var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fcomsec.ethz.ch%2Fwp-content%2Ffiles%2Fbibtex.bib&fullnames=1&owner=none&css=none&jsonp=1&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fcomsec.ethz.ch%2Fwp-content%2Ffiles%2Fbibtex.bib&fullnames=1&owner=none&css=none&jsonp=1\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fcomsec.ethz.ch%2Fwp-content%2Ffiles%2Fbibtex.bib&fullnames=1&owner=none&css=none&jsonp=1\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2024\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms.\n \n \n \n \n\n\n \n Patrick Jattke; Max Wipfli; Flavien Solt; Michele Marazzi; Matej Bölcskei; and Kaveh Razavi.\n\n\n \n\n\n\n In USENIX Security, August 2024. \n \n\n\n\n
\n\n\n\n \n \n \"ZenHammer:Paper\n  \n \n \n \"ZenHammer:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 60 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{jattke_zenhammer_2024,\n\ttitle = {{ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms}}, \n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/zenhammer_sec24.pdf URL=https://comsec.ethz.ch/zenhammer},\n\tbooktitle = {{USENIX Security}},\n\tauthor = {Jattke, Patrick and Wipfli, Max and Solt, Flavien and Marazzi, Michele and Bölcskei, Matej and Razavi, Kaveh},\n\tmonth = aug,\n\tyear = {2024},\n\tkeywords = {dir\\_dram, proj\\_mfs, proj\\_promise, proj\\_nccr, type\\_conf, type\\_tier1}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Cascade: CPU Fuzzing via Intricate Program Generation.\n \n \n \n \n\n\n \n Flavien Solt; Katharina Ceesay-Seitz; and Kaveh Razavi.\n\n\n \n\n\n\n In USENIX Security, August 2024. \n \n\n\n\n
\n\n\n\n \n \n \"Cascade:Paper\n  \n \n \n \"Cascade:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 228 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{solt_cascade_2024,\n\ttitle = {{Cascade: CPU Fuzzing via Intricate Program Generation}}, \n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/cascade_sec24.pdf URL=https://comsec.ethz.ch/cascade},\n\tbooktitle = {{USENIX Security}},\n\tauthor = {Solt, Flavien and Ceesay-Seitz, Katharina and Razavi, Kaveh},\n\tmonth = aug,\n\tyear = {2024},\n\tkeywords = {dir\\_designsec, proj\\_lastbug, proj\\_promise, type\\_tier1}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n HiFi-DRAM: Enabling High-fidelity DRAM Research by Uncovering Sense Amplifiers with IC Imaging.\n \n \n \n\n\n \n Michele Marazzi; Tristan Sachsenweger; Flavien Solt; Peng Zeng; Kubo Takashi; Maksym Yarema; and Kaveh Razavi.\n\n\n \n\n\n\n In ISCA, July 2024. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{marazzi_hifidram_2024,\n\ttitle = {{HiFi-DRAM: Enabling High-fidelity DRAM Research by Uncovering Sense Amplifiers with IC Imaging}}, \n\tbooktitle = {{ISCA}},\n\tauthor = {Marazzi, Michele and Sachsenweger, Tristan and Solt, Flavien and Zeng, Peng and Takashi, Kubo and Yarema, Maksym and Razavi, Kaveh},\n\tmonth = jul,\n\tyear = {2024},\n\tkeywords = {dir\\_dram, proj\\_mfs, proj\\_promise, proj\\_nccr, type\\_conf, type\\_tier1}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2023\n \n \n (4)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Phantom: Exploiting Decoder-detectable Mispredictions.\n \n \n \n \n\n\n \n Johannes Wikner; Daniël Trujillo; and Kaveh Razavi.\n\n\n \n\n\n\n In MICRO, October 2023. \n Best Paper Award, ETH medal\n\n\n\n
\n\n\n\n \n \n \"Phantom:Paper\n  \n \n \n \"Phantom:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 200 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{wikner_phantom_2023,\n\ttitle = {{Phantom: Exploiting Decoder-detectable Mispredictions}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/phantom_micro23.pdf URL=https://comsec.ethz.ch/research/microarch/inception},\n\tbooktitle = {{MICRO}},\n\tnote = {Best Paper Award, ETH medal},\n\tauthor = {Wikner, Johannes and Trujillo, Daniël and Razavi, Kaveh},\n\tmonth = oct,\n\tyear = {2023},\n\tkeywords = {dir\\_microarch, type\\_tier1, proj\\_promise}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Inception: Exposing New Attack Surfaces with Training in Transient Execution.\n \n \n \n \n\n\n \n Daniël Trujillo; Johannes Wikner; and Kaveh Razavi.\n\n\n \n\n\n\n In USENIX Security, August 2023. \n ETH medal\n\n\n\n
\n\n\n\n \n \n \"Inception:Paper\n  \n \n \n \"Inception:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 145 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{trujillo_inception_2023,\n\ttitle = {{Inception: Exposing New Attack Surfaces with Training in Transient Execution}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/inception_sec23.pdf URL=https://comsec.ethz.ch/research/microarch/inception},\n\tbooktitle = {{USENIX Security}},\n\tnote = {ETH medal},\n\tauthor = {Trujillo, Daniël and Wikner, Johannes and Razavi, Kaveh},\n\tmonth = aug,\n\tyear = {2023},\n\tkeywords = {dir\\_microarch, type\\_tier1, proj\\_promise}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n BLASTER: Characterizing the Blast Radius of Rowhammer.\n \n \n \n \n\n\n \n Zhenrong Lang; Patrick Jattke; Michele Marazzi; and Kaveh Razavi.\n\n\n \n\n\n\n In DRAMSec, June 2023. \n Award for the best BSc thesis\n\n\n\n
\n\n\n\n \n \n \"BLASTER:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 56 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{lang_blaster_2023,\n\ttitle = {{BLASTER}: {Characterizing} the {Blast} {Radius} of {Rowhammer}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/blaster_dramsec23.pdf},\n\tbooktitle = {{DRAMSec}},\n\tnote = {Award for the best BSc thesis},\n\tauthor = {Lang, Zhenrong and Jattke, Patrick and Marazzi, Michele and Razavi, Kaveh},\n\tmonth = June,\n\tyear = {2023},\n\tkeywords = {dir\\_dram, proj\\_promise, proj\\_nccr, type\\_workshop}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations.\n \n \n \n \n\n\n \n Michele Marazzi; Flavien Solt; Patrick Jattke; Kubo Takashi; and Kaveh Razavi.\n\n\n \n\n\n\n In S&P, May 2023. \n Patent pending\n\n\n\n
\n\n\n\n \n \n \"REGA:Paper\n  \n \n \n \"REGA:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 111 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{marazzi_rega_2023,\n\ttitle = {{REGA}: {Scalable} {Rowhammer} {Mitigation} with {Refresh-Generating} {Activations}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/rega_sp23.pdf URL=https://comsec.ethz.ch/research/dram/rega},\n\tbooktitle = {{S\\&P}},\n\tnote = {Patent pending},\n\tauthor = {Marazzi, Michele and Solt, Flavien and Jattke, Patrick and Takashi, Kubo and Razavi, Kaveh},\n\tmonth = may,\n\tyear = {2023},\n\tkeywords = {dir\\_dram, proj\\_mfs, proj\\_promise, proj\\_nccr, type\\_conf, type\\_tier1}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n RemembERR: Leveraging Microprocessor Errata for Design Testing and Validation.\n \n \n \n \n\n\n \n Flavien Solt; Patrick Jattke; and Kaveh Razavi.\n\n\n \n\n\n\n In MICRO, October 2022. \n \n\n\n\n
