var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=https%3A%2F%2Fdownload.vusec.net%2Fpapers%2Fzotero.php%3Ftag%3Dtype_cve%26full%3D%26format%3Dbibtex%26sort%3Ddate&theme=default&jsonp=1&showSearch=1&owner=none&filter=&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=https%3A%2F%2Fdownload.vusec.net%2Fpapers%2Fzotero.php%3Ftag%3Dtype_cve%26full%3D%26format%3Dbibtex%26sort%3Ddate&theme=default&jsonp=1&showSearch=1&owner=none&filter=\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=https%3A%2F%2Fdownload.vusec.net%2Fpapers%2Fzotero.php%3Ftag%3Dtype_cve%26full%3D%26format%3Dbibtex%26sort%3Ddate&theme=default&jsonp=1&showSearch=1&owner=none&filter=\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2024\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Native BHI Vulnerability.\n \n \n \n \n\n\n \n Wiebing, S.; de Faveri Tron, A.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n April 2024.\n Affected vendors: Intel, Linux, Other SW Vendors\n\n\n\n
\n\n\n\n \n \n \"NativeWeb\n  \n \n \n \"NativeCVE-2024-2201\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@misc{wiebing_native_2024,\n\ttitle = {Native {BHI} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/native-bhi CVE-2024-2201=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2201},\n\tauthor = {Wiebing, Sander and de Faveri Tron, Alvise and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = apr,\n\tyear = {2024},\n\tnote = {Affected vendors: Intel, Linux, Other SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n GhostRace Vulnerability.\n \n \n \n \n\n\n \n Ragab, H.; Mambretti, A.; Kurmus, A.; and Giuffrida, C.\n\n\n \n\n\n\n March 2024.\n Affected vendors: All Major HW Vendors, Linux, Other SW Vendors\n\n\n\n
\n\n\n\n \n \n \"GhostRaceWeb\n  \n \n \n \"GhostRaceCVE-2024-2193\n  \n \n \n \"GhostRaceCVE-2024-26602 (Linux)\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@misc{ragab_ghostrace_2024,\n\ttitle = {{GhostRace} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/ghostrace CVE-2024-2193=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2193 CVE-2024-26602_(Linux)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602},\n\tauthor = {Ragab, Hany and Mambretti, Andrea and Kurmus, Anil and Giuffrida, Cristiano},\n\tmonth = mar,\n\tyear = {2024},\n\tnote = {Affected vendors: All Major HW Vendors, Linux, Other SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2023\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Uncontained Vulnerabilities.\n \n \n \n \n\n\n \n Koschel, J.; Borrello, P.; D'Elia, D. C.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n June 2023.\n Affected Vendors: Linux\n\n\n\n
\n\n\n\n \n \n \"UncontainedWeb\n  \n \n \n \"UncontainedCVE-2023-1073\n  \n \n \n \"UncontainedCVE-2023-1074\n  \n \n \n \"UncontainedCVE-2023-1075\n  \n \n \n \"UncontainedCVE-2023-1076\n  \n \n \n \"UncontainedCVE-2023-1077\n  \n \n \n \"UncontainedCVE-2023-1078\n  \n \n \n \"UncontainedCVE-2023-1079\n  \n \n \n \"UncontainedCVE-2023-25012\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 202 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@misc{koschel_uncontained_2023,\n\ttitle = {Uncontained {Vulnerabilities}},\n\turl = {Web=https://vusec.net/projects/uncontained CVE-2023-1073=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1073 CVE-2023-1074=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1074 CVE-2023-1075=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1075 CVE-2023-1076=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1076 CVE-2023-1077=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1077 CVE-2023-1078=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1078 CVE-2023-1079=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1079 CVE-2023-25012=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25012},\n\tauthor = {Koschel, Jakob and Borrello, Pietro and D'Elia, Daniele Cono and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = jun,\n\tyear = {2023},\n\tnote = {Affected Vendors: Linux},\n\tkeywords = {research\\_uncontained, type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n CHOP Vulnerability.\n \n \n \n \n\n\n \n Duta, V.; Freyer, F.; Pagani, F.; Muench, M.; and Giuffrida, C.\n\n\n \n\n\n\n January 2023.\n Affected vendors: Intel\n\n\n\n
