Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Meltdown: Reading Kernel Memory from User Space., , , , , , , , , and 2 other author(s). USENIX Security Symposium, page 973-990. USENIX Association, (2018)Practical Memory Deduplication Attacks in Sandboxed Javascript., , and . ESORICS (1), volume 9326 of Lecture Notes in Computer Science, page 108-122. Springer, (2015)Wait a second: playing Hanabi without giving hints., and . FDG, page 14:1-14:7. ACM, (2019)Software-based Microarchitectural Attacks.. CoRR, (2017)JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits., , and . NDSS, The Internet Society, (2019)Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR., , , , and . ACM Conference on Computer and Communications Security, page 368-379. ACM, (2016)Fallout: Leaking Data on Meltdown-resistant CPUs., , , , , , , , , and 2 other author(s). CCS, page 769-784. ACM, (2019)Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches., , and . USENIX Security Symposium, page 897-912. USENIX Association, (2015)DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks., , , , and . USENIX Security Symposium, page 565-581. USENIX Association, (2016)Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript., , and . CoRR, (2015)