Search Results for author: Daniel Gruss

Found 5 papers, 5 papers with code

Page Cache Attacks

1 code implementation4 Jan 2019 Daniel Gruss, Erik Kraft, Trishita Tiwari, Michael Schwarz, Ari Trachtenberg, Jason Hennessey, Alex Ionescu, Anders Fogh

We present a new hardware-agnostic side-channel attack that targets one of the most fundamental software caches in modern computer systems: the operating system page cache.

Cryptography and Security

A Systematic Evaluation of Transient Execution Attacks and Defenses

2 code implementations13 Nov 2018 Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss

Our systematization does not only yield a complete picture of the attack surface, but also allows a systematic evaluation of defenses.

Cryptography and Security

NetSpectre: Read Arbitrary Memory over Network

2 code implementations27 Jul 2018 Michael Schwarz, Martin Schwarzl, Moritz Lipp, Daniel Gruss

Beyond retrofitting existing attacks to a network scenario, we also demonstrate the first Spectre attack which does not use a cache covert channel.

Cryptography and Security

Meltdown

2 code implementations3 Jan 2018 Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg

The security of computer systems fundamentally relies on memory isolation, e. g., kernel address ranges are marked as non-accessible and are protected from user access.

Cryptography and Security

Flush+Flush: A Fast and Stealthy Cache Attack

2 code implementations14 Nov 2015 Daniel Gruss, Clémentine Maurice, Klaus Wagner, Stefan Mangard

The Flush+Flush attack runs in a higher frequency and thus is faster than any existing cache attack.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.