Daniel Moghimi
Titel
Zitiert von
Zitiert von
Jahr
CacheZoom: How SGX Amplifies the Power of Cache Attacks
A Moghimi, G Irazoqui, T Eisenbarth
International Conference on Cryptographic Hardware and Embedded Systems …, 2017
2212017
ZombieLoad: Cross-Privilege-Boundary Data Sampling
M Schwarz, M Lipp, D Moghimi, J Van Bulck, J Stecklina, T Prescher, ...
The 26th ACM Conference on Computer and Communications Security (CCS 2019), 2019
2182019
Fallout: Leaking Data on Meltdown-resistant CPUs
C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ...
The 26th ACM Conference on Computer and Communications Security (CCS 2019), 2019
1032019
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations
A Moghimi, J Wichelmann, T Eisenbarth, B Sunar
International Journal of Parallel Programming 47 (4), 538-570, 2019
902019
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
J Van Bulck, D Moghimi, M Schwarz, M Lipp, M Minkin, D Genkin, ...
The 41st IEEE Symposium on Security and Privacy (S&P 2020), 2020
892020
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks
F Dall, G De Micheli, T Eisenbarth, D Genkin, N Heninger, A Moghimi, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2018 …, 2018
622018
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks
S Islam, A Moghimi, I Bruhns, M Krebbel, B Gulmezoglu, T Eisenbarth, ...
The 28th USENIX Security Symposium (USENIX Security 2019), 2019
552019
Fallout: Reading kernel writes from user space
M Minkin, D Moghimi, M Lipp, M Schwarz, J Van Bulck, D Genkin, D Gruss, ...
arXiv preprint arXiv:1905.12701, 2019
482019
TPM-FAIL: TPM meets Timing and Lattice Attacks
D Moghimi, B Sunar, T Eisenbarth, N Heninger
The 29th USENIX Security Symposium (USENIX Security 2020), 2020
382020
Microwalk: A Framework for Finding Side Channels in Binaries
J Wichelmann, A Moghimi, T Eisenbarth, B Sunar
The 34th Annual Computer Security Applications Conference (ACSAC 2018), 161-173, 2018
312018
CopyCat: Controlled Instruction-level Attacks on Enclaves
D Moghimi, J Van Bulck, N Heninger, F Piessens, B Sunar
The 29th USENIX Security Symposium (USENIX Security 2020), 2020
19*2020
Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis
D Moghimi, M Lipp, B Sunar, M Schwarz
The 29th USENIX Security Symposium (USENIX Security 2020), 2020
182020
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
Z Weissman, T Tiemann, D Moghimi, E Custodio, T Eisenbarth, B Sunar
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2020), 2020
152020
Fortuneteller: Predicting microarchitectural attacks via unsupervised deep learning
B Gulmezoglu, A Moghimi, T Eisenbarth, B Sunar
arXiv preprint arXiv:1907.03651, 2019
132019
Swivel: Hardening WebAssembly against Spectre
S Narayan, C Disselkoen, D Moghimi, S Cauligi, E Johnson, Z Gang, ...
The 30th USENIX Security Symposium (USENIX Security 2021), 2021
72021
Subverting without EIP
D Moghimi
https://moghimi.org/blog/subverting-without-eip.html, 2014
62014
Side-Channel Attacks on Intel SGX: How SGX Amplifies The Power of Cache Attack
A Moghimi
Worcester Polytechnic Institute (Master Thesis), 2017
32017
Data Sampling on MDS-resistant 10th Generation Intel Core (Ice Lake)
D Moghimi
arXiv preprint arXiv:2007.07428, 2020
22020
Scream: Sensory channel remote execution attack methods
N Brown, N Patel, P Plenefisch, A Moghimi, T Eisenbarth, C Shue, ...
Usenix Security Symposium (Poster), 2016
22016
Abstract runtime structure for reasoning about security: Poster
M Abi-Antoun, E Khalaj, R Vanciu, A Moghimi
Proceedings of the Symposium and Bootcamp on the Science of Security, 1-3, 2016
22016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20