\n\n\n\n \n \n \"RemembERR:Paper\n  \n \n \n \"RemembERR:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 47 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{solt_rememberr_2022,\n\ttitle = {{RemembERR: Leveraging Microprocessor Errata for Design Testing and Validation}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/rememberr_micro22.pdf URL=https://comsec.ethz.ch/research/hardware-design-security/rememberr},\n\tbooktitle = {{MICRO}},\n\tauthor = {Solt, Flavien and Jattke, Patrick and Razavi, Kaveh},\n\tmonth = oct,\n\tyear = {2022},\n\tkeywords = {dir\\_designsec, proj\\_lastbug, proj\\_promise, proj\\_nccr, type\\_tier1}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Retbleed: Arbitrary Speculative Code Execution with Return Instructions.\n \n \n \n \n\n\n \n Johannes Wikner; and Kaveh Razavi.\n\n\n \n\n\n\n In USENIX Security, August 2022. \n Intel Bounty Reward, CSAW Europe finalist\n\n\n\n
\n\n\n\n \n \n \"Retbleed:Paper\n  \n \n \n \"Retbleed:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 67 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{wikner_retbleed_2022,\n\ttitle = {{Retbleed: Arbitrary Speculative Code Execution with Return Instructions}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/retbleed_sec22.pdf URL=https://comsec.ethz.ch/research/microarch/retbleed},\n\tbooktitle = {{USENIX Security}},\n\tauthor = {Wikner, Johannes and Razavi, Kaveh},\n\tnote = {Intel Bounty Reward, CSAW Europe finalist},\n\tmonth = aug,\n\tyear = {2022},\n\tkeywords = {dir\\_microarch, type\\_tier1, proj\\_promise}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL.\n \n \n \n \n\n\n \n Flavien Solt; Ben Gras; and Kaveh Razavi.\n\n\n \n\n\n\n In USENIX Security, August 2022. \n Patent pending\n\n\n\n
\n\n\n\n \n \n \"CellIFT:Paper\n  \n \n \n \"CellIFT:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 35 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{solt_cellift_2022,\n\ttitle = {{CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/cellift_sec22.pdf URL=https://comsec.ethz.ch/cellift},\n\tbooktitle = {{USENIX Security}},\n\tauthor = {Solt, Flavien and Gras, Ben and Razavi, Kaveh},\n\tnote = {Patent pending},\n\tmonth = aug,\n\tyear = {2022},\n\tkeywords = {dir\\_designsec, proj\\_lastbug, proj\\_promise, type\\_tier1}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Spring: Spectre Returning in the Browser with Speculative Load Queuing and Deep Stacks.\n \n \n \n \n\n\n \n Johannes Wikner; Cristiano Giuffrida; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In WOOT, May 2022. \n Mozilla Bounty Reward\n\n\n\n
\n\n\n\n \n \n \"Spring:Paper\n  \n \n \n \"Spring:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 131 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{wikner_spring_2022,\n\ttitle = {{Spring: Spectre Returning in the Browser with Speculative Load Queuing and Deep Stacks}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/spring_woot22.pdf URL=https://comsec.ethz.ch/research/microarch/spring},\n\tbooktitle = {{WOOT}},\n\tnote = {Mozilla Bounty Reward},\n\tauthor = {Wikner, Johannes and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = may,\n\tyear = {2022},\n\tkeywords = {dir\\_microarch, type\\_workshop}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ProTRR: Principled yet Optimal In-DRAM Target Row Refresh.\n \n \n \n \n\n\n \n Michele Marazzi; Patrick Jattke; Flavien Solt; and Kaveh Razavi.\n\n\n \n\n\n\n In S&P, May 2022. \n Patent pending, ETH Spark Award Nomination, CSAW Europe finalist\n\n\n\n
\n\n\n\n \n \n \"ProTRR:Paper\n  \n \n \n \"ProTRR:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 33 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{marazzi_protrr_2022,\n\ttitle = {{ProTRR}: {Principled} yet {Optimal} {In-DRAM} {Target Row Refresh}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/protrr_sp22.pdf URL=https://comsec.ethz.ch/research/dram/protrr},\n\tbooktitle = {{S\\&P}},\n\tnote = {Patent pending, ETH Spark Award Nomination, CSAW Europe finalist},\n\tauthor = {Marazzi, Michele and Jattke, Patrick and Solt, Flavien and Razavi, Kaveh},\n\tmonth = may,\n\tyear = {2022},\n\tkeywords = {dir\\_dram, proj\\_mfs, proj\\_nccr, type\\_conf, type\\_tier1}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Blacksmith: Scalable Rowhammering in the Frequency Domain.\n \n \n \n \n\n\n \n Patrick Jattke; Victor Veen; Pietro Frigo; Stijn Gunter; and Kaveh Razavi.\n\n\n \n\n\n\n In S&P, May 2022. \n \n\n\n\n
\n\n\n\n \n \n \"Blacksmith:Paper\n  \n \n \n \"Blacksmith:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 290 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{jattke_blacksmith_2022,\n\ttitle = {{Blacksmith}: {Scalable} {Rowhammering} in the {Frequency} {Domain}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/blacksmith_sp22.pdf URL=https://comsec.ethz.ch/research/dram/blacksmith},\n\tbooktitle = {{S\\&P}},\n\tauthor = {Jattke, Patrick and van der Veen, Victor and Frigo, Pietro and Gunter, Stijn and Razavi, Kaveh},\n\tmonth = may,\n\tyear = {2022},\n\tkeywords = {dir\\_dram, proj\\_mfs, proj\\_nccr, type\\_conf, type\\_tier1}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel.\n \n \n \n \n\n\n \n Brian Johannesmeyer; Jakob Koschel; Kaveh Razavi; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In NDSS, April 2022. \n \n\n\n\n
\n\n\n\n \n \n \"Kasper:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 518 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{johannesmeyer_kasper_2022,\n\ttitle = {Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/kasper_ndss22.pdf},\n\tbooktitle = {{NDSS}},\n\tauthor = {Johannesmeyer, Brian and Koschel, Jakob and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = apr,\n\tyear = {2022},\n\tkeywords = {dir\\_microarch, type\\_conf, type\\_tier1}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n DupeFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels.\n \n \n \n \n\n\n \n Andrei Bacs; Saidgani Musaev; Kaveh Razavi; Cristiano Giuffrida; and Herbert Bos.\n\n\n \n\n\n\n In FAST, February 2022. \n \n\n\n\n
\n\n\n\n \n \n \"DupeFS:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 127 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{dupefs_bacs_2022,\n\ttitle = {DupeFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/dupefs_fast22.pdf},\n\tbooktitle = {{FAST}},\n\tauthor = {Bacs, Andrei and Musaev, Saidgani and Razavi, Kaveh and Giuffrida, Cristiano and Bos, Herbert},\n\tmonth = feb,\n\tyear = {2022},\n\tkeywords = {dir\\_os, dir\\_peripheral, type\\_conf, type\\_tier1}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Uncovering In-DRAM RowHammer Protection Mechanisms:A New Methodology, Custom RowHammer Patterns, and Implications.\n \n \n \n \n\n\n \n Hasan Hassan; Yahya Can Tugrul; Jeremie S. Kim; Victor Veen; Kaveh Razavi; and Onur Mutlu.\n\n\n \n\n\n\n In MICRO, October 2021. \n \n\n\n\n
\n\n\n\n \n \n \"UncoveringPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{hassan_utrr_2021,\n\ttitle = {Uncovering In-DRAM RowHammer Protection Mechanisms:A New Methodology, Custom RowHammer Patterns, and Implications},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/utrr_micro21.pdf},\n\tbooktitle = {{MICRO}},\n\tauthor = {Hassan, Hasan and Tugrul, Yahya Can and Kim, Jeremie S. and van der Veen, Victor and Razavi, Kaveh and Mutlu, Onur},\n\tmonth = oct,\n\tyear = {2021},\n\tkeywords = {dir\\_dram, proj\\_mfs, type\\_conf, type\\_tier1}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Formal Property Verification of the Digital Section of an Ultra-Low Current Digitizer ASIC.\n \n \n \n \n\n\n \n Katharina Ceesay-Seitz; Sarath Kundumattathil Mohanan; Hamza Boukabache; and Daniel Perrin.\n\n\n \n\n\n\n In DVCON Europe, October 2021. \n \n\n\n\n
