Skip to main content
Ir a la página de inicio de la Comisión Europea (se abrirá en una nueva ventana)
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Foundations for Sustainable Security

CORDIS proporciona enlaces a los documentos públicos y las publicaciones de los proyectos de los programas marco HORIZONTE.

Los enlaces a los documentos y las publicaciones de los proyectos del Séptimo Programa Marco, así como los enlaces a algunos tipos de resultados específicos, como conjuntos de datos y «software», se obtienen dinámicamente de OpenAIRE .

Resultado final

Publicaciones

KernelSnitch: Side-Channel Attacks on Kernel Data Structures

Autores: Lukas Maar, Jonas Juffinger, Thomas Steinbauer, Daniel Gruss, Stefan Mangard
Publicado en: Proceedings 2024 Network and Distributed System Security Symposium, 2024
Editor: Internet Society

Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels

Autores: Andreas Kogler, Jonas Juffinger, Lukas Giner, Lukas Gerlach, Martin Schwarzl, Michael Schwarz, Daniel Gruss, Stefan Mangard
Publicado en: Proceedings of the 32nd USENIX Security Symposium, 2023, ISBN 978-1-939133-37-3
Editor: USENIX Association

Systematic Analysis of Kernel Security Performance and Energy Costs (se abrirá en una nueva ventana)

Autores: Fabian Rauscher, Benedict Herzog, Timo Hönig, Daniel Gruss
Publicado en: Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025
Editor: ACM
DOI: 10.1145/3708821.3736197

Generic and Automated Drive-by GPU Cache Attacks from the Browser (se abrirá en una nueva ventana)

Autores: Lukas Giner, Roland Czerny, Christoph Gruber, Fabian Rauscher, Andreas Kogler, Daniel De Almeida Braga, Daniel Gruss
Publicado en: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Editor: ACM
DOI: 10.1145/3634737.3656283

CacheWarp: Software-based Fault Injection using Selective State Reset

Autores: Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler, Michael Schwarz
Publicado en: Proceedings of the 33rd USENIX Security Symposium, 2024, ISBN 978-1-939133-44-1
Editor: USENIX Association

TDXploit: Novel Techniques for Single-Stepping and Cache Attacks on Intel TDX

Autores: Fabian Rauscher, Luca Wilke, Hannes Weissteiner, Thomas Eisenbarth, Daniel Gruss
Publicado en: Proceedings of the 34th USENIX Security Symposium, 2025, ISBN 978-1-939133-52-6
Editor: USENIX Association

TEEcorrelate: An Information-Preserving Defense against Performance-Counter Attacks on TEEs

Autores: Hannes Weissteiner, Fabian Rauscher, Robin Leander Schröder, Jonas Juffinger, Stefan Gast, Jan Wichelmann, Thomas Eisenbarth, Daniel Gruss
Publicado en: Proceedings of the 34th USENIX Security Symposium, 2025, ISBN 978-1-939133-52-6
Editor: USENIX Association

Remote Scheduler Contention Attacks

Autores: Stefan Gast, Jonas Juffinger, Lukas Maar, Christoph Royer, Andreas Kogler, Daniel Gruss
Publicado en: Proceedings of the International Conference on Financial Cryptography and Data Security, 2024, ISSN 0302-9743
Editor: Springer

SUIT: Secure Undervolting with Instruction Traps (se abrirá en una nueva ventana)

Autores: Jonas Juffinger, Stepan Kalinin, Daniel Gruss, Frank Mueller
Publicado en: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2, 2024
Editor: ACM
DOI: 10.1145/3620665.3640373

CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP (se abrirá en una nueva ventana)

Autores: Stefan Gast, Hannes Weissteiner, Robin Leander Schröder, Daniel Gruss
Publicado en: Proceedings of the Network and Distributed System Security (NDSS) Symposium 2025, 2025, ISBN 979-8-9894372-8-3
Editor: Internet Society
DOI: 10.14722/NDSS.2025.241038

SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript

Autores: Stefan Gast, Roland Czerny, Jonas Juffinger, Fabian Rauscher, Simone Franza, Daniel Gruss
Publicado en: Proceedings of the 33rd USENIX Security Symposium, 2024
Editor: USENIX Association

Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs (se abrirá en una nueva ventana)

Autores: Fabian Rauscher, Daniel Gruss
Publicado en: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2025
Editor: ACM
DOI: 10.1145/3658644.3690242

SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel

Autores: Lukas Maar, Stefan Gast, Martin Unterguggenberger, Mathias Oberhuber, Stefan Mangard
Publicado en: Proceedings of the 33rd USENIX Security Symposium, 2024
Editor: USENIX Association

Power-Related Side-Channel Attacks using the Android Sensor Framework

Autores: Mathias Oberhuber, Martin Unterguggenberger, Lukas Maar, Andreas Kogler, Stefan Mangard
Publicado en: Proceedings of the Network and Distributed System Security Symposium 2025, 2025
Editor: Internet Society

IdleLeak: Exploiting Idle State Side Effects for Information Leakage (se abrirá en una nueva ventana)

Autores: Fabian Rauscher, Andreas Kogler, Jonas Juffinger, Daniel Gruss
Publicado en: Proceedings 2024 Network and Distributed System Security Symposium, 2024
Editor: Internet Society
DOI: 10.14722/NDSS.2024.24078

A Systematic Evaluation of Novel and Existing Cache Side Channels

Autores: Fabian Rauscher, Carina Fiedler, Andreas Kogler, Daniel Gruss
Publicado en: Proceedings 2025 Network and Distributed System Security Symposium, 2025
Editor: Internet Society

When Good Kernel Defenses Go Bad: Reliable and Stable Kernel Exploits via Defense-Amplified TLB Side-Channel Leaks

Autores: Lukas Maar, Lukas Giner, Daniel Gruss, Stefan Mangard
Publicado en: Proceedings of the 34th USENIX Security Symposium, 2025, ISBN 978-1-939133-52-6
Editor: USENIX Association

Presshammer: Rowhammer and Rowpress Without Physical Address Information (se abrirá en una nueva ventana)

Autores: Jonas Juffinger, Sudheendra Raghav Neela, Martin Heckel, Lukas Schwarz, Florian Adamsky, Daniel Gruss
Publicado en: Lecture Notes in Computer Science, Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Editor: Springer Nature Switzerland
DOI: 10.1007/978-3-031-64171-8_24

Not So Secure TSC

Autores: Jonas Juffinger, Sudheendra Raghav Neela, Daniel Gruss
Publicado en: Proceedings of the International Conference on Applied Cryptography and Network Security (ACNS), 2025
Editor: Springer

Secret Spilling Drive: Leaking User Behavior through SSD Contention

Autores: Jonas Juffinger, Fabian Rauscher, Giuseppe La Manna, Daniel Gruss
Publicado en: Proceedings of the Network and Distributed System Security Symposium 2025, 2025
Editor: Internet Society

The HMB Timing Side Channel: Exploiting the SSD’s Host Memory Buffer (se abrirá en una nueva ventana)

Autores: Jonas Juffinger, Hannes Weissteiner, Thomas Steinbauer, Daniel Gruss
Publicado en: Lecture Notes in Computer Science, Detection of Intrusions and Malware, and Vulnerability Assessment, 2025
Editor: Springer Nature Switzerland
DOI: 10.1007/978-3-031-97620-9_10

Fast and Efficient Secure L1 Caches for SMT (se abrirá en una nueva ventana)

Autores: Lukas Giner, Roland Czerny, Simon Lammer, Aaron Giner, Paul Gollob, Jonas Juffinger, Daniel Gruss
Publicado en: Lecture Notes in Computer Science, Availability, Reliability and Security, 2025
Editor: Springer Nature Switzerland
DOI: 10.1007/978-3-032-00627-1_6

Cohere+Reload: Re-enabling High-Resolution Cache Attacks on AMD SEV-SNP (se abrirá en una nueva ventana)

Autores: Lukas Giner, Sudheendra Raghav Neela, Daniel Gruss
Publicado en: Lecture Notes in Computer Science, Detection of Intrusions and Malware, and Vulnerability Assessment, 2025
Editor: Springer Nature Switzerland
DOI: 10.1007/978-3-031-97620-9_11

Zero-Click SnailLoad: From Minimal to No User Interaction (se abrirá en una nueva ventana)

Autores: Stefan Gast, Nora Puntigam, Simone Franza, Sudheendra Raghav Neela, Daniel Gruss, Johanna Ullrich
Publicado en: Lecture Notes in Computer Science, Computer Security – ESORICS 2025, 2025
Editor: Springer Nature Switzerland
DOI: 10.1007/978-3-032-07901-5_6

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles

Mi folleto 0 0