USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 15 results:
Filters: Author is Michael Schwarz [Clear All Filters]
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels. 32nd USENIX Security Symposium (USENIX Security 23). :7285--7302.
.
2023. (M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels. 32nd USENIX Security Symposium (USENIX Security 23). :7267--7284.
.
2023. AMD Prefetch Attacks through Power and Time. 31st USENIX Security Symposium (USENIX Security 22). :643--660.
.
2022. Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks. 31st USENIX Security Symposium (USENIX Security 22). :4147--4164.
.
2022. Rapid Prototyping for Microarchitectural Attacks. 31st USENIX Security Symposium (USENIX Security 22). :3861--3877.
.
2022. Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX. 31st USENIX Security Symposium (USENIX Security 22). :3111--3127.
.
2022. ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture. 31st USENIX Security Symposium (USENIX Security 22). :3917--3934.
.
2022. Osiris: Automated Discovery of Microarchitectural Side Channels. 30th USENIX Security Symposium (USENIX Security 21). :1415--1432.
.
2021. Donky: Domain Keys – Efficient In-Process Isolation for RISC-V and x86. 29th USENIX Security Symposium (USENIX Security 20). :1677--1694.
.
2020. Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis. 29th USENIX Security Symposium (USENIX Security 20). :1427--1444.
.
2020. ScatterCache: Thwarting Cache Attacks via Cache Set Randomization. 28th USENIX Security Symposium (USENIX Security 19). :675--692.
.
2019. SGXJail: Defeating Enclave Malware via Confinement. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :353--366.
.
2019. A Systematic Evaluation of Transient Execution Attacks and Defenses. 28th USENIX Security Symposium (USENIX Security 19). :249--266.
.
2019. Meltdown: Reading Kernel Memory from User Space. 27th USENIX Security Symposium (USENIX Security 18). :973--990.
.
2018. DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks. 25th USENIX Security Symposium (USENIX Security 16). :565--581.
.
2016.