\n\n\n\n \n \n \"FormalPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 14 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{kcs-dvcon-21,\n\ttitle = {Formal Property Verification of the Digital Section of an Ultra-Low Current Digitizer ASIC},\n\turl = {https://dvcon-proceedings.org/document/formal-property-verification-of-the-digital-section-of-an-ultra-low-current-digitizer-asic},\n\tbooktitle = {DVCON Europe},\n\tauthor = {Ceesay-Seitz, Katharina and Mohanan, Sarath Kundumattathil and Boukabache, Hamza and Perrin, Daniel},\n\tmonth = oct,\n\tyear = {2021},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n RomLibEmu: Network Interface Stress Tests for the CERN Radiation Monitoring Electronics (CROME).\n \n \n \n \n\n\n \n Katharina Ceesay-Seitz; Hamza Boukabache; Marvin Leveneur; and Daniel Perrin.\n\n\n \n\n\n\n In ICALEPCS, October 2021. \n \n\n\n\n
\n\n\n\n \n \n \"RomLibEmu:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{kcs-icalepcs-21,\n\ttitle = {RomLibEmu: Network Interface Stress Tests for the CERN Radiation Monitoring Electronics (CROME)},\n\turl = {https://doi.org/10.18429/JACoW-ICALEPCS2021-MOBR01},\n\tbooktitle = {ICALEPCS},\n\tauthor = {Ceesay-Seitz, Katharina and Boukabache, Hamza and Leveneur, Marvin and Perrin, Daniel},\n\tmonth = oct,\n\tyear = {2021},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ROMULUSLib: An Autonomous, TCP/IP-Based, Multi-Architecture C Networking Library for DAQ and Control Applications.\n \n \n \n \n\n\n \n Amitabh Yadav; Hamza Boukabache; Nicola Gerber; Katharina Ceesay-Seitz; and Daniel Perrin.\n\n\n \n\n\n\n In ICALEPCS, October 2021. \n \n\n\n\n
\n\n\n\n \n \n \"ROMULUSLib:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{ay-icalepcs-21,\n\ttitle = {ROMULUSLib: An Autonomous, TCP/IP-Based, Multi-Architecture C Networking Library for DAQ and Control Applications},\n\turl = {https://doi.org/10.18429/JACoW-ICALEPCS2021-MOBR01},\n\tbooktitle = {ICALEPCS},\n\tauthor = {Yadav, Amitabh and Boukabache, Hamza and Gerber, Nicola and Ceesay-Seitz, Katharina and Perrin, Daniel},\n\tmonth = oct,\n\tyear = {2021},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript.\n \n \n \n \n\n\n \n Finn Ridder; Pietro Frigo; Emanuele Vannacci; Herbert Bos; Cristiano Giuffrida; and Kaveh Razavi.\n\n\n \n\n\n\n In USENIX Security, August 2021. \n Pwnie Nomination for the Most Underhyped Research\n\n\n\n
\n\n\n\n \n \n \"SMASH:Paper\n  \n \n \n \"SMASH:URL\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 796 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{deridder_smash_2021,\n\ttitle = {{SMASH}: {Synchronized} {Many-sided} {Rowhammer} {Attacks} from {JavaScript}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/smash_sec21.pdf URL=https://comsec.ethz.ch/research/dram/smash},\n\tbooktitle = {{USENIX Security}},\n\tauthor = {de Ridder, Finn and Frigo, Pietro and Vannacci, Emanuele and Bos, Herbert and Giuffrida, Cristiano and Razavi, Kaveh},\n\tnote = {Pwnie Nomination for the Most Underhyped Research},\n\tmonth = aug,\n\tyear = {2021},\n\tkeywords = {dir\\_dram, dir\\_microarch, proj\\_mfs, type\\_mscthesis, type\\_conf, type\\_tier1}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n CODIC: A Low-Cost Substrate for Enabling Custom In-DRAM Functionalities and Optimizations.\n \n \n \n \n\n\n \n Lois Orosa; Yaohua Wang; Mohammad Sadrosadati; Jeremie Kim; Minesh Patel; Ivan Puddu; Haocong Luo; Kaveh Razavi; Juan Gomez Luna; Hasan Hassan; Nika Mansouri Ghiasi; Saugata Ghose; and Onur Mutlu.\n\n\n \n\n\n\n In ISCA, June 2021. \n \n\n\n\n
\n\n\n\n \n \n \"CODIC:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{orosa_lois_2021,\n\ttitle = {{CODIC}: A {Low-Cost} {Substrate} for {Enabling} {Custom} {In-DRAM} {Functionalities} and {Optimizations}},\n\turl = {https://comsec.ethz.ch/wp-content/files/codic_isca21.pdf},\n\tbooktitle = {{ISCA}},\n\tauthor = {Orosa, Lois and Wang, Yaohua and Sadrosadati, Mohammad and Kim, Jeremie and Patel, Minesh and Puddu, Ivan and Luo, Haocong Luo and Razavi, Kaveh and Luna, Juan Gomez and Hassan, Hasan and Ghiasi, Nika Mansouri and Ghose, Saugata and Mutlu, Onur},\n\tmonth = Jun,\n\tyear = {2021},\n\tkeywords = {dir\\_dram, type\\_conf, type\\_tier1}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n CrossTalk: Speculative Data Leaks Across Cores Are Real.\n \n \n \n \n\n\n \n Hany Ragab; Alyssa Milburn; Kaveh Razavi; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In S&P, May 2021. \n Intel Bounty Reward\n\n\n\n
\n\n\n\n \n \n \"CrossTalk:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 541 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{ragab_crosstalk_2021,\n\ttitle = {{CrossTalk}: Speculative Data Leaks Across Cores Are Real},\n\turl = {https://comsec.ethz.ch/wp-content/files/crosstalk_sp21.pdf},\n\tbooktitle = {{S\\&P}},\n\tauthor = {Ragab, Hany and Milburn, Alyssa and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = May,\n\tnote = {Intel Bounty Reward},\n\tyear = {2021},\n\tkeywords = {dir\\_microarch, type\\_conf, type\\_press, type\\_tier1}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SoK: Fully Homomorphic Encryption Compilers.\n \n \n \n \n\n\n \n Alexander Viand; Patrick Jattke; and Anwar Hithnawi.\n\n\n \n\n\n\n In S&P, May 2021. \n \n\n\n\n
\n\n\n\n \n \n \"SoK:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 13 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{viand_sok_homomorphic_2021,\n\ttitle = {{SoK}: Fully Homomorphic Encryption Compilers},\n\turl = {https://ieeexplore.ieee.org/abstract/document/9519484},\n\tbooktitle = {{S\\&P}},\n\tauthor = {Viand, Alexander and Jattke, Patrick and Hithnawi, Anwar},\n\tmonth = May,\n\tyear = {2021},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (12)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Speculative Probing: Hacking Blind in the Spectre Era.\n \n \n \n \n\n\n \n Enes Goktas; Kaveh Razavi; Georgios Portokalidis; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In CCS, November 2020. \n Pwnie Award for the Most Innovative Research\n\n\n\n
