Folgen
Clémentine Maurice
Titel
Zitiert von
Zitiert von
Jahr
Flush+Flush: A Fast and Stealthy Cache Attack
D Gruss, C Maurice, K Wagner, S Mangard
13th Conference on Detection of Intrusions and Malware & Vulnerability …, 2016
7952016
ARMageddon: Cache Attacks on Mobile Devices.
M Lipp, D Gruss, R Spreitzer, C Maurice, S Mangard
USENIX Security Symposium, 549-564, 2016
5982016
Malware Guard Extension: abusing Intel SGX to conceal cache attacks
M Schwarz, S Weiser, D Gruss, C Maurice, S Mangard
Cybersecurity 3 (1), 2, 2020
589*2020
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
P Pessl, D Gruss, C Maurice, M Schwarz, S Mangard
25th USENIX Security Symposium (USENIX Security 16), 2016
5632016
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
D Gruss, C Maurice, S Mangard
13th Conference on Detection of Intrusions and Malware & Vulnerability …, 2016
5492016
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
V van der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ...
23rd ACM Conference on Computer and Communications Security (CCS'16), 1675-1689, 2016
4402016
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR
D Gruss, C Maurice, A Fogh, M Lipp, S Mangard
23rd ACM Conference on Computer and Communications Security (CCS'16), 2016
3372016
KASLR is Dead: Long Live KASLR
D Gruss, M Lipp, M Schwarz, R Fellner, C Maurice, S Mangard
International Symposium on Engineering Secure Software and Systems (ESSoS'17), 2017
3342017
Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters
C Maurice, N Le Scouarnec, C Neumann, O Heen, A Francillon
18th International Symposium on Research in Attacks, Intrusions and Defenses …, 2015
2672015
Hello from the other side: SSH over robust cache covert channels in the cloud
C Maurice, M Weber, M Schwartz, L Giner, D Gruss, CA Boano, K Römer, ...
Network and Distributed System Security Symposium 2017 (NDSS'17), 2017
2152017
Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript
M Schwarz, C Maurice, D Gruss, S Mangard
Financial Cryptography and Data Security 2017 (FC'17), 2017
1932017
Nethammer: Inducing rowhammer faults through network requests
M Lipp, M Schwarz, L Raab, L Lamster, MT Aga, C Maurice, D Gruss
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
1632020
C5: Cross-Cores Cache Covert Channel
C Maurice, C Neumann, O Heen, A Francillon
12th Conference on Detection of Intrusions and Malware & Vulnerability …, 2015
1542015
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
M Schwarz, M Lipp, D Gruss, S Weiser, C Maurice, R Spreitzer, ...
Network and Distributed System Security Symposium 2018 (NDSS'18), 2018
942018
Practical Keystroke Timing Attacks in Sandboxed JavaScript
M Lipp, D Gruss, M Schwarz, D Bidner, C Maurice, S Mangard
European Symposium on Research in Computer Security (ESORICS'17), 191-209, 2017
822017
Take A Way: Exploring the Security Implications of AMD’s Cache Way Predictors
M Lipp, V Hadžić, M Schwarz, A Perais, C Maurice, D Gruss
15th ACM ASIA Conference on Computer and Communications Security (ASIACCS'20), 2020
732020
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features
M Schwarz, D Gruss, M Lipp, C Maurice, T Schuster, A Fogh, S Mangard
13th ACM ASIA Conference on Computer and Communications Security (ASIACCS'18), 2018
662018
Confidentiality Issues on a GPU in a Virtualized Environment
C Maurice, C Neumann, O Heen, A Francillon
Financial Cryptography and Data Security 2014 (FC'14), 2014
662014
DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting
T Laor, N Mehanna, A Durey, V Dyadyuk, P Laperdrix, C Maurice, Y Oren, ...
Network and Distributed System Security Symposium (NDSS'22), 2022
352022
Branch Prediction Attack on Blinded Scalar Multiplication
S Bhattacharya, C Maurice, S Bhasin, D Mukhopadhyay
IEEE Transactions on Computers 69 (5), 633-648, 2019
31*2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20