\n\n\n\n \n \n \"CHOPCVE-2022-40196 (Intel)\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@misc{duta_chop_2023,\n\ttitle = {{CHOP} {Vulnerability}},\n\turl = {CVE-2022-40196_(Intel)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40196},\n\tauthor = {Duta, Victor and Freyer, Fabian and Pagani, Fabio and Muench, Marius and Giuffrida, Cristiano},\n\tmonth = jan,\n\tyear = {2023},\n\tnote = {Affected vendors: Intel},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n BHI (or Spectre-BHB) Vulnerability.\n \n \n \n \n\n\n \n Barberis, E.; Frigo, P.; Muench, M.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n March 2022.\n Affected vendors: Intel (Bounty Reward), Arm, Other SW Vendors\n\n\n\n
\n\n\n\n \n \n \"BHIWeb\n  \n \n \n \"BHICVE-2022-0001 (Intel)\n  \n \n \n \"BHICVE-2022-0002 (Intel)\n  \n \n \n \"BHICVE-2022-23960 (Arm)\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@misc{barberis_bhi_2022,\n\ttitle = {{BHI} (or {Spectre}-{BHB}) {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/bhi-spectre-bhb CVE-2022-0001_(Intel)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0001 CVE-2022-0002_(Intel)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0002 CVE-2022-23960_(Arm)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23960},\n\tauthor = {Barberis, Enrico and Frigo, Pietro and Muench, Marius and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = mar,\n\tyear = {2022},\n\tnote = {Affected vendors: Intel (Bounty Reward), Arm, Other SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n FPVI Vulnerability.\n \n \n \n \n\n\n \n Ragab, H.; Barberis, E.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n June 2021.\n Affected vendors: Intel (Bounty Reward), AMD, Mozilla (Bounty Reward), Other SW Vendors\n\n\n\n
\n\n\n\n \n \n \"FPVIWeb\n  \n \n \n \"FPVICVE-2021-0086 (Intel)\n  \n \n \n \"FPVICVE-2021-26314 (AMD)\n  \n \n \n \"FPVICVE-2021-29955 (Mozilla)\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@misc{ragab_fpvi_2021,\n\ttitle = {{FPVI} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/fpvi-scsb CVE-2021-0086_(Intel)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0086 CVE-2021-26314_(AMD)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26314 CVE-2021-29955_(Mozilla)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29955},\n\tauthor = {Ragab, Hany and Barberis, Enrico and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = jun,\n\tyear = {2021},\n\tnote = {Affected vendors: Intel (Bounty Reward), AMD, Mozilla (Bounty Reward), Other SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SCSB Vulnerability.\n \n \n \n \n\n\n \n Ragab, H.; Barberis, E.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n June 2021.\n Affected vendors: Intel (Bounty Reward), AMD, Xen, Other SW Vendors\n\n\n\n
\n\n\n\n \n \n \"SCSBWeb\n  \n \n \n \"SCSBCVE-2021-0089 (Intel)\n  \n \n \n \"SCSBCVE-2021-26313 (AMD)\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@misc{ragab_scsb_2021,\n\ttitle = {{SCSB} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/fpvi-scsb CVE-2021-0089_(Intel)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0089 CVE-2021-26313_(AMD)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26313},\n\tauthor = {Ragab, Hany and Barberis, Enrico and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = jun,\n\tyear = {2021},\n\tnote = {Affected vendors: Intel (Bounty Reward), AMD, Xen, Other SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n SRBDS (CrossTalk) Vulnerability.\n \n \n \n \n\n\n \n Ragab, H.; Milburn, A.; Razavi, K.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n June 2020.\n Affected Vendors: Intel (Bounty Reward), SW Vendors\n\n\n\n
