I’m a tenured faculty at the CISPA Helmholtz Center for Information Security in Saarbrücken, Germany, with a focus on microarchitectural side-channel attacks and system security. I obtained my PhD with the title "Software-based Side-Channel Attacks and Defenses in Restricted Environments" in 2019 from Graz University of Technology (advised by Daniel Gruss).
CV
Faculty
CISPA Helmholtz Center for Information Security
2020 – current
Postdoctoral researcher
Graz University of Technology
2019 – 2020
PhD
Graz University of Technology
2016 – 2019
Publications
2026
InstrSem: Automatically and Generically Inferring Semantics of (Undocumented) CPU Instructions
USENIX Security
Baltimore, Maryland, USA, August 12-14, 2026
SNPeek: Side-Channel Analysis for Privacy Applications on Confidential VMs
Ruiyi Zhang,
Albert Cheu,
Adria Gascon,
Daniel Moghimi,
Phillipp Schoppmann, Michael Schwarz,
Octavian Suciu
NDSS
San Diego, CA, USA, February 23-27, 2026
Zero-Store Elimination and its Implications on the SIKE Cryptosystem
Lukas Gerlach,
Niklas Flentje, Michael Schwarz
uASC
Leuven, Belgium, February 3, 2026
2025
ExfilState: Automated Discovery of Timer-Free Cache Side Channels on ARM CPUs
Fabian Thomas,
Michael Torres,
Daniel Moghimi, Michael Schwarz
CCS
Taipei, Taiwan, October 13-17, 2025
RISCover: Automatic Discovery of User-exploitable Architectural Security Vulnerabilities in Closed-Source RISC-V CPUs
Fabian Thomas,
Eric García Arribas, Lorenz Hetterich, Daniel Weber, Lukas Gerlach, Ruiyi Zhang, Michael Schwarz
CCS
Taipei, Taiwan, October 13-17, 2025
Styled to Steal: The Overlooked Attack Surface in Email Clients
CCS
Taipei, Taiwan, October 13-17, 2025
Confusing Value with Enumeration: Studying the Use of CVEs in Academia
Moritz Schloegel,
Daniel Klischies,
Simon Koch,
David Klein, Lukas Gerlach,
Malte Wessels, Leon Trampert,
Martin Johns,
Mathy Vanhoef, Michael Schwarz,
Thorsten Holz,
Jo Van Bulck
USENIX Security
Seattle, Washington, USA, August 13-15, 2025
SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution
USENIX Security
Seattle, Washington, USA, August 13-15, 2025
Taming the Linux Memory Allocator for Rapid Prototyping
DIMVA
Graz University of Technology, Austria, July 9-11, 2025
Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage
Mikka Rainer, Lorenz Hetterich, Fabian Thomas, Tristan Hornetz, Leon Trampert, Lukas Gerlach, Michael Schwarz
S&P
San Francisco, California, USA, May 12-15, 2025
Do Compilers Break Constant-time Guarantees?
