What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Moritz Lipp
Google Scholar
26
publications in security and cryptology related venues
Year
Venue
Title
2023
conf/sp
CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer.
Jonas Juffinger
Lukas Lamster
Andreas Kogler
Maria Eichlseder
Moritz Lipp
Daniel Gruss
2022
conf/uss
ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture.
Pietro Borrello
Andreas Kogler
Martin Schwarzl
Moritz Lipp
Daniel Gruss
Michael Schwarz
2022
conf/uss
Half-Double: Hammering From the Next Row Over.
Andreas Kogler
Jonas Juffinger
Salman Qazi
Yoongu Kim
Moritz Lipp
Nicolas Boichat
Eric Shiu
Mattias Nissler
Daniel Gruss
2022
conf/uss
AMD Prefetch Attacks through Power and Time.
Moritz Lipp
Daniel Gruss
Michael Schwarz
2022
conf/sp
Finding and Exploiting CPU Features using MSR Templating.
Andreas Kogler
Daniel Weber
Martin Haubenwallner
Moritz Lipp
Daniel Gruss
Michael Schwarz
2022
conf/ndss
Remote Memory-Deduplication Attacks.
Martin Schwarzl
Erik Kraft
Moritz Lipp
Daniel Gruss
2021
conf/sp
PLATYPUS: Software-based Power Side-Channel Attacks on x86.
Moritz Lipp
Andreas Kogler
David F. Oswald
Michael Schwarz
Catherine Easdon
Claudio Canella
Daniel Gruss
2020
conf/ccs
Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors.
Moritz Lipp
Vedad Hadzic
Michael Schwarz
Arthur Perais
Clémentine Maurice
Daniel Gruss
2020
conf/uss
Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis.
Daniel Moghimi
Moritz Lipp
Berk Sunar
Michael Schwarz
2020
conf/sp
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection.
Jo Van Bulck
Daniel Moghimi
Michael Schwarz
Moritz Lipp
Marina Minkin
Daniel Genkin
Yuval Yarom
Berk Sunar
Daniel Gruss
Frank Piessens
2020
conf/eurosp
Nethammer: Inducing Rowhammer Faults through Network Requests.
Moritz Lipp
Michael Schwarz
Lukas Raab
Lukas Lamster
Misiker Tadesse Aga
Clémentine Maurice
Daniel Gruss
2020
conf/ndss
ConTExT: A Generic Approach for Mitigating Spectre.
Michael Schwarz
Moritz Lipp
Claudio Canella
Robert Schilling
Florian Kargl
Daniel Gruss
2019
conf/ccs
Fallout: Leaking Data on Meltdown-resistant CPUs.
Claudio Canella
Daniel Genkin
Lukas Giner
Daniel Gruss
Moritz Lipp
Marina Minkin
Daniel Moghimi
Frank Piessens
Michael Schwarz
Berk Sunar
Jo Van Bulck
Yuval Yarom
2019
conf/ccs
ZombieLoad: Cross-Privilege-Boundary Data Sampling.
Michael Schwarz
Moritz Lipp
Daniel Moghimi
Jo Van Bulck
Julian Stecklina
Thomas Prescher
Daniel Gruss
2019
conf/uss
A Systematic Evaluation of Transient Execution Attacks and Defenses.
Claudio Canella
Jo Van Bulck
Michael Schwarz
Moritz Lipp
Benjamin von Berg
Philipp Ortner
Frank Piessens
Dmitry Evtyushkin
Daniel Gruss
2019
conf/sp
Spectre Attacks: Exploiting Speculative Execution.
Paul Kocher
Jann Horn
Anders Fogh
Daniel Genkin
Daniel Gruss
Werner Haas
Mike Hamburg
Moritz Lipp
Stefan Mangard
Thomas Prescher
Michael Schwarz
Yuval Yarom
2019
conf/esorics
NetSpectre: Read Arbitrary Memory over Network.