\n\n\n\n \n \n \"SpeculativePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 677 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{goktas_speculative_2020,\n\ttitle = {Speculative {Probing}: {Hacking} {Blind} in the {Spectre} {Era}},\n\turl = {https://comsec.ethz.ch/wp-content/files/blindside_ccs20.pdf},\n\tbooktitle = {{CCS}},\n\tauthor = {Goktas, Enes and Razavi, Kaveh and Portokalidis, Georgios and Bos, Herbert and Giuffrida, Cristiano},\n\tnote = {Pwnie Award for the Most Innovative Research},\n\tmonth = nov,\n\tyear = {2020},\n\tkeywords = {dir\\_microarch, dir\\_os, proj\\_mfs, type\\_conf, type\\_tier1}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Energy Efficient Heartbeat-Based MAC Protocol for WBAN Employing Body Coupled Communication.\n \n \n \n\n\n \n Flavien Solt; Robin Benarrouch; Guillaume Tochou; Olivér Facklam; Antoine Frappé; Andreia Cathelin; Andreas Kaiser; and Jan Rabaey.\n\n\n \n\n\n\n IEEE Access. October 2020.\n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@article{solt_heartbeatenergy_2020,\n\ttitle = {{Energy} {Efficient} {Heartbeat-Based} {MAC} {Protocol} for {WBAN} {Employing} {Body} {Coupled} {Communication}},\n\tjournal = {{IEEE Access}},\n\tauthor = {Solt, Flavien and Benarrouch, Robin and Tochou, Guillaume and Facklam, Oliv\\'er and Frapp\\'e, Antoine and Cathelin, Andreia and Kaiser, Andreas and Rabaey, Jan},\n\tmonth = oct,\n\tyear = {2020},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Heartbeat-Based Synchronization Scheme for the Human Intranet: Modeling and Analysis.\n \n \n \n\n\n \n Robin Benarrouch; Ali Moin; Flavien Solt; Antoine Frappé; Andreia Cathelin; Andreas Kaiser; and Jan Rabaey.\n\n\n \n\n\n\n In ISCAS, October 2020. \n \n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{benarrouch_heartbeatsync_2020,\n\ttitle = {{Heartbeat-Based} {Synchronization} {Scheme} for the {Human} {Intranet}: {Modeling} and {Analysis}},\n\tbooktitle = {{ISCAS}},\n\tauthor = {Benarrouch, Robin and Moin, Ali and Solt, Flavien and Frapp\\'e, Antoine and Cathelin, Andreia and Kaiser, Andreas and Rabaey, Jan},\n\tmonth = oct,\n\tyear = {2020},\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Safety-Critical FPGA Designs: Applied to the CERN RadiatiOn Monitoring Electronics (CROME).\n \n \n \n \n\n\n \n Katharina Ceesay-Seitz; Hamza Boukabache; and Daniel Perrin.\n\n\n \n\n\n\n In SafeComp, September 2020. \n \n\n\n\n
\n\n\n\n \n \n \"Safety-CriticalPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 8 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{kcs-safecomp-20,\n\ttitle = {Safety-Critical FPGA Designs: Applied to the CERN RadiatiOn Monitoring Electronics (CROME)},\n\turl = {https://link.springer.com/chapter/10.1007/978-3-030-54549-9_5},\n\tbooktitle = {SafeComp},\n\tauthor = {Ceesay-Seitz, Katharina and Boukabache, Hamza and Perrin, Daniel},\n\tmonth = sep,\n\tyear = {2020},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions.\n \n \n \n \n\n\n \n Radhesh Krishnan Konoth; Björn Fischer; Wan Fokkink; Elias Athanasopoulos; Kaveh Razavi; and Herbert Bos.\n\n\n \n\n\n\n In EuroS&P, September 2020. \n Best Paper Award, US Patent App. 17/775,322\n\n\n\n
\n\n\n\n \n \n \"SecurePay:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 92 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{konoth_securepay_2020,\n\ttitle = {{SecurePay}: {Strengthening} {Two}-{Factor} {Authentication} for {Arbitrary} {Transactions}},\n\turl = {https://comsec.ethz.ch/wp-content/files/securepay_eurosp20.pdf},\n\tbooktitle = {{EuroS\\&P}},\n\tauthor = {Konoth, Radhesh Krishnan and Fischer, Björn and Fokkink, Wan and Athanasopoulos, Elias and Razavi, Kaveh and Bos, Herbert},\n\tnote = {Best Paper Award, US Patent App. 17/775,322},\n\tmonth = sep,\n\tyear = {2020},\n\tkeywords = {dir\\_os, type\\_award, proj\\_mfs, type\\_conf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs.\n \n \n \n \n\n\n \n Jakob Koschel; Cristiano Giuffrida; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In EuroS&P, September 2020. \n \n\n\n\n
\n\n\n\n \n \n \"TagBleed:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 39 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{koschel_tagbleed_2020,\n\ttitle = {{TagBleed}: {Breaking} {KASLR} on the Isolated Kernel Address Space using Tagged {TLBs}},\n\turl = {https://comsec.ethz.ch/wp-content/files/tagbleed_eurosp20.pdf},\n\tbooktitle = {{EuroS\\&P}},\n\tauthor = {Koschel, Jakob and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = sep,\n\tyear = {2020},\n\tkeywords = {dir\\_microarch, dir\\_os, proj\\_mfs, type\\_conf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ParmeSan: Sanitizer-guided Greybox Fuzzing.\n \n \n \n \n\n\n \n Sebastian Österlund; Kaveh Razavi; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In USENIX Security, August 2020. \n \n\n\n\n
\n\n\n\n \n \n \"ParmeSan:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 78 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{osterlund_parmesan_2020,\n\ttitle = {{ParmeSan}: {Sanitizer}-guided {Greybox} {Fuzzing}},\n\turl = {https://comsec.ethz.ch/wp-content/files/parmesan_sec20.pdf},\n\tbooktitle = {{USENIX} {Security}},\n\tauthor = {Österlund, Sebastian and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = aug,\n\tyear = {2020},\n\tkeywords = {type\\_conf, type\\_tier1}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Leave my Apps Alone! A Study on how Android Developers Access Installed Apps on User’s Device.\n \n \n \n \n\n\n \n Gian Luca Scoccia; Ibrahim Kanj; Ivano Malavolta; and Kaveh Razavi.\n\n\n \n\n\n\n In MOBILESOFT, July 2020. \n Best Paper Award\n\n\n\n
\n\n\n\n \n \n \"LeavePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{scoccia_leave_2020,\n\ttitle = {Leave my {Apps} {Alone}! {A} {Study} on how {Android} {Developers} {Access} {Installed} {Apps} on {User}’s {Device}},\n\turl = {https://comsec.ethz.ch/wp-content/files/iam_mobilesoft20.pdf},\n\tbooktitle = {{MOBILESOFT}},\n\tauthor = {Scoccia, Gian Luca and Kanj, Ibrahim and Malavolta, Ivano and Razavi, Kaveh},\n\tmonth = jul,\n\tyear = {2020},\n\tnote = {Best Paper Award},\n\tkeywords = {dir\\_os, type\\_award, type\\_conf, type\\_press}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Stratus: Clouds with Microarchitectural Resource Management.\n \n \n \n \n\n\n \n Kaveh Razavi; and Animesh Trivedi.\n\n\n \n\n\n\n In HotCloud, July 2020. \n \n\n\n\n
\n\n\n\n \n \n \"Stratus:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 8 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{razavi_stratus_2020,\n\ttitle = {{Stratus}: Clouds with Microarchitectural Resource Management},\n\turl = {https://comsec.ethz.ch/wp-content/files/stratus_hotcloud20.pdf},\n\tbooktitle = {{HotCloud}},\n\tauthor = {Razavi, Kaveh and Trivedi, Animesh},\n\tmonth = jul,\n\tyear = {2020},\n\tkeywords = {dir\\_microarch, dir\\_dram, dir\\_peripheral, dir\\_os, proj_mfs, type\\_conf}\n}\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n TRRespass: Exploiting the Many Sides of Target Row Refresh.\n \n \n \n \n\n\n \n Pietro Frigo; Emanuele Vannacci; Hasan Hassan; Victor Veen; Onur Mutlu; Cristiano Giuffrida; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In S&P, May 2020. \n Best Paper Award, Pwnie Award for the Most Innovative Research, Honorable Mention in IEEE MICRO Top Picks\n\n\n\n
\n\n\n\n \n \n \"TRRespass:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 856 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{frigo_trrespass_2020,\n\ttitle = {{TRRespass}: {Exploiting} the {Many} {Sides} of {Target} {Row} {Refresh}},\n\turl = {https://comsec.ethz.ch/wp-content/files/trrespass_sp20.pdf},\n\tbooktitle = {{S\\&P}},\n\tauthor = {Frigo, Pietro and Vannacci, Emanuele and Hassan, Hasan and van der Veen, Victor and Mutlu, Onur and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tnote = {Best Paper Award, Pwnie Award for the Most Innovative Research, Honorable Mention in IEEE MICRO Top Picks},\n\tmonth = may,\n\tyear = {2020},\n\tkeywords = {dir\\_dram, proj\\_mfs, type\\_conf, type\\_press, type\\_tier1, type\\_award}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n NetCAT: Practical Cache Attacks from the Network.\n \n \n \n \n\n\n \n Michael Kurth; Ben Gras; Dennis Andriesse; Cristiano Giuffrida; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In S&P, May 2020. \n Intel Bounty Reward, Pwnie Award Nomination for the Most Innovative Research\n\n\n\n