Lukas Gerlach,
Robert Pietsch, Michael Schwarz
FC
Miyakojima, Japan, April 14-18, 2025
Lixom: Protecting Encryption Keys with Execute-Only Memory
FC
Miyakojima, Japan, April 14-18, 2025
Peripheral Instinct: How External Devices Breach Browser Sandboxes
WWW
Sydney, Australia, April 8 - May 2, 2025
ShadowLoad: Injecting State into Hardware Prefetchers
Lorenz Hetterich, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang,
Nils Bernsdorf, Eduard Ebert, Michael Schwarz
ASPLOS
Rotterdam, Netherlands, March 30 - April 13, 2025
Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting
NDSS
San Diego, California, USA, February 23-28, 2025
PortPrint: Identifying Inaccessible Code with Port Contention
uASC
Bochum, Germany, February 19, 2025
Hidden in Plain Sight: Scriptless Microarchitectural Attacks via TrueType Font Hinting
uASC
Bochum, Germany, February 19, 2025
2024
No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks
ACSAC
Waikiki, Hawaii, USA, December 9-13, 2024
CacheWarp: Software-based Fault Injection using Selective State Reset
Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich,
Youheng Lü,
Andreas Kogler, Michael Schwarz
USENIX Security
Philadelphia, PA, USA, August 14-16, 2024
Switchpoline: A Software Mitigation for Spectre-BTB and Spectre-BHB on ARMv8
Markus Bauer, Lorenz Hetterich,
Christian Rossow, Michael Schwarz
ASIACCS
Singapore, July 1-5, 2024
Efficient and Generic Microarchitectural Hash-Function Recovery
Lukas Gerlach,
Simon Schwarz,
Nicolas Faroß, Michael Schwarz
S&P
San Francisco, California, USA, May 20-23, 2024
2023
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers
Till Schlüter,
Amit Choudhari, Lorenz Hetterich, Leon Trampert,
Hamed Nemati,
Ahmad Ibrahim, Michael Schwarz,
Christian Rossow,
Nils Ole Tippenhauer
CCS
Copenhagen, Denmark, November 26-30, 2023
A Rowhammer Reproduction Study Using the Blacksmith Fuzzer
ESORICS
The Hague, The Netherlands, September 25-29, 2023
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks
ESORICS
The Hague, The Netherlands, September 25-29, 2023
Reviving Meltdown 3a
ESORICS
The Hague, The Netherlands, September 25-29, 2023
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels
Andreas Kogler,
Jonas Juffinger,
Lukas Giner, Lukas Gerlach,
Martin Schwarzl, Michael Schwarz,
Daniel Gruss,
Stefan Mangard
USENIX Security
Anaheim, California, USA, August 9-11, 2023
(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels
USENIX Security
Anaheim, California, USA, August 9-11, 2023
Hammulator: Simulate Now - Exploit Later
DRAMSec
Virtual, June 17, 2023
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode
Pietro Borrello,
Catherine Easdon,
Martin Schwarzl,
Roland Czerny, Michael Schwarz
WOOT
San Francisco, California, USA, May 25, 2023
A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs
S&P
San Francisco, California, USA, May 22-25, 2023
Practical Timing Side-Channel Attacks on Memory Compression
Martin Schwarzl,
Pietro Borrello,
Gururaj Saileshwar,
Hanna Müller, Michael Schwarz,
Daniel Gruss
S&P
San Francisco, California, USA, May 22-25, 2023
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors
Dhiman Chakraborty, Michael Schwarz,
Sven Bugiel
FC
Bol, Brač, Croatia, May 1-5, 2023
2022
HyperDbg: Reinventing Hardware-Assisted Debugging
Mohammad Sina Karvandi,
MohammadHossein Gholamrezaei,
Saleh Khalaj Monfared,
Soroush Meghdadizanjani,
Behrooz Abbassi,
Ali Amini,
Reza Mortazavi,
Saeid Gorgin,
Dara Rahmati, Michael Schwarz
CCS
Los Angeles, California, USA, November 7-11, 2022
CPU Port Contention Without SMT
Thomas Rokicki,
Clémentine Maurice, Michael Schwarz
ESORICS
Copenhagen, Denmark, September 26-30, 2022