\n\n\n\n \n \n \"SRBDSWeb\n  \n \n \n \"SRBDSCVE-2020-0543 (Intel)\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@misc{ragab_srbds_2020,\n\ttitle = {{SRBDS} ({CrossTalk}) {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/crosstalk CVE-2020-0543_(Intel)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543},\n\tauthor = {Ragab, Hany and Milburn, Alyssa and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = jun,\n\tyear = {2020},\n\tnote = {Affected Vendors: Intel (Bounty Reward), SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n TRRespass Vulnerability.\n \n \n \n \n\n\n \n Frigo, P.; Vannacci, E.; Hassan, H.; van der Veen, V.; Mutlu, O.; Giuffrida, C.; Bos, H.; and Razavi, K.\n\n\n \n\n\n\n March 2020.\n Affected Vendors: Micron, Samsung, SK Hynix, SW Vendors\n\n\n\n
\n\n\n\n \n \n \"TRRespassWeb\n  \n \n \n \"TRRespassCVE-2020-10255\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@misc{frigo_trrespass_2020,\n\ttitle = {{TRRespass} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/trrespass CVE-2020-10255=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10255},\n\tauthor = {Frigo, Pietro and Vannacci, Emanuele and Hassan, Hasan and van der Veen, Victor and Mutlu, Onur and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = mar,\n\tyear = {2020},\n\tnote = {Affected Vendors: Micron, Samsung, \nSK Hynix, SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n NetCAT Vulnerability.\n \n \n \n \n\n\n \n Kurth, M.; Gras, B.; Andriesse, D.; Giuffrida, C.; Bos, H.; and Razavi, K.\n\n\n \n\n\n\n September 2019.\n Affected Vendors: Intel (Bounty Reward), SW Vendors\n\n\n\n
\n\n\n\n \n \n \"NetCATWeb\n  \n \n \n \"NetCATCVE-2019-11184\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@misc{kurth_netcat_2019,\n\ttitle = {{NetCAT} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/netcat CVE-2019-11184=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11184},\n\tauthor = {Kurth, Michael and Gras, Ben and Andriesse, Dennis and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = sep,\n\tyear = {2019},\n\tnote = {Affected Vendors: Intel (Bounty Reward), SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n MDS (RIDL) Vulnerabilities.\n \n \n \n \n\n\n \n van Schaik, S.; Milburn, A.; Österlund, S.; Frigo, P.; Maisuradze, G.; Razavi, K.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n May 2019.\n Affected Vendors: Intel (Bounty Reward, Highest to Date), SW Vendors\n\n\n\n
\n\n\n\n \n \n \"MDSWeb\n  \n \n \n \"MDSCVE-2018-12127 (MLPDS)\n  \n \n \n \"MDSCVE-2018-12130 (MFBDS)\n  \n \n \n \"MDSCVE-2019-11091 (MDSUM)\n  \n \n \n \"MDSCVE-2019-11135 (TAA)\n  \n \n \n \"MDSCVE-2020-0548 (VRS)\n  \n \n \n \"MDSCVE-2020-0549 (L1DES)\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@misc{van_schaik_mds_2019,\n\ttitle = {{MDS} ({RIDL}) {Vulnerabilities}},\n\turl = {Web=https://mdsattacks.com CVE-2018-12127_(MLPDS)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127 CVE-2018-12130_(MFBDS)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130 CVE-2019-11091_(MDSUM)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091 CVE-2019-11135_(TAA)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135 CVE-2020-0548_(VRS)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548 CVE-2020-0549_(L1DES)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549},\n\tauthor = {van Schaik, Stephan and Milburn, Alyssa and Österlund, Sebastian and Frigo, Pietro and Maisuradze, Giorgi and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = may,\n\tyear = {2019},\n\tnote = {Affected Vendors: Intel (Bounty Reward, Highest to Date), SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n ECCploit Vulnerability.\n \n \n \n \n\n\n \n Cojocar, L.; Razavi, K.; Giuffrida, C.; and Bos, H.\n\n\n \n\n\n\n November 2018.\n Affected Vendors: Intel, AMD, SW Vendors\n\n\n\n
