Items where Author is "Gerlach, Lukas"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 8.

Conference or Workshop Item (A Paper)

Zhang, Ruiyi and Gerlach, Lukas and Weber, Daniel and Hetterich, Lorenz and Lü, Youheng and Kogler, Andreas and Schwarz, Michael
(2024) CacheWarp: Software-based Fault Injection using Selective State Reset.
In: USENIX Security.
Conference: USENIX-Security Usenix Security Symposium

Gerlach, Lukas and Schwarz, Simon and Faroß, Nicolas and Schwarz, Michael
(2024) Efficient and Generic Microarchitectural Hash-Function Recovery.
In: S&P.
Conference: SP IEEE Symposium on Security and Privacy

Weber, Daniel and Thomas, Fabian and Gerlach, Lukas and Zhang, Ruiyi and Schwarz, Michael
(2023) Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks.
In: ESORICS.
Conference: ESORICS European Symposium On Research In Computer Security

Weber, Daniel and Thomas, Fabian and Gerlach, Lukas and Zhang, Ruiyi and Schwarz, Michael
(2023) Reviving Meltdown 3a.
In: ESORICS.
Conference: ESORICS European Symposium On Research In Computer Security

Gerlach, Lukas and Thomas, Fabian and Pietsch, Robert and Schwarz, Michael
(2023) A Rowhammer Reproduction Study Using the Blacksmith Fuzzer.
In: ESORICS.
Conference: ESORICS European Symposium On Research In Computer Security

Kogler, Andreas and Juffinger, Jonas and Giner, Lukas and Gerlach, Lukas and Schwarzl, Martin and Schwarz, Michael and Gruss, Daniel and Mangard, Stefan
(2023) Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels.
In: USENIX Security Symposium.
Conference: USENIX-Security Usenix Security Symposium

Gerlach, Lukas and Weber, Daniel and Zhang, Ruiyi and Schwarz, Michael
(2023) A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs.
In: 44th IEEE Symposium on Security and Privacy.
Conference: SP IEEE Symposium on Security and Privacy

Thomas, Fabian and Gerlach, Lukas and Schwarz, Michael
(2023) Hammulator: Simulate Now - Exploit Later.
In: 3rd Workshop on DRAM Security.
Conference: UNSPECIFIED

This list was generated on Sun May 5 02:07:22 2024 CEST.