\n\n\n\n \n \n \"NetCAT:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 367 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{kurth_netcat_2020,\n\ttitle = {{NetCAT}: {Practical} {Cache} {Attacks} from the {Network}},\n\turl = {https://comsec.ethz.ch/wp-content/files/netcat_sp20.pdf},\n\tbooktitle = {{S\\&P}},\n\tauthor = {Kurth, Michael and Gras, Ben and Andriesse, Dennis and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = may,\n\tyear = {2020},\n\tnote = {Intel Bounty Reward, Pwnie Award Nomination for the Most Innovative Research},\n\tkeywords = {dir\\_microarch, dir\\_peripheral, proj\\_mfs, type\\_conf, type\\_mscthesis, type\\_press, type\\_tier1}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures.\n \n \n \n \n\n\n \n Ben Gras; Cristiano Giuffrida; Michael Kurth; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In NDSS, February 2020. \n \n\n\n\n
\n\n\n\n \n \n \"ABSynthe:Paper\n  \n \n \n \"ABSynthe:Slides\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 65 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{gras_absynthe_2020,\n\ttitle = {{ABSynthe}: {Automatic} {Blackbox} {Side}-channel {Synthesis} on {Commodity} {Microarchitectures}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/absynthe_ndss20.pdf Slides=https://comsec.ethz.ch/wp-content/files/absynthe_ndss20_pres.pdf},\n\tbooktitle = {{NDSS}},\n\tauthor = {Gras, Ben and Giuffrida, Cristiano and Kurth, Michael and Bos, Herbert and Razavi, Kaveh},\n\tmonth = feb,\n\tyear = {2020},\n\tkeywords = {dir\\_microarch, proj\\_mfs, type\\_conf, type\\_tier1}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Semi-formal Reformulation of Requirements for Formal Property Verification.\n \n \n \n \n\n\n \n Katharina Ceesay-Seitz; Hamza Boukabache; and Daniel Perrin.\n\n\n \n\n\n\n In DVCON Europe, October 2019. \n \n\n\n\n
\n\n\n\n \n \n \"Semi-formalPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 11 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n\n\n\n
\n
@inproceedings{kcs-dvcon-19,\n\ttitle = {Semi-formal Reformulation of Requirements for Formal Property Verification},\n\turl = {https://cds.cern.ch/record/2712787},\n\tbooktitle = {DVCON Europe},\n\tauthor = {Ceesay-Seitz, Katharina and Boukabache, Hamza and Perrin, Daniel},\n\tmonth = oct,\n\tyear = {2019},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks.\n \n \n \n \n\n\n \n Lucian Cojocar; Kaveh Razavi; Cristiano Giuffrida; and Herbert Bos.\n\n\n \n\n\n\n In S&P, May 2019. \n Best Practical Paper Award, Pwnie Award Nomination for the Most Innovative Research\n\n\n\n
\n\n\n\n \n \n \"ExploitingPaper\n  \n \n \n \"ExploitingSlides\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 362 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{cojocar_exploiting_2019,\n\ttitle = {Exploiting {Correcting} {Codes}: {On} the {Effectiveness} of {ECC} {Memory} {Against} {Rowhammer} {Attacks}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/eccploit_sp19.pdf Slides=https://www.ieee-security.org/TC/SP2019/SP19-Slides-pdfs/Lucian_Cojocar_Exploiting_Correcting_Codes_slides-ecc-new.pdf},\n\tbooktitle = {{S\\&P}},\n\tauthor = {Cojocar, Lucian and Razavi, Kaveh and Giuffrida, Cristiano and Bos, Herbert},\n\tmonth = may,\n\tyear = {2019},\n\tnote = {Best Practical Paper Award, Pwnie Award Nomination for the Most Innovative Research},\n\tkeywords = {dir\\_dram, proj\\_mfs, type\\_award, type\\_conf, type\\_press, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n RIDL: Rogue In-flight Data Load.\n \n \n \n \n\n\n \n Stephan Schaik; Alyssa Milburn; Sebastian Österlund; Pietro Frigo; Giorgi Maisuradze; Kaveh Razavi; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In S&P, May 2019. \n DCSRP Award, Intel Bounty Reward, Pwnie Award Nomination for the Most Innovative Research, CSAW Best Paper Award Runner-up\n\n\n\n
\n\n\n\n \n \n \"RIDL:Paper\n  \n \n \n \"RIDL:Slides\n  \n \n \n \"RIDL:Web\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 108 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{van_schaik_ridl_2019,\n\ttitle = {{RIDL}: {Rogue} {In}-flight {Data} {Load}},\n\turl = {Paper=https://mdsattacks.com/files/ridl.pdf Slides=https://mdsattacks.com/slides/slides.html Web=https://mdsattacks.com},\n\tbooktitle = {{S\\&P}},\n\tauthor = {van Schaik, Stephan and Milburn, Alyssa and Österlund, Sebastian and Frigo, Pietro and Maisuradze, Giorgi and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = may,\n\tyear = {2019},\n\tnote = {DCSRP Award, Intel Bounty Reward, Pwnie Award Nomination for the Most Innovative Research, CSAW Best Paper Award Runner-up},\n\tkeywords = {dir\\_microarch, proj\\_mfs, type\\_award, type\\_conf, type\\_press, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (7)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks.\n \n \n \n \n\n\n \n Radhesh Krishnan Konoth; Marco Oliverio; Andrei Tatar; Dennis Andriesse; Herbert Bos; Cristiano Giuffrida; and Kaveh Razavi.\n\n\n \n\n\n\n In OSDI, October 2018. \n US Patent App. 16/059,357\n\n\n\n
\n\n\n\n \n \n \"ZebRAM:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 40 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{konoth_zebram:_2018,\n\ttitle = {{ZebRAM}: {Comprehensive} and {Compatible} {Software} {Protection} {Against} {Rowhammer} {Attacks}},\n\turl = {https://comsec.ethz.ch/wp-content/files/zebram_osdi18.pdf},\n\tbooktitle = {{OSDI}},\n\tauthor = {Konoth, Radhesh Krishnan and Oliverio, Marco and Tatar, Andrei and Andriesse, Dennis and Bos, Herbert and Giuffrida, Cristiano and Razavi, Kaveh},\n\tmonth = oct,\n    note = {US Patent App. 16/059,357},\n\tyear = {2018},\n\tkeywords = {dir\\_dram, dir\\_os, proj\\_mfs, type\\_conf, type\\_tier1, type\\_top}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Defeating Software Mitigations against Rowhammer: A Surgical Precision Hammer.\n \n \n \n \n\n\n \n Andrei Tatar; Cristiano Giuffrida; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In RAID, September 2018. \n Best Paper Award\n\n\n\n
\n\n\n\n \n \n \"DefeatingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 37 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{tatar_defeating_2018,\n\ttitle = {Defeating {Software} {Mitigations} against {Rowhammer}: {A} {Surgical} {Precision} {Hammer}},\n\turl = {https://comsec.ethz.ch/wp-content/files/hammertime_raid18.pdf},\n\tbooktitle = {{RAID}},\n\tauthor = {Tatar, Andrei and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = sep,\n\tyear = {2018},\n\tnote = {Best Paper Award},\n\tkeywords = {dir\\_dram, proj\\_mfs, type\\_award, type\\_conf, type\\_mscthesis}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks.\n \n \n \n \n\n\n \n Ben Gras; Kaveh Razavi; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In USENIX Security, August 2018. \n Pwnie Award Nomination for the Most Innovative Research\n\n\n\n