\n\n\n\n \n \n \"ECCploitWeb\n  \n \n \n \"ECCploitCVE-2018-18904\n  \n \n \n \"ECCploitCVE-2018-18905\n  \n \n \n \"ECCploitCVE-2018-18906\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@misc{cojocar_eccploit_2018,\n\ttitle = {{ECCploit} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/netcat CVE-2018-18904=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18904 CVE-2018-18905=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18905 CVE-2018-18906=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18906},\n\tauthor = {Cojocar, Lucian and Razavi, Kaveh and Giuffrida, Cristiano and Bos, Herbert},\n\tmonth = nov,\n\tyear = {2018},\n\tnote = {Affected Vendors: Intel, AMD, SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n GLitch Vulnerability.\n \n \n \n \n\n\n \n Frigo, P.; Giuffrida, C.; Bos, H.; and Razavi, K.\n\n\n \n\n\n\n May 2018.\n Affected Vendors: DRAM Vendors, SW Vendors\n\n\n\n
\n\n\n\n \n \n \"GLitchWeb\n  \n \n \n \"GLitchCVE-2018-10229\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@misc{frigo_glitch_2018,\n\ttitle = {{GLitch} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/glitch CVE-2018-10229=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10229},\n\tauthor = {Frigo, Pietro and Giuffrida, Cristiano and Bos, Herbert and Razavi, Kaveh},\n\tmonth = may,\n\tyear = {2018},\n\tnote = {Affected Vendors: DRAM Vendors, SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (1)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n AnC Vulnerability.\n \n \n \n \n\n\n \n Gras, B.; Razavi, K.; Bosman, E.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n February 2017.\n Affected Vendors: Intel, AMD, Arm, SW Vendors\n\n\n\n
\n\n\n\n \n \n \"AnCWeb\n  \n \n \n \"AnCCVE-2017-5925 (Intel)\n  \n \n \n \"AnCCVE-2017-5926 (AMD)\n  \n \n \n \"AnCCVE-2017-5927 (ARM)\n  \n \n \n \"AnCCVE-2017-5928 (Browsers)\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@misc{gras_anc_2017,\n\ttitle = {{AnC} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/anc CVE-2017-5925_(Intel)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5925 CVE-2017-5926_(AMD)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5926 CVE-2017-5927_(ARM)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5927 CVE-2017-5928_(Browsers)=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5928},\n\tauthor = {Gras, Ben and Razavi, Kaveh and Bosman, Erik and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = feb,\n\tyear = {2017},\n\tnote = {Affected Vendors: Intel, AMD, Arm, SW Vendors},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Drammer Vulnerability.\n \n \n \n \n\n\n \n van der Veen, V.; Fratantonio, Y.; Lindorfer, M.; Gruss, D.; Maurice, C.; Vigna, G.; Bos, H.; Razavi, K.; and Giuffrida, C.\n\n\n \n\n\n\n October 2016.\n Affected Vendors: DRAM Vendors, Android (Security Reward)\n\n\n\n
\n\n\n\n \n \n \"DrammerWeb\n  \n \n \n \"DrammerCVE-2016-6728\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@misc{van_der_veen_drammer_2016,\n\ttitle = {Drammer {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/drammer CVE-2016-6728=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6728},\n\tauthor = {van der Veen, Victor and Fratantonio, Yanick and Lindorfer, Martina and Gruss, Daniel and Maurice, Clementine and Vigna, Giovanni and Bos, Herbert and Razavi, Kaveh and Giuffrida, Cristiano},\n\tmonth = oct,\n\tyear = {2016},\n\tnote = {Affected Vendors: DRAM Vendors, Android (Security Reward)},\n\tkeywords = {type\\_cve},\n}\n\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Dedup Est Machina Vulnerability.\n \n \n \n \n\n\n \n Bosman, E.; Razavi, K.; Bos, H.; and Giuffrida, C.\n\n\n \n\n\n\n May 2016.\n Affected Vendors: Microsoft\n\n\n\n
\n\n\n\n \n \n \"DedupWeb\n  \n \n \n \"DedupCVE-2016-3272\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@misc{bosman_dedup_2016,\n\ttitle = {Dedup {Est} {Machina} {Vulnerability}},\n\turl = {Web=https://www.vusec.net/projects/dedup-est-machina CVE-2016-3272=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3272},\n\tauthor = {Bosman, Erik and Razavi, Kaveh and Bos, Herbert and Giuffrida, Cristiano},\n\tmonth = may,\n\tyear = {2016},\n\tnote = {Affected Vendors: Microsoft},\n\tkeywords = {type\\_cve},\n}\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);