Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Foundations for Sustainable Security

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Publications

KernelSnitch: Side-Channel Attacks on Kernel Data Structures

Author(s): Lukas Maar, Jonas Juffinger, Thomas Steinbauer, Daniel Gruss, Stefan Mangard
Published in: Proceedings 2024 Network and Distributed System Security Symposium, 2024
Publisher: Internet Society

Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels

Author(s): Andreas Kogler, Jonas Juffinger, Lukas Giner, Lukas Gerlach, Martin Schwarzl, Michael Schwarz, Daniel Gruss, Stefan Mangard
Published in: Proceedings of the 32nd USENIX Security Symposium, 2023, ISBN 978-1-939133-37-3
Publisher: USENIX Association

Systematic Analysis of Kernel Security Performance and Energy Costs (opens in new window)

Author(s): Fabian Rauscher, Benedict Herzog, Timo Hönig, Daniel Gruss
Published in: Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025
Publisher: ACM
DOI: 10.1145/3708821.3736197

Generic and Automated Drive-by GPU Cache Attacks from the Browser (opens in new window)

Author(s): Lukas Giner, Roland Czerny, Christoph Gruber, Fabian Rauscher, Andreas Kogler, Daniel De Almeida Braga, Daniel Gruss
Published in: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Publisher: ACM
DOI: 10.1145/3634737.3656283

CacheWarp: Software-based Fault Injection using Selective State Reset

Author(s): Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler, Michael Schwarz
Published in: Proceedings of the 33rd USENIX Security Symposium, 2024, ISBN 978-1-939133-44-1
Publisher: USENIX Association

TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX

Author(s): Fabian Rauscher, Luca Wilke, Hannes Weissteiner, Thomas Eisenbarth, Daniel Gruss
Published in: Proceedings of the 34th USENIX Security Symposium, 2025, ISBN 978-1-939133-52-6
Publisher: USENIX Association

TEEcorrelate: An Information-Preserving Defense against Performance-Counter Attacks on TEEs

Author(s): Hannes Weissteiner, Fabian Rauscher, Robin Leander Schröder, Jonas Juffinger, Stefan Gast, Jan Wichelmann, Thomas Eisenbarth, Daniel Gruss
Published in: Proceedings of the 34th USENIX Security Symposium, 2025, ISBN 978-1-939133-52-6
Publisher: USENIX Association

Remote Scheduler Contention Attacks

Author(s): Stefan Gast, Jonas Juffinger, Lukas Maar, Christoph Royer, Andreas Kogler, Daniel Gruss
Published in: Proceedings of the International Conference on Financial Cryptography and Data Security, 2024, ISSN 0302-9743
Publisher: Springer

SUIT: Secure Undervolting with Instruction Traps (opens in new window)

Author(s): Jonas Juffinger, Stepan Kalinin, Daniel Gruss, Frank Mueller
Published in: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2, 2024
Publisher: ACM
DOI: 10.1145/3620665.3640373

CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP (opens in new window)

Author(s): Stefan Gast, Hannes Weissteiner, Robin Leander Schröder, Daniel Gruss
Published in: Proceedings of the Network and Distributed System Security (NDSS) Symposium 2025, 2025, ISBN 979-8-9894372-8-3
Publisher: Internet Society
DOI: 10.14722/NDSS.2025.241038

SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript

Author(s): Stefan Gast, Roland Czerny, Jonas Juffinger, Fabian Rauscher, Simone Franza, Daniel Gruss
Published in: Proceedings of the 33rd USENIX Security Symposium, 2024
Publisher: USENIX Association

Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs (opens in new window)

Author(s): Fabian Rauscher, Daniel Gruss
Published in: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2025
Publisher: ACM
DOI: 10.1145/3658644.3690242

SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel

Author(s): Lukas Maar, Stefan Gast, Martin Unterguggenberger, Mathias Oberhuber, Stefan Mangard
Published in: Proceedings of the 33rd USENIX Security Symposium, 2024
Publisher: USENIX Association

Power-Related Side-Channel Attacks using the Android Sensor Framework

Author(s): Mathias Oberhuber, Martin Unterguggenberger, Lukas Maar, Andreas Kogler, Stefan Mangard
Published in: Proceedings of the Network and Distributed System Security Symposium 2025, 2025
Publisher: Internet Society

IdleLeak: Exploiting Idle State Side Effects for Information Leakage (opens in new window)

Author(s): Fabian Rauscher, Andreas Kogler, Jonas Juffinger, Daniel Gruss
Published in: Proceedings 2024 Network and Distributed System Security Symposium, 2024
Publisher: Internet Society
DOI: 10.14722/NDSS.2024.24078

A Systematic Evaluation of Novel and Existing Cache Side Channels

Author(s): Fabian Rauscher, Carina Fiedler, Andreas Kogler, Daniel Gruss
Published in: Proceedings 2025 Network and Distributed System Security Symposium, 2025
Publisher: Internet Society

When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks

Author(s): Lukas Maar, Lukas Giner, Daniel Gruss, Stefan Mangard
Published in: Proceedings of the 34th USENIX Security Symposium, 2025, ISBN 978-1-939133-52-6
Publisher: USENIX Association

Presshammer: Rowhammer and Rowpress Without Physical Address Information (opens in new window)

Author(s): Jonas Juffinger, Sudheendra Raghav Neela, Martin Heckel, Lukas Schwarz, Florian Adamsky, Daniel Gruss
Published in: Lecture Notes in Computer Science, Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-64171-8_24

Not So Secure TSC

Author(s): Jonas Juffinger, Sudheendra Raghav Neela, Daniel Gruss
Published in: Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS), 2025
Publisher: Springer

Secret Spilling Drive: Leaking User Behavior through SSD Contention

Author(s): Jonas Juffinger, Fabian Rauscher, Giuseppe La Manna, Daniel Gruss
Published in: Proceedings of the Network and Distributed System Security Symposium 2025, 2025
Publisher: Internet Society

The HMB Timing Side Channel: Exploiting the SSD’s Host Memory Buffer (opens in new window)

Author(s): Jonas Juffinger, Hannes Weissteiner, Thomas Steinbauer, Daniel Gruss
Published in: Lecture Notes in Computer Science, Detection of Intrusions and Malware, and Vulnerability Assessment, 2025
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-97620-9_10

Fast and Efficient Secure L1 Caches for SMT (opens in new window)

Author(s): Lukas Giner, Roland Czerny, Simon Lammer, Aaron Giner, Paul Gollob, Jonas Juffinger, Daniel Gruss
Published in: Lecture Notes in Computer Science, Availability, Reliability and Security, 2025
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-032-00627-1_6

Cohere+Reload: Re-enabling High-Resolution Cache Attacks on AMD SEV-SNP (opens in new window)

Author(s): Lukas Giner, Sudheendra Raghav Neela, Daniel Gruss
Published in: Lecture Notes in Computer Science, Detection of Intrusions and Malware, and Vulnerability Assessment, 2025
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-97620-9_11

Zero-Click SnailLoad: From Minimal to No User Interaction (opens in new window)

Author(s): Stefan Gast, Nora Puntigam, Simone Franza, Sudheendra Raghav Neela, Daniel Gruss, Johanna Ullrich
Published in: Lecture Notes in Computer Science, Computer Security – ESORICS 2025, 2025
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-032-07901-5_6

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0