Follow
Moritz Lipp
Title
Cited by
Cited by
Year
Spectre Attacks: Exploiting Speculative Execution
P Kocher, D Genkin, D Gruss, W Haas, M Hamburg, M Lipp, S Mangard, ...
40th IEEE Symposium on Security and Privacy (S&P'19), 2019
31982019
Meltdown: Reading Kernel Memory from User Space
M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, A Fogh, J Horn, ...
27th USENIX Security Symposium (USENIX Security 18), 2018
2665*2018
ARMageddon: Cache Attacks on Mobile Devices
M Lipp, D Gruss, R Spreitzer, C Maurice, S Mangard
25th USENIX Security Symposium (USENIX Security 16), 549-564, 2016
5952016
ZombieLoad: Cross-privilege-boundary data sampling
M Schwarz, M Lipp, D Moghimi, J Van Bulck, J Stecklina, T Prescher, ...
ACM Conference on Computer and Communications Security, 2019
5502019
A Systematic Evaluation of Transient Execution Attacks and Defenses
C Canella, J Van Bulck, M Schwarz, M Lipp, B von Berg, P Ortner, ...
28th USENIX Security Symposium (USENIX Security 19), 2019
5322019
Fallout: Leaking data on Meltdown-resistant CPUs
C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
413*2019
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR
D Gruss, C Maurice, A Fogh, M Lipp, S Mangard
23rd ACM Conference on Computer and Communications Security, 368-379, 2016
3362016
KASLR is Dead: Long Live KASLR
D Gruss, M Lipp, M Schwarz, R Fellner, C Maurice, S Mangard
International Symposium on Engineering Secure Software and Systems, 161-176, 2017
3322017
LVI: Hijacking transient execution through microarchitectural load value injection
J Van Bulck, D Moghimi, M Schwarz, M Lippi, M Minkin, D Genkin, ...
2020 IEEE Symposium on Security and Privacy (SP), 54-72, 2020
3302020
Another Flip in the Wall of Rowhammer Defenses
D Gruss, M Lipp, M Schwarz, D Genkin, J Juffinger, S O'Connell, ...
39th IEEE Symposium on Security and Privacy (S&P'18), 2018
3032018
Netspectre: Read Arbitrary Memory over Network
M Schwarz, M Schwarzl, M Lipp, D Gruss
24th European Symposium on Research in Computer Security, 2019
2902019
PLATYPUS: Software-based Power Side-Channel Attacks on x86
M Lipp, A Kogler, D Oswald, M Schwarz, C Easdon, C Canella, D Gruss
2202020
Nethammer: Inducing Rowhammer Faults through Network Requests
M Lipp, MT Aga, M Schwarz, D Gruss, C Maurice, L Raab, L Lamster
arXiv preprint arXiv:1805.04956, 2018
1602018
Context: A generic approach for mitigating spectre
M Schwarz, M Lipp, CA Canella, R Schilling, F Kargl, D Gruss
Network and Distributed System Security Symposium 2020, 2020
130*2020
Medusa: Microarchitectural data leakage via automated attack synthesis
D Moghimi, M Lipp, B Sunar, M Schwarz
29th USENIX Security Symposium (USENIX Security 20), 1427-1444, 2020
952020
Keydrown: Eliminating software-based keystroke timing side-channel attacks
M Schwarz, M Lipp, D Gruss, S Weiser, CLN Maurice, R Spreitzer, ...
Network and Distributed System Security Symposium 2018, 15, 2018
922018
JavaScript Zero: Real JavaScript and Zero Side-channel Attacks
M Schwarz, M Lipp, D Gruss
NDSS’18, 2018
842018
Practical Keystroke Timing Attacks in Sandboxed JavaScript
M Lipp, D Gruss, M Schwarz, D Bidner, C Maurice, S Mangard
European Symposium on Research in Computer Security, 191-209, 2017
812017
Take a way: Exploring the security implications of AMD's cache way predictors
M Lipp, V Hadžić, M Schwarz, A Perais, C Maurice, D Gruss
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
732020
ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture
P Borrello, A Kogler, M Schwarzl, M Lipp, D Gruss, M Schwarz
31st USENIX Security Symposium (USENIX Security 22), 3917-3934, 2022
722022
The system can't perform the operation now. Try again later.
Articles 1–20