Follow
Jonas Juffinger
Title
Cited by
Cited by
Year
Another flip in the wall of rowhammer defenses
D Gruss, M Lipp, M Schwarz, D Genkin, J Juffinger, S O'Connell, ...
2018 IEEE Symposium on Security and Privacy (SP), 245-261, 2018
3012018
{Half-Double}: Hammering from the next row over
A Kogler, J Juffinger, S Qazi, Y Kim, M Lipp, N Boichat, E Shiu, M Nissler, ...
31st USENIX Security Symposium (USENIX Security 22), 3807-3824, 2022
652022
CSI: Rowhammer–Cryptographic security and integrity against rowhammer
J Juffinger, L Lamster, A Kogler, M Eichlseder, M Lipp, D Gruss
2023 IEEE Symposium on Security and Privacy (SP), 1702-1718, 2023
492023
Squip: Exploiting the scheduler queue contention side channel
S Gast, J Juffinger, M Schwarzl, G Saileshwar, A Kogler, S Franza, M Köstl, ...
2023 IEEE Symposium on Security and Privacy (SP), 2256-2272, 2023
232023
Pt-guard: Integrity-protected page tables to defend against breakthrough rowhammer attacks
A Saxena, G Saileshwar, J Juffinger, A Kogler, D Gruss, M Qureshi
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2023
192023
{Collide+ Power}: Leaking Inaccessible Data with Software-based Power Side Channels
A Kogler, J Juffinger, L Giner, L Gerlach, M Schwarzl, M Schwarz, D Gruss, ...
32nd USENIX Security Symposium (USENIX Security 23), 7285-7302, 2023
162023
Remote scheduler contention attacks
S Gast, J Juffinger, L Maar, C Royer, A Kogler, D Gruss
arXiv preprint arXiv:2404.07042, 2024
32024
IdleLeak: Exploiting Idle State Side Effects for Information Leakage
F Rauscher, A Kogler, J Juffinger, D Gruss
Network and Distributed System Security (NDSS) Symposium 2024, 2024
32024
Suit: Secure undervolting with instruction traps
J Juffinger, S Kalinin, D Gruss, F Mueller
Proceedings of the 29th ACM International Conference on Architectural …, 2024
22024
Secret Spilling Drive: Leaking User Behavior through SSD Contention
J Juffinger, F Rauscher, G La Manna, D Gruss
Network and Distributed System Security Symposium 2024, 2025
12025
Presshammer: Rowhammer and Rowpress without Physical Address Information
J Juffinger, SR Neela, M Heckel, L Schwarz, F Adamsky, D Gruss
International Conference on Detection of Intrusions and Malware, and …, 2024
2024
{SnailLoad}: Exploiting Remote Network Latency Measurements without {JavaScript}
S Gast, R Czerny, J Juffinger, F Rauscher, S Franza, D Gruss
33rd USENIX Security Symposium (USENIX Security 24), 2315-2332, 2024
2024
Side-Channel Security
J Juffinger
2023
Rowhammer Exploits are still possible
J Juffinger
The system can't perform the operation now. Try again later.
Articles 1–14