\n\n\n\n \n \n \"TranslationPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 460 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{gras_translation_2018,\n\ttitle = {Translation {Leak}-aside {Buffer}: {Defeating} {Cache} {Side}-channel {Protections} with {TLB} {Attacks}},\n\turl = {https://comsec.ethz.ch/wp-content/files/tlbleed_sec18.pdf},\n\tbooktitle = {{USENIX} {Security}},\n\tauthor = {Gras, Ben and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = aug,\n\tyear = {2018},\n\tnote = {Pwnie Award Nomination for the Most Innovative Research},\n\tkeywords = {dir\\_microarch, type\\_award, type\\_conf, type\\_press, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think.\n \n \n \n \n\n\n \n Stephan Schaik; Cristiano Giuffrida; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In USENIX Security, August 2018. \n \n\n\n\n
\n\n\n\n \n \n \"MaliciousPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 91 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{van_schaik_malicious_2018,\n\ttitle = {Malicious {Management} {Unit}: {Why} {Stopping} {Cache} {Attacks} in {Software} is {Harder} {Than} {You} {Think}},\n\turl = {https://comsec.ethz.ch/wp-content/files/xlate_sec18.pdf},\n\tbooktitle = {{USENIX} {Security}},\n\tauthor = {van Schaik, Stephan and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = aug,\n\tyear = {2018},\n\tkeywords = {dir\\_microarch, type\\_conf, type\\_mscthesis, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n GuardION: Practical Mitigation of DMA-based Rowhammer Attacks on ARM.\n \n \n \n \n\n\n \n Victor Veen; Martina Lindorfer; Yanick Fratantonio; Harikrishnan Padmanabha Pillai; Giovanni Vigna; Christopher Kruegel; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In DIMVA, June 2018. \n Pwnie Award Nomination for the Best Privilege Escalation Bug\n\n\n\n
\n\n\n\n \n \n \"GuardION:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 82 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{van_der_veen_guardion:_2018,\n\ttitle = {{GuardION}: {Practical} {Mitigation} of {DMA}-based {Rowhammer} {Attacks} on {ARM}},\n\turl = {https://comsec.ethz.ch/wp-content/files/dimva2018.pdf},\n\tbooktitle = {{DIMVA}},\n\tauthor = {van der Veen, Victor and Lindorfer, Martina and Fratantonio, Yanick and Padmanabha Pillai, Harikrishnan and Vigna, Giovanni and Kruegel, Christopher and Bos, Herbert and Razavi, Kaveh},\n\tmonth = jun,\n\tyear = {2018},\n\tnote = {Pwnie Award Nomination for the Best Privilege Escalation Bug},\n\tkeywords = {dir\\_dram, dir\\_os, type\\_award, type\\_conf, type\\_press}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU.\n \n \n \n \n\n\n \n Pietro Frigo; Cristiano Giuffrida; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In S&P, May 2018. \n Pwnie Award Nomination for the Most Innovative Research\n\n\n\n
\n\n\n\n \n \n \"GrandPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 145 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{frigo_grand_2018,\n\ttitle = {Grand {Pwning} {Unit}: {Accelerating} {Microarchitectural} {Attacks} with the {GPU}},\n\turl = {https://comsec.ethz.ch/wp-content/files/glitch_sp18.pdf},\n\tbooktitle = {{S\\&P}},\n\tauthor = {Frigo, Pietro and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = may,\n\tyear = {2018},\n\tnote = {Pwnie Award Nomination for the Most Innovative Research},\n\tkeywords = {dir\\_dram, type\\_award, type\\_conf, type\\_mscthesis, type\\_press, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Throwhammer: Rowhammer Attacks over the Network and Defenses.\n \n \n \n \n\n\n \n Andrei Tatar; Radhesh Krishnan Konoth; Elias Athanasopoulos; Cristiano Giuffrida; Herbert Bos; and Kaveh Razavi.\n\n\n \n\n\n\n In USENIX ATC, July 2018. \n Pwnie Award Nomination for the Most Innovative Research\n\n\n\n
\n\n\n\n \n \n \"Throwhammer:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 295 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{tatar_throwhammer:_2018,\n\ttitle = {Throwhammer: {Rowhammer} {Attacks} over the {Network} and {Defenses}},\n\turl = {https://comsec.ethz.ch/wp-content/files/throwhammer_atc18.pdf},\n\tbooktitle = {{USENIX} {ATC}},\n\tauthor = {Tatar, Andrei and Konoth, Radhesh Krishnan and Athanasopoulos, Elias and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = jul,\n\tyear = {2018},\n\tnote = {Pwnie Award Nomination for the Most Innovative Research},\n\tkeywords = {dir\\_dram, dir\\_peripheral, type\\_award, type\\_conf, type\\_press}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Secure Page Fusion with VUsion.\n \n \n \n \n\n\n \n Marco Oliverio; Kaveh Razavi; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In SOSP, October 2017. \n \n\n\n\n
\n\n\n\n \n \n \"SecurePaper\n  \n \n \n \"SecureSlides\n  \n \n \n \"SecurePoster\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 67 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{oliverio_secure_2017,\n\ttitle = {Secure {Page} {Fusion} with {VUsion}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/vusion_sosp17.pdf Slides=https://docs.google.com/presentation/d/1Erf1r9gCtkj-JuCBT7BW93W7YjGiplkO8GHAAT56W9s/edit#slide=id.p3 Poster=https://comsec.ethz.ch/wp-content/files/vusion_sosp17_poster.pdf},\n\tbooktitle = {{SOSP}},\n\tauthor = {Oliverio, Marco and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = oct,\n\tyear = {2017},\n\tkeywords = {dir\\_dram, dir\\_microarch, dir\\_os, type\\_conf, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Understanding Rack-Scale Disaggregated Storage.\n \n \n \n \n\n\n \n Sergey Legtchenko; Hugh Williams; Kaveh Razavi; Austin Donnelly; Richard Black; Andrew Douglas; Nathanael Cheriere; Daniel Fryer; Kai Mast; Angela Demke Brown; Ana Klimovic; Andy Slowey; and Antony Rowstron.\n\n\n \n\n\n\n In HotStorage, July 2017. \n \n\n\n\n
\n\n\n\n \n \n \"UnderstandingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{legtchenko_understanding_2017,\n\ttitle = {Understanding {Rack}-{Scale} {Disaggregated} {Storage}},\n\turl = {https://comsec.ethz.ch/wp-content/files/hotstorage17-paper-legtchenko.pdf},\n\tbooktitle = {{HotStorage}},\n\tauthor = {Legtchenko, Sergey and Williams, Hugh and Razavi, Kaveh and Donnelly, Austin and Black, Richard and Douglas, Andrew and Cheriere, Nathanael and Fryer, Daniel and Mast, Kai and Brown, Angela Demke and Klimovic, Ana and Slowey, Andy and Rowstron, Antony},\n\tmonth = jul,\n\tyear = {2017},\n\tkeywords = {type\\_conf}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Off-the-shelf Embedded Devices as Platforms for Security Research.\n \n \n \n \n\n\n \n Lucian Cojocar; Kaveh Razavi; and Herbert Bos.\n\n\n \n\n\n\n In EuroSec, April 2017. \n \n\n\n\n
\n\n\n\n \n \n \"Off-the-shelfPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 19 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{cojocar_ssd_2017,\n\ttitle = {{Off-the-shelf Embedded Devices as Platforms for Security Research}},\n\turl = {https://comsec.ethz.ch/wp-content/files/ssd_eurosec17.pdf},\n\tbooktitle = {{EuroSec}},\n\tauthor = {Cojocar, Lucian and Razavi, Kaveh and Bos, Herbert},\n\tmonth = apr,\n\tyear = {2017},\n\tkeywords = {dir\\_peripheral, type\\_workshop}\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches.\n \n \n \n \n\n\n \n Stephan Schaik; Kaveh Razavi; Ben Gras; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In EuroSec, April 2017. \n \n\n\n\n