Michael Schwarz
Martin Schwarzl
Moritz Lipp
Jon Masters
Daniel Gruss
2018
conf/ccs
Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services.
Daniel Gruss
Michael Schwarz
Matthias Wübbeling
Simon Guggi
Timo Malderle
Stefan More
Moritz Lipp
2018
conf/ccs
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features.
Michael Schwarz
Daniel Gruss
Moritz Lipp
Clémentine Maurice
Thomas Schuster
Anders Fogh
Stefan Mangard
2018
conf/uss
Meltdown: Reading Kernel Memory from User Space.
Moritz Lipp
Michael Schwarz
Daniel Gruss
Thomas Prescher
Werner Haas
Anders Fogh
Jann Horn
Stefan Mangard
Paul Kocher
Daniel Genkin
Yuval Yarom
Mike Hamburg
2018
conf/sp
Another Flip in the Wall of Rowhammer Defenses.
Daniel Gruss
Moritz Lipp
Michael Schwarz
Daniel Genkin
Jonas Juffinger
Sioli O'Connell
Wolfgang Schoechl
Yuval Yarom
2018
conf/ndss
JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks.
Michael Schwarz
Moritz Lipp
Daniel Gruss
2018
conf/ndss
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks.
Michael Schwarz
Moritz Lipp
Daniel Gruss
Samuel Weiser
Clémentine Maurice
Raphael Spreitzer
Stefan Mangard
2017
conf/esorics
Practical Keystroke Timing Attacks in Sandboxed JavaScript.
Moritz Lipp
Daniel Gruss
Michael Schwarz
David Bidner
Clémentine Maurice
Stefan Mangard
2016
conf/ccs
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR.
Daniel Gruss
Clémentine Maurice
Anders Fogh
Moritz Lipp
Stefan Mangard
2016
conf/uss
ARMageddon: Cache Attacks on Mobile Devices.
Moritz Lipp
Daniel Gruss
Raphael Spreitzer
Clémentine Maurice
Stefan Mangard
Coauthors
Anders Fogh
(4)
Andreas Kogler
(5)
Arthur Perais
(1)
Benjamin von Berg
(1)
Berk Sunar
(3)
Catherine Easdon
(1)
Claudio Canella
(4)
Clémentine Maurice
(7)
Daniel Genkin
(5)
Daniel Gruss
(25)
Daniel Moghimi
(4)
Daniel Weber
(1)
David Bidner
(1)
David F. Oswald
(1)
Dmitry Evtyushkin
(1)
Eric Shiu
(1)
Erik Kraft
(1)
Florian Kargl
(1)
Frank Piessens
(3)
Jann Horn
(2)
Jo Van Bulck
(4)
Jon Masters
(1)
Jonas Juffinger
(3)
Julian Stecklina
(1)
Lukas Giner
(1)
Lukas Lamster
(2)
Lukas Raab
(1)
Maria Eichlseder
(1)
Marina Minkin
(2)
Martin Haubenwallner
(1)
Martin Schwarzl
(3)
Matthias Wübbeling
(1)
Mattias Nissler
(1)
Michael Schwarz
(21)
Mike Hamburg
(2)
Misiker Tadesse Aga
(1)
Moritz Lipp
(26)
Nicolas Boichat
(1)
Paul Kocher
(2)
Philipp Ortner
(1)
Pietro Borrello
(1)
Raphael Spreitzer
(2)
Robert Schilling
(1)
Salman Qazi
(1)
Samuel Weiser
(1)
Simon Guggi
(1)
Sioli O'Connell
(1)
Stefan Mangard
(7)
Stefan More
(1)
Thomas Prescher
(3)
Thomas Schuster
(1)
Timo Malderle
(1)
Vedad Hadzic
(1)
Werner Haas
(2)
Wolfgang Schoechl
(1)
Yoongu Kim
(1)
Yuval Yarom
(5)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to