Cache template attacks: automating attacks on inclusive last-level caches

Stefan Mangard , Raphael Spreitzer , Daniel Gruss
usenix security symposium 897 -912

221
2015
Strong and efficient cache side-channel protection using hardware transactional memory

Olga Ohrimenko , Daniel Gruss , Felix Schuster , Istvan Haller
usenix security symposium 217 -233

262
2017
Kernel Isolation: From an Academic Idea to an Efficient Patch for Every Computer.

Dave Hansen , Daniel Gruss , Brendan Gregg
;login: the USENIX Magazine 43 ( 4) 10 -14

5
2018
ZombieLoad: Cross-Privilege-Boundary Data Sampling

Daniel Gruss , Jo Van Bulck , Julian Stecklina , Michael Schwarz
arXiv: Cryptography and Security

367
2019
Flush+Flush: A Fast and Stealthy Cache Attack

Stefan Mangard , Daniel Gruss , Clémentine Maurice , Klaus Wagner
arXiv: Cryptography and Security

587
2015
Malware Guard Extension: Using SGX to Conceal Cache Attacks

Stefan Mangard , Daniel Gruss , Clémentine Maurice , Michael Schwarz
arXiv: Cryptography and Security

454
2017
ARMageddon: cache attacks on mobile devices

Stefan Mangard , Daniel Gruss , Raphael Spreitzer , Clémentine Maurice
usenix security symposium 549 -564

186
2016
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks

Stefan Mangard , Peter Pessl , Daniel Gruss , Clémentine Maurice
usenix security symposium 565 -581

395
2016
A Systematic Evaluation of Transient Execution Attacks and Defenses

Frank Piessens , Dmitry Evtyushkin , Daniel Gruss , Jo Van Bulck
usenix security symposium 249 -266

99
2019
SCATTERCACHE: thwarting cache attacks via cache set randomization

Thomas Unterluggauer , Stefan Mangard , Daniel Gruss , Michael Schwarz
usenix security symposium 675 -692

36
2019
Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86

Stefan Mangard , Daniel Gruss , Michael Schwarz , Samuel Weiser
usenix security symposium 1677 -1694

53
2020
Speculative Dereferencing: Reviving Foreshadow

Daniel Gruss , Thomas Schuster , Michael Schwarz , Martin Schwarzl
financial cryptography

2021
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation

Daniel Gruss , Michael Schwarz , Martin Schwarzl , Claudio Alberto Canella
financial cryptography

2021
PLATYPUS: Software-based Power Side-Channel Attacks on x86

Daniel Gruss , David Oswald , Michael Schwarz , Moritz Lipp
ieee symposium on security and privacy

7
2021
NetSpectre: Read Arbitrary Memory over Network

Michael Schwarz , Martin Schwarzl , Moritz Lipp , Jon Masters
european symposium on research in computer security 279 -299

202
2019
Practical Enclave Malware with Intel SGX

Michael Schwarz , Samuel Weiser , Daniel Gruss
international conference on detection of intrusions and malware, and vulnerability assessment 177 -196

34
2019
The Evolution of Transient-Execution Attacks

Claudio Canella , Khaled N. Khasawneh , Daniel Gruss
great lakes symposium on vlsi 163 -168

3
2020
Evolution of Defenses against Transient-Execution Attacks

Claudio Canella , Sai Manoj Pudukotai Dinakarrao , Daniel Gruss , Khaled N. Khasawneh
great lakes symposium on vlsi 169 -174

5
2020
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript

Daniel Gruss , Clémentine Maurice , Stefan Mangard
international conference on detection of intrusions and malware and vulnerability assessment 300 -321

403
2016
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR

Daniel Gruss , Clémentine Maurice , Anders Fogh , Moritz Lipp
computer and communications security 368 -379

98
2016