\n\n\n\n \n \n \"RevAnC:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 139 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{van_schaik_revanc:_2017,\n\ttitle = {{RevAnC}: {A} {Framework} for {Reverse} {Engineering} {Hardware} {Page} {Table} {Caches}},\n\turl = {https://comsec.ethz.ch/wp-content/files/revanc_eurosec17.pdf},\n\tbooktitle = {{EuroSec}},\n\tauthor = {van Schaik, Stephan and Razavi, Kaveh and Gras, Ben and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = apr,\n\tyear = {2017},\n\tkeywords = {dir\\_microarch, type\\_mscthesis, type\\_workshop}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Reverse Engineering Hardware Page Table Caches Using Side-Channel Attacks on the MMU.\n \n \n \n \n\n\n \n Stephan Schaik; Kaveh Razavi; Ben Gras; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n Technical Report IR-CS-51, VU Amsterdam, February 2017.\n \n\n\n\n
\n\n\n\n \n \n \"ReversePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@techreport{van_schaik_reverse_2017,\n\ttitle = {Reverse {Engineering} {Hardware} {Page} {Table} {Caches} {Using} {Side}-{Channel} {Attacks} on the {MMU}},\n\turl = {https://comsec.ethz.ch/wp-content/files/revanc_ir-cs-77.pdf},\n\tnumber = {IR-CS-51},\n\tinstitution = {VU Amsterdam},\n\tauthor = {van Schaik, Stephan and Razavi, Kaveh and Gras, Ben and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = feb,\n\tyear = {2017},\n\tkeywords = {dir\\_microarch}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ASLR on the Line: Practical Cache Attacks on the MMU.\n \n \n \n \n\n\n \n Ben Gras; Kaveh Razavi; Erik Bosman; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In NDSS, February 2017. \n Pwnie Award for the Most Innovative Research, DCSRP Award\n\n\n\n
\n\n\n\n \n \n \"ASLRPaper\n  \n \n \n \"ASLRSlides\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 260 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{gras_aslr_2017,\n\ttitle = {{ASLR} on the {Line}: {Practical} {Cache} {Attacks} on the {MMU}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/anc_ndss17.pdf Slides=https://comsec.ethz.ch/wp-content/files/anc_ndss17_talk.pdf},\n\tbooktitle = {{NDSS}},\n\tauthor = {Gras, Ben and Razavi, Kaveh and Bosman, Erik and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = feb,\n\tyear = {2017},\n\tnote = {Pwnie Award for the Most Innovative Research, DCSRP Award},\n\tkeywords = {dir\\_microarch, type\\_award, type\\_conf, type\\_press, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Flip Feng Shui: Rowhammering the VM's Isolation.\n \n \n \n \n\n\n \n Kaveh Razavi; Ben Gras; Erik Bosman; Bart Preneel; Cristiano Giuffrida; and Herbert Bos.\n\n\n \n\n\n\n In Black Hat Europe, November 2016. \n \n\n\n\n
\n\n\n\n \n \n \"FlipPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 65 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{razavi_flip_2016,\n\ttitle = {Flip {Feng} {Shui}: {Rowhammering} the {VM}'s {Isolation}},\n\turl = {https://comsec.ethz.ch/wp-content/files/flip-feng-shui_bheu16.pdf},\n\tbooktitle = {Black {Hat} {Europe}},\n\tauthor = {Razavi, Kaveh and Gras, Ben and Bosman, Erik and Preneel, Bart and Giuffrida, Cristiano and Bos, Herbert},\n\tmonth = nov,\n\tyear = {2016},\n\tkeywords = {dir\\_dram, dir\\_os, type\\_conf}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.\n \n \n \n \n\n\n \n Victor Veen; Yanick Fratantonio; Martina Lindorfer; Daniel Gruss; Clementine Maurice; Giovanni Vigna; Herbert Bos; Kaveh Razavi; and Cristiano Giuffrida.\n\n\n \n\n\n\n In CCS, October 2016. \n Pwnie Award for the Best Privilege Escalation Bug, Android Security Reward, CSAW Best Paper Award, DCSRP Award\n\n\n\n
\n\n\n\n \n \n \"Drammer:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 222 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{van_der_veen_drammer:_2016,\n\ttitle = {Drammer: {Deterministic} {Rowhammer} {Attacks} on {Mobile} {Platforms}},\n\turl = {https://comsec.ethz.ch/wp-content/files/drammer.pdf},\n\tbooktitle = {{CCS}},\n\tauthor = {van der Veen, Victor and Fratantonio, Yanick and Lindorfer, Martina and Gruss, Daniel and Maurice, Clementine and Vigna, Giovanni and Bos, Herbert and Razavi, Kaveh and Giuffrida, Cristiano},\n\tmonth = oct,\n\tyear = {2016},\n\tnote = {Pwnie Award for the Best Privilege Escalation Bug, Android Security Reward, CSAW Best Paper Award, DCSRP Award},\n\tkeywords = {dir\\_dram, dir\\_os, type\\_award, type\\_conf, type\\_press, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Flip Feng Shui: Hammering a Needle in the Software Stack.\n \n \n \n \n\n\n \n Kaveh Razavi; Ben Gras; Erik Bosman; Bart Preneel; Cristiano Giuffrida; and Herbert Bos.\n\n\n \n\n\n\n In USENIX Security, August 2016. \n Pwnie Award Nomination for the Best Cryptographic Attack\n\n\n\n
\n\n\n\n \n \n \"FlipPaper\n  \n \n \n \"FlipSlides\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 120 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{razavi_flip_2016-1,\n\ttitle = {Flip {Feng} {Shui}: {Hammering} a {Needle} in the {Software} {Stack}},\n\turl = {Paper=https://comsec.ethz.ch/wp-content/files/flip-feng-shui_sec16.pdf Slides=https://comsec.ethz.ch/wp-content/files/flip-feng-shui_sec16_pres.pdf},\n\tbooktitle = {{USENIX} {Security}},\n\tauthor = {Razavi, Kaveh and Gras, Ben and Bosman, Erik and Preneel, Bart and Giuffrida, Cristiano and Bos, Herbert},\n\tmonth = aug,\n\tyear = {2016},\n\tnote = {Pwnie Award Nomination for the Best Cryptographic Attack},\n\tkeywords = {dir\\_dram, dir\\_os, type\\_award, type\\_conf, type\\_press, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Over the Edge: Silently Owning Windows 10's Secure Browser.\n \n \n \n \n\n\n \n E. Bosman; K. Razavi; H. Bos; and C. Giuffrida.\n\n\n \n\n\n\n In Black Hat USA, July 2016. \n \n\n\n\n
\n\n\n\n \n \n \"OverPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 42 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{bosman_over_2016,\n\ttitle = {Over the {Edge}: {Silently} {Owning} {Windows} 10's {Secure} {Browser}},\n\turl = {https://comsec.ethz.ch/wp-content/files/over-the-edge_bhusa16.pdf},\n\tbooktitle = {Black {Hat} {USA}},\n\tauthor = {Bosman, E. and Razavi, K. and Bos, H. and Giuffrida, C.},\n\tmonth = jul,\n\tyear = {2016},\n\tkeywords = {dir\\_dram, dir\\_os, type\\_ast, type\\_conf}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector.\n \n \n \n \n\n\n \n Erik Bosman; Kaveh Razavi; Herbert Bos; and Cristiano Giuffrida.\n\n\n \n\n\n\n In S&P, May 2016. \n Pwnie Award for the Most Innovative Research\n\n\n\n
\n\n\n\n \n \n \"DedupPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 93 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{bosman_dedup_2016,\n\ttitle = {Dedup {Est} {Machina}: {Memory} {Deduplication} as an {Advanced} {Exploitation} {Vector}},\n\turl = {https://comsec.ethz.ch/wp-content/files/dedup-est-machina_sp16.pdf},\n\tbooktitle = {{S\\&P}},\n\tauthor = {Bosman, Erik and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = may,\n\tyear = {2016},\n\tnote = {Pwnie Award for the Most Innovative Research},\n\tkeywords = {dir\\_dram, dir\\_os, type\\_award, type\\_conf, type\\_press, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Prebaked uVMs: Scalable, Instant VM Startup for IaaS Clouds.\n \n \n \n \n\n\n \n K. Razavi; G. V. D. Kolk; and T. Kielmann.\n\n\n \n\n\n\n In ICDCS, October 2015. \n \n\n\n\n
