var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fcomsec.ethz.ch%2Fwp-content%2Ffiles%2Fbibtex.bib&css=none&owner=&filter=authors:Wikner&fullnames=1&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fcomsec.ethz.ch%2Fwp-content%2Ffiles%2Fbibtex.bib&css=none&owner=&filter=authors:Wikner&fullnames=1&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fcomsec.ethz.ch%2Fwp-content%2Ffiles%2Fbibtex.bib&css=none&owner=&filter=authors:Wikner&fullnames=1&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2023\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Phantom: Exploiting Decoder-detectable Mispredictions.\n \n \n \n \n\n\n \n Johannes Wikner; Daniël Trujillo; and Kaveh Razavi.\n\n\n \n\n\n\n In MICRO, October 2023. \n Best Paper Award, ETH medal\n\n\n\n
\n\n\n\n \n \n \"Phantom:Paper\n  \n \n \n \"Phantom:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 198 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{wikner_phantom_2023,\n\ttitle = {{Phantom: Exploiting Decoder-detectable Mispredictions}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/phantom_micro23.pdf URL=https://comsec.ethz.ch/research/microarch/inception},\n\tbooktitle = {{MICRO}},\n\tnote = {Best Paper Award, ETH medal},\n\tauthor = {Wikner, Johannes and Trujillo, Daniël and Razavi, Kaveh},\n\tmonth = oct,\n\tyear = {2023},\n\tkeywords = {dir\\_microarch, type\\_tier1, proj\\_promise}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Inception: Exposing New Attack Surfaces with Training in Transient Execution.\n \n \n \n \n\n\n \n Daniël Trujillo; Johannes Wikner; and Kaveh Razavi.\n\n\n \n\n\n\n In USENIX Security, August 2023. \n ETH medal\n\n\n\n
\n\n\n\n \n \n \"Inception:Paper\n  \n \n \n \"Inception:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 144 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{trujillo_inception_2023,\n\ttitle = {{Inception: Exposing New Attack Surfaces with Training in Transient Execution}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/inception_sec23.pdf URL=https://comsec.ethz.ch/research/microarch/inception},\n\tbooktitle = {{USENIX Security}},\n\tnote = {ETH medal},\n\tauthor = {Trujillo, Daniël and Wikner, Johannes and Razavi, Kaveh},\n\tmonth = aug,\n\tyear = {2023},\n\tkeywords = {dir\\_microarch, type\\_tier1, proj\\_promise}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Retbleed: Arbitrary Speculative Code Execution with Return Instructions.\n \n \n \n \n\n\n \n Johannes Wikner; and Kaveh Razavi.\n\n\n \n\n\n\n In USENIX Security, August 2022. \n Intel Bounty Reward, CSAW Europe finalist\n\n\n\n
\n\n\n\n \n \n \"Retbleed:Paper\n  \n \n \n \"Retbleed:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 66 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{wikner_retbleed_2022,\n\ttitle = {{Retbleed: Arbitrary Speculative Code Execution with Return Instructions}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/retbleed_sec22.pdf URL=https://comsec.ethz.ch/research/microarch/retbleed},\n\tbooktitle = {{USENIX Security}},\n\tauthor = {Wikner, Johannes and Razavi, Kaveh},\n\tnote = {Intel Bounty Reward, CSAW Europe finalist},\n\tmonth = aug,\n\tyear = {2022},\n\tkeywords = {dir\\_microarch, type\\_tier1, proj\\_promise}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Spring: Spectre Returning in the Browser with Speculative Load Queuing and Deep Stacks.\n \n \n \n \n\n\n \n Johannes Wikner; Cristiano Giuffrida; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In WOOT, May 2022. \n Mozilla Bounty Reward\n\n\n\n
\n\n\n\n \n \n \"Spring:Paper\n  \n \n \n \"Spring:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 131 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{wikner_spring_2022,\n\ttitle = {{Spring: Spectre Returning in the Browser with Speculative Load Queuing and Deep Stacks}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/spring_woot22.pdf URL=https://comsec.ethz.ch/research/microarch/spring},\n\tbooktitle = {{WOOT}},\n\tnote = {Mozilla Bounty Reward},\n\tauthor = {Wikner, Johannes and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = may,\n\tyear = {2022},\n\tkeywords = {dir\\_microarch, type\\_workshop}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);