Robust and Scalable Process Isolation against Spectre in the Cloud
Martin Schwarzl,
Pietro Borrello,
Andreas Kogler,
Kenton Varda,
Thomas Schuster, Michael Schwarz,
Daniel Gruss
ESORICS
Copenhagen, Denmark, September 26-30, 2022
Browser-based CPU Fingerprinting
Leon Trampert,
Christian Rossow, Michael Schwarz
ESORICS
Copenhagen, Denmark, September 26-30, 2022
ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture
Pietro Borrello,
Andreas Kogler,
Martin Schwarzl,
Moritz Lipp,
Daniel Gruss, Michael Schwarz
USENIX Security
Boston, Massachusetts, USA, August 10-12, 2022
Rapid Prototyping for Microarchitectural Attacks
Catherine Easdon, Michael Schwarz,
Martin Schwarzl,
Daniel Gruss
USENIX Security
Boston, Massachusetts, USA, August 10-12, 2022
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX
Lukas Giner,
Andreas Kogler,
Claudio Canella, Michael Schwarz,
Daniel Gruss
USENIX Security
Boston, Massachusetts, USA, August 10-12, 2022
Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks
Andreas Kogler,
Daniel Gruss, Michael Schwarz
USENIX Security
Boston, Massachusetts, USA, August 10-12, 2022
AMD Prefetch Attacks through Power and Time
Moritz Lipp,
Daniel Gruss, Michael Schwarz
USENIX Security
Boston, Massachusetts, USA, August 10-12, 2022
Branch Different - Spectre Attacks on Apple Silicon
DIMVA
Cagliari, Italy, June 29 - July 1, 2022
Finding and Exploiting CPU Features using MSR Templating
Andreas Kogler, Daniel Weber,
Martin Haubenwallner,
Moritz Lipp,
Daniel Gruss, Michael Schwarz
S&P
San Francisco, California, USA, May 23-26, 2022
2021
Automating Seccomp Filter Generation for Linux Applications
Claudio Canella,
Mario Werner,
Daniel Gruss, Michael Schwarz
CCSW
Virtual, November 14, 2021
Osiris: Automated Discovery of Microarchitectural Side Channels
Daniel Weber,
Ahmad Ibrahim,
Hamed Nemati, Michael Schwarz,
Christian Rossow
USENIX Security
Virtual, August 11-13, 2021
PLATYPUS: Software-based Power Side-Channel Attacks on x86
Moritz Lipp,
Andreas Kogler,
David Oswald, Michael Schwarz,
Catherine Easdon,
Claudio Canella,
Daniel Gruss
S&P
Virtual, May 23-27, 2021
Speculative Dereferencing of Registers: Reviving Foreshadow
Martin Schwarzl,
Thomas Schuster, Michael Schwarz,
Daniel Gruss
FC
Virtual, March 1-5, 2021
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
Martin Schwarzl,
Claudio Canella,
Daniel Gruss, Michael Schwarz
FC
Virtual, March 1-5, 2021
BibTeX Citation
@misc{hetterich2026instrsem,
title={InstrSem: Automatically and Generically Inferring Semantics of (Undocumented) CPU Instructions},
howpublished={USENIX Security},
author={Lorenz Hetterich and Fabian Thomas and Tristan Hornetz and Michael Schwarz},
year={2026}
}BibTeX Citation
@misc{zhang2026snpeek,
title={SNPeek: Side-Channel Analysis for Privacy Applications on Confidential VMs},
howpublished={NDSS},
author={Ruiyi Zhang and Albert Cheu and Adria Gascon and Daniel Moghimi and Phillipp Schoppmann and Michael Schwarz and Octavian Suciu},
year={2026}
}BibTeX Citation
@misc{gerlach2026zerostore,
title={Zero-Store Elimination and its Implications on the SIKE Cryptosystem},
howpublished={uASC},
author={Lukas Gerlach and Niklas Flentje and Michael Schwarz},
year={2026}
}BibTeX Citation
@misc{thomas2025exfilstate,
title={ExfilState: Automated Discovery of Timer-Free Cache Side Channels on ARM CPUs},
howpublished={CCS},
author={Fabian Thomas and Michael Torres and Daniel Moghimi and Michael Schwarz},
year={2025}
}BibTeX Citation
@misc{thomas2025riscover,
title={RISCover: Automatic Discovery of User-exploitable Architectural Security Vulnerabilities in Closed-Source RISC-V CPUs},
howpublished={CCS},