\n\n\n\n \n \n \"PrebakedPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{razavi_prebaked_2015,\n\ttitle = {Prebaked {uVMs}: {Scalable}, {Instant} {VM} {Startup} for {IaaS} {Clouds}},\n\turl = {https://comsec.ethz.ch/wp-content/files/icdcs15.pdf},\n\tbooktitle = {{ICDCS}},\n\tauthor = {Razavi, K. and Kolk, G. V. D. and Kielmann, T.},\n\tmonth = oct,\n\tyear = {2015},\n\tkeywords = {type\\_conf}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n CAIN: Silently Breaking ASLR in the Cloud.\n \n \n \n \n\n\n \n Antonio Barresi; Kaveh Razavi; Mathias Payer; and Thomas R. Gross.\n\n\n \n\n\n\n In WOOT, August 2015. \n \n\n\n\n
\n\n\n\n \n \n \"CAIN:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{barresi_cain:_2015,\n\ttitle = {{CAIN}: {Silently} {Breaking} {ASLR} in the {Cloud}},\n\turl = {https://comsec.ethz.ch/wp-content/files/woot15.pdf},\n\tbooktitle = {{WOOT}},\n\tauthor = {Barresi, Antonio and Razavi, Kaveh and Payer, Mathias and Gross, Thomas R.},\n\tmonth = aug,\n\tyear = {2015},\n\tkeywords = {dir\\_os, type\\_conf, type\\_sidechannel}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n Fast and Scalable Virtual Machine Deployment.\n \n \n \n\n\n \n Kaveh Razavi.\n\n\n \n\n\n\n Ph.D. Thesis, VU Amsterdam, August 2015.\n Nominated for the Roger Needham award\n\n\n\n
\n\n\n\n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@phdthesis{razavi_fast_2015,\n\ttype = {{PhD} {Thesis}},\n\ttitle = {Fast and {Scalable} {Virtual} {Machine} {Deployment}},\n\tschool = {VU Amsterdam},\n\tauthor = {Razavi, Kaveh},\n\tmonth = aug,\n\tyear = {2015},\n\tnote = {Nominated for the Roger Needham award},\n\tkeywords = {type\\_thesis}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n R2C2: A Network Stack for Rack-scale Computers.\n \n \n \n \n\n\n \n Paolo Costa; Hitesh Ballani; Kaveh Razavi; and Ian Kash.\n\n\n \n\n\n\n In SIGCOMM, August 2015. \n \n\n\n\n
\n\n\n\n \n \n \"R2C2:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{costa_r2c2:_2015,\n\ttitle = {{R2C2}: {A} {Network} {Stack} for {Rack}-scale {Computers}},\n\turl = {https://comsec.ethz.ch/wp-content/files/sigcomm15.pdf},\n\tbooktitle = {{SIGCOMM}},\n\tauthor = {Costa, Paolo and Ballani, Hitesh and Razavi, Kaveh and Kash, Ian},\n\tmonth = aug,\n\tyear = {2015},\n\tkeywords = {type\\_conf, type\\_tier1}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Scaling VM Deployment in an Open Source Cloud Stack.\n \n \n \n \n\n\n \n Kaveh Razavi; Stefania Costache; Andrea Gardiman; Kees Verstoep; and Thilo Kielmann.\n\n\n \n\n\n\n In ScienceCloud, June 2015. \n \n\n\n\n
\n\n\n\n \n \n \"ScalingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{razavi_scaling_2015,\n\ttitle = {Scaling {VM} {Deployment} in an {Open} {Source} {Cloud} {Stack}},\n\turl = {https://comsec.ethz.ch/wp-content/files/sciencecloud15.pdf},\n\tbooktitle = {{ScienceCloud}},\n\tauthor = {Razavi, Kaveh and Costache, Stefania and Gardiman, Andrea and Verstoep, Kees and Kielmann, Thilo},\n\tmonth = jun,\n\tyear = {2015},\n\tkeywords = {type\\_workshop}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Kangaroo: A Tenant-Centric Software-Defined Cloud Infrastructure.\n \n \n \n \n\n\n \n K. Razavi; A. Ion; G. Tato; K. Jeong; R. Figueiredo; G. Pierre; and T. Kielmann.\n\n\n \n\n\n\n In IC2E, March 2015. \n \n\n\n\n
\n\n\n\n \n \n \"Kangaroo:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{razavi_kangaroo:_2015,\n\ttitle = {Kangaroo: {A} {Tenant}-{Centric} {Software}-{Defined} {Cloud} {Infrastructure}},\n\turl = {https://comsec.ethz.ch/wp-content/files/ic2e15.pdf},\n\tbooktitle = {{IC2E}},\n\tauthor = {Razavi, K. and Ion, A. and Tato, G. and Jeong, K. and Figueiredo, R. and Pierre, G. and Kielmann, T.},\n\tmonth = mar,\n\tyear = {2015},\n\tkeywords = {type\\_conf}\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Squirrel: Scatter Hoarding VM Image Contents on IaaS Compute Nodes.\n \n \n \n \n\n\n \n Kaveh Razavi; Ana Ion; and Thilo Kielmann.\n\n\n \n\n\n\n In HPDC, June 2014. \n \n\n\n\n
\n\n\n\n \n \n \"Squirrel:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{razavi_squirrel_2014,\n\ttitle = {Squirrel: {Scatter} {Hoarding} {VM} {Image} {Contents} on {IaaS} {Compute} {Nodes}},\n\turl = {https://comsec.ethz.ch/wp-content/files/hpdc14.pdf},\n\tbooktitle = {{HPDC}},\n\tauthor = {Razavi, Kaveh and Ion, Ana and Kielmann, Thilo},\n\tmonth = jun,\n\tyear = {2014},\n\tkeywords = {type\\_conf}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (3)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Scalable Virtual Machine Deployment Using VM Image Caches.\n \n \n \n \n\n\n \n Kaveh Razavi; and Thilo Kielmann.\n\n\n \n\n\n\n In SC, October 2013. \n \n\n\n\n
\n\n\n\n \n \n \"ScalablePaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{razavi_scalable_2013,\n\ttitle = {Scalable {Virtual} {Machine} {Deployment} {Using} {VM} {Image} {Caches}},\n\turl = {https://comsec.ethz.ch/wp-content/files/sc13.pdf},\n\tbooktitle = {{SC}},\n\tauthor = {Razavi, Kaveh and Kielmann, Thilo},\n\tmonth = oct,\n\tyear = {2013},\n\tkeywords = {type\\_conf}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Reducing VM Startup Time and Storage Costs by VM Image Content Consolidation.\n \n \n \n \n\n\n \n Kaveh Razavi; Liviu Mihai Razorea; and Thilo Kielmann.\n\n\n \n\n\n\n In DIHC, September 2013. \n \n\n\n\n
\n\n\n\n \n \n \"ReducingPaper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{razavi_reducing_2013,\n\ttitle = {Reducing {VM} {Startup} {Time} and {Storage} {Costs} by {VM} {Image} {Content} {Consolidation}},\n\turl = {https://comsec.ethz.ch/wp-content/files/dihc13.pdf},\n\tbooktitle = {{DIHC}},\n\tauthor = {Razavi, Kaveh and Razorea, Liviu Mihai and Kielmann, Thilo},\n\tmonth = sep,\n\tyear = {2013},\n\tkeywords = {type\\_workshop}\n}\n\n\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ConPaaS: An Integrated Runtime Environment for Elastic Cloud Applications.\n \n \n \n \n\n\n \n G. Pierre; T. Kielmann; E. Rocca; K Razavi; B. IJff; H. Fernandez; R. Figueiredo; A. Uta; A. Vintila; A. Oprescu; T. Schuett; M. Berlin; M. Artac; and A. Cernivec.\n\n\n \n\n\n\n In HPDC (poster), August 2013. \n \n\n\n\n
\n\n\n\n \n \n \"ConPaaS:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@inproceedings{pierre_conpaas_2013,\n\ttitle = {{ConPaaS}: {An} {Integrated} {Runtime} {Environment} for {Elastic} {Cloud} {Applications}},\n\turl = {https://comsec.ethz.ch/wp-content/files/hpdc13-conpaas-poster.pdf},\n\tbooktitle = {{HPDC} (poster)},\n\tauthor = {Pierre, G. and Kielmann, T. and Rocca, E. and Razavi, K and IJff, B. and Fernandez, H. and Figueiredo, R. and Uta, A. and Vintila, A. and Oprescu, A. and Schuett, T. and Berlin, M. and Artac, M. and Cernivec, A.},\n\tmonth = aug,\n\tyear = {2013},\n\tkeywords = {type\\_poster}\n}\n\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);