\n \n\n\n\n In
MICRO, October 2023. \n
Best Paper Award, ETH medal\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n \n URL\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 198 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{wikner_phantom_2023,\n\ttitle = {{Phantom: Exploiting Decoder-detectable Mispredictions}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/phantom_micro23.pdf URL=https://comsec.ethz.ch/research/microarch/inception},\n\tbooktitle = {{MICRO}},\n\tnote = {Best Paper Award, ETH medal},\n\tauthor = {Wikner, Johannes and Trujillo, Daniël and Razavi, Kaveh},\n\tmonth = oct,\n\tyear = {2023},\n\tkeywords = {dir\\_microarch, type\\_tier1, proj\\_promise}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Inception: Exposing New Attack Surfaces with Training in Transient Execution.\n \n \n \n \n\n\n \n Daniël Trujillo; Johannes Wikner; and Kaveh Razavi.\n\n\n \n\n\n\n In
USENIX Security, August 2023. \n
ETH medal\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n \n URL\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 144 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{trujillo_inception_2023,\n\ttitle = {{Inception: Exposing New Attack Surfaces with Training in Transient Execution}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/inception_sec23.pdf URL=https://comsec.ethz.ch/research/microarch/inception},\n\tbooktitle = {{USENIX Security}},\n\tnote = {ETH medal},\n\tauthor = {Trujillo, Daniël and Wikner, Johannes and Razavi, Kaveh},\n\tmonth = aug,\n\tyear = {2023},\n\tkeywords = {dir\\_microarch, type\\_tier1, proj\\_promise}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n \n 2022\n \n \n (2)\n \n \n
\n
\n \n \n
\n
\n\n \n \n \n \n \n \n Retbleed: Arbitrary Speculative Code Execution with Return Instructions.\n \n \n \n \n\n\n \n Johannes Wikner; and Kaveh Razavi.\n\n\n \n\n\n\n In
USENIX Security, August 2022. \n
Intel Bounty Reward, CSAW Europe finalist\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n \n URL\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 66 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{wikner_retbleed_2022,\n\ttitle = {{Retbleed: Arbitrary Speculative Code Execution with Return Instructions}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/retbleed_sec22.pdf URL=https://comsec.ethz.ch/research/microarch/retbleed},\n\tbooktitle = {{USENIX Security}},\n\tauthor = {Wikner, Johannes and Razavi, Kaveh},\n\tnote = {Intel Bounty Reward, CSAW Europe finalist},\n\tmonth = aug,\n\tyear = {2022},\n\tkeywords = {dir\\_microarch, type\\_tier1, proj\\_promise}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n
\n\n \n \n \n \n \n \n Spring: Spectre Returning in the Browser with Speculative Load Queuing and Deep Stacks.\n \n \n \n \n\n\n \n Johannes Wikner; Cristiano Giuffrida; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In
WOOT, May 2022. \n
Mozilla Bounty Reward\n\n
\n\n
\n\n
\n\n \n \n Paper\n \n \n \n URL\n \n \n\n \n\n \n link\n \n \n\n bibtex\n \n\n \n\n \n \n \n 131 downloads\n \n \n\n \n \n \n \n \n \n \n\n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{wikner_spring_2022,\n\ttitle = {{Spring: Spectre Returning in the Browser with Speculative Load Queuing and Deep Stacks}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/spring_woot22.pdf URL=https://comsec.ethz.ch/research/microarch/spring},\n\tbooktitle = {{WOOT}},\n\tnote = {Mozilla Bounty Reward},\n\tauthor = {Wikner, Johannes and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = may,\n\tyear = {2022},\n\tkeywords = {dir\\_microarch, type\\_workshop}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n