author={Fabian Thomas and Eric García Arribas and Lorenz Hetterich and Daniel Weber and Lukas Gerlach and Ruiyi Zhang and Michael Schwarz},
year={2025}
}BibTeX Citation
@misc{trampert2025styled,
title={Styled to Steal: The Overlooked Attack Surface in Email Clients},
howpublished={CCS},
author={Leon Trampert and Daniel Weber and Christian Rossow and Michael Schwarz},
year={2025}
}BibTeX Citation
@misc{schloegel2025cve,
title={Confusing Value with Enumeration: Studying the Use of CVEs in Academia},
howpublished={USENIX Security},
author={Moritz Schloegel and Daniel Klischies and Simon Koch and David Klein and Lukas Gerlach and Malte Wessels and Leon Trampert and Martin Johns and Mathy Vanhoef and Michael Schwarz and Thorsten Holz and Jo Van Bulck},
year={2025}
}BibTeX Citation
@misc{weber2025scase,
title={SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution},
howpublished={USENIX Security},
author={Daniel Weber and Lukas Gerlach and Leon Trampert and Youheng Lue and Jo Van Bulck and Michael Schwarz},
year={2025}
}BibTeX Citation
@misc{zhang2025mapalloc,
title={Taming the Linux Memory Allocator for Rapid Prototyping},
howpublished={DIMVA},
author={Ruiyi Zhang and Tristan Hornetz and Lukas Gerlach and Michael Schwarz},
year={2025}
}BibTeX Citation
@misc{rainer2025rapid,
title={Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage},
howpublished={S\&P},
author={Mikka Rainer and Lorenz Hetterich and Fabian Thomas and Tristan Hornetz and Leon Trampert and Lukas Gerlach and Michael Schwarz},
year={2025}
}BibTeX Citation
@misc{gerlach2025compiler,
title={Do Compilers Break Constant-time Guarantees?},
howpublished={FC},
author={Lukas Gerlach and Robert Pietsch and Michael Schwarz},
year={2025}
}BibTeX Citation
@misc{hornetz2025lixom,
title={Lixom: Protecting Encryption Keys with Execute-Only Memory},
howpublished={FC},
author={Tristan Hornetz and Lukas Gerlach and Michael Schwarz},
year={2025}
}BibTeX Citation
@misc{trampert2025peripheralinstinct,
title={Peripheral Instinct: How External Devices Breach Browser Sandboxes},
howpublished={WWW},
author={Leon Trampert and Lorenz Hetterich and Lukas Gerlach and Mona Schappert and Christian Rossow and Michael Schwarz},
year={2025}
}BibTeX Citation
@misc{hetterich2025shadowload,
title={ShadowLoad: Injecting State into Hardware Prefetchers},
howpublished={ASPLOS},
author={Lorenz Hetterich and Fabian Thomas and Lukas Gerlach and Ruiyi Zhang and Nils Bernsdorf and Eduard Ebert and Michael Schwarz},
year={2025}
}BibTeX Citation
@misc{trampert2025cascadingspysheets,
title={Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting},
howpublished={NDSS},
author={Leon Trampert and Daniel Weber and Lukas Gerlach and Christian Rossow and Michael Schwarz},
year={2025}
}BibTeX Citation
@misc{hornetz2025portprint,
title={PortPrint: Identifying Inaccessible Code with Port Contention},
howpublished={uASC},
author={Tristan Hornetz and Michael Schwarz},
year={2025}
}BibTeX Citation
@misc{trampert2025hiddenplainsight,
title={Hidden in Plain Sight: Scriptless Microarchitectural Attacks via TrueType Font Hinting},
howpublished={uASC},
author={Leon Trampert and Michael Schwarz},
year={2025}
}BibTeX Citation
@misc{weber2024irqguard,
title={No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks},
howpublished={ACSAC},
author={Daniel Weber and Leonard Niemann and Lukas Gerlach and Jan Reineke and Michael Schwarz},
year={2024}
}BibTeX Citation
@misc{zhang2024cachewarp,
title={CacheWarp: Software-based Fault Injection using Selective State Reset},
howpublished={USENIX Security},
author={Ruiyi Zhang and Lukas Gerlach and Daniel Weber and Lorenz Hetterich and Youheng Lü and