USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 11 results:
Filters: Author is Stefan Mangard [Clear All Filters]
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels. 32nd USENIX Security Symposium (USENIX Security 23). :7285--7302.
.
2023. HashTag: Hash-based Integrity Protection for Tagged Architectures. 32nd USENIX Security Symposium (USENIX Security 23). :2797--2814.
.
2023. Jenny: Securing Syscalls for PKU-based Memory Isolation Systems. 31st USENIX Security Symposium (USENIX Security 22). :936--952.
.
2022. Coco: Co-Design and Co-Verification of Masked Software Implementations on CPUs. 30th USENIX Security Symposium (USENIX Security 21). :1469--1468.
.
2021. Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86. 29th USENIX Security Symposium (USENIX Security 20). :1677--1694.
.
2020. ScatterCache: Thwarting Cache Attacks via Cache Set Randomization. 28th USENIX Security Symposium (USENIX Security 19). :675--692.
.
2019. DATA – Differential Address Trace Analysis: Finding Address-based Side-Channels in Binaries. 27th USENIX Security Symposium (USENIX Security 18). :603--620.
.
2018. Meltdown: Reading Kernel Memory from User Space. 27th USENIX Security Symposium (USENIX Security 18). :973--990.
.
2018. ARMageddon: Cache Attacks on Mobile Devices. 25th USENIX Security Symposium (USENIX Security 16). :549--564.
.
2016. DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. 25th USENIX Security Symposium (USENIX Security 16). :565--581.
.
2016. Cache Template Attacks: Automating Attacks on Inclusive Last-Level Caches. 24th USENIX Security Symposium (USENIX Security 15). :897--912.
.
2015.