What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Andreas Kogler
Google Scholar
18
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
A Systematic Evaluation of Novel and Existing Cache Side Channels.
Fabian Rauscher
Carina Fiedler
Andreas Kogler
Daniel Gruss
2025
conf/ndss
Power-Related Side-Channel Attacks using the Android Sensor Framework.
Mathias Oberhuber
Martin Unterguggenberger
Lukas Maar
Andreas Kogler
Stefan Mangard
2024
conf/uss
CacheWarp: Software-based Fault Injection using Selective State Reset.
Ruiyi Zhang
Lukas Gerlach
Daniel Weber
Lorenz Hetterich
Youheng Lü
Andreas Kogler
Michael Schwarz
2024
conf/fc
Remote Scheduler Contention Attacks.
Stefan Gast
Jonas Juffinger
Lukas Maar
Christoph Royer
Andreas Kogler
Daniel Gruss
2024
conf/asiaccs
Generic and Automated Drive-by GPU Cache Attacks from the Browser.
Lukas Giner
Roland Czerny
Christoph Gruber
Fabian Rauscher
Andreas Kogler
Daniel De Almeida Braga
Daniel Gruss
2024
conf/ndss
IdleLeak: Exploiting Idle State Side Effects for Information Leakage.
Fabian Rauscher
Andreas Kogler
Jonas Juffinger
Daniel Gruss
2023
conf/uss
Side-Channel Attacks on Optane Persistent Memory.
Sihang Liu
Suraaj Kanniwadi
Martin Schwarzl
Andreas Kogler
Daniel Gruss
Samira Manabi Khan
2023
conf/uss
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels.
Andreas Kogler
Jonas Juffinger
Lukas Giner
Lukas Gerlach
Martin Schwarzl
Michael Schwarz
Daniel Gruss
Stefan Mangard
2023
conf/sp
SQUIP: Exploiting the Scheduler Queue Contention Side Channel.
Stefan Gast
Jonas Juffinger
Martin Schwarzl
Gururaj Saileshwar
Andreas Kogler
Simone Franza
Markus Köstl
Daniel Gruss
2023
conf/sp
CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer.
Jonas Juffinger
Lukas Lamster
Andreas Kogler
Maria Eichlseder
Moritz Lipp
Daniel Gruss
2023
conf/dsn
PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks.
Anish Saxena
Gururaj Saileshwar
Jonas Juffinger
Andreas Kogler
Daniel Gruss
Moinuddin K. Qureshi
2022
conf/uss
ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture.
Pietro Borrello
Andreas Kogler
Martin Schwarzl
Moritz Lipp
Daniel Gruss
Michael Schwarz
2022
conf/uss
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.
Lukas Giner
Andreas Kogler
Claudio Canella
Michael Schwarz
Daniel Gruss
2022
conf/uss
Half-Double: Hammering From the Next Row Over.
Andreas Kogler
Jonas Juffinger
Salman Qazi
Yoongu Kim
Moritz Lipp
Nicolas Boichat
Eric Shiu
Mattias Nissler
Daniel Gruss
2022
conf/uss
Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks.
Andreas Kogler
Daniel Gruss
Michael Schwarz
2022
conf/sp
Finding and Exploiting CPU Features using MSR Templating.
Andreas Kogler
Daniel Weber
Martin Haubenwallner
Moritz Lipp
Daniel Gruss
Michael Schwarz
2022
conf/esorics
Robust and Scalable Process Isolation Against Spectre in the Cloud.
Martin Schwarzl
Pietro Borrello
Andreas Kogler
Kenton Varda
Thomas Schuster
Michael Schwarz
Daniel Gruss
2021
conf/sp
PLATYPUS: Software-based Power Side-Channel Attacks on x86.
Moritz Lipp
Andreas Kogler
David F. Oswald
Michael Schwarz
Catherine Easdon
Claudio Canella
Daniel Gruss
Coauthors
Andreas Kogler
(18)
Anish Saxena
(1)
Carina Fiedler
(1)
Catherine Easdon
(1)
Christoph Gruber
(1)
Christoph Royer
(1)
Claudio Canella
(2)
Daniel De Almeida Braga
(1)
Daniel Gruss
(16)
Daniel Weber
(2)
David F. Oswald
(1)
Eric Shiu
(1)
Fabian Rauscher
(3)
Gururaj Saileshwar
(2)
Jonas Juffinger
(7)
Kenton Varda
(1)
Lorenz Hetterich
(1)
Lukas Gerlach
(2)
Lukas Giner
(3)
Lukas Lamster
(1)
Lukas Maar
(2)
Maria Eichlseder
(1)
Markus Köstl
(1)
Martin Haubenwallner
(1)
Martin Schwarzl
(5)
Martin Unterguggenberger
(1)
Mathias Oberhuber
(1)
Mattias Nissler
(1)
Michael Schwarz
(8)
Moinuddin K. Qureshi
(1)
Moritz Lipp
(5)
Nicolas Boichat
(1)
Pietro Borrello
(2)
Roland Czerny
(1)
Ruiyi Zhang
(1)
Salman Qazi
(1)
Samira Manabi Khan
(1)
Sihang Liu
(1)
Simone Franza
(1)
Stefan Gast
(2)
Stefan Mangard
(2)
Suraaj Kanniwadi
(1)
Thomas Schuster
(1)
Yoongu Kim
(1)
Youheng Lü
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to