Publications
SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript
Gast S., Czerny R., Juffinger J., Rauscher F., Franza S., Gruß D.
USENIX Security Symposium 2024, 33rd USENIX Security Symposium: USENIX Security 2024, 2315-2332
Presshammer: Rowhammer and Rowpress without Physical Address Information
Juffinger J., Neela S., Heckel M., Schwarz L., Adamsky F., Gruß D.
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 21st Conference on Detection of Intrusions and Malware & Vulnerability Assessment
SUIT: Secure Undervolting with Instruction Traps
Juffinger J., Kalinin S., Gruß D., Mueller F.
ASPLOS 2024: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 1, ACM International Conference on Architectural Support for Programming Languages and Operating Systems
Remote Scheduler Contention Attacks
Gast S., Juffinger J., Maar L., Royer C., Kogler A., Gruß D.
Financial Cryptography and Data Security - 28th International Conference, FC 2024, Revised Selected Papers, Financial Cryptography and Data Security 2024, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics))
IdleLeak: Exploiting Idle State Side Effects for Information Leakage
Rauscher F., Kogler A., Juffinger J., Gruß D.
Network and Distributed System Security Symposium (NDSS), Network and Distributed System Security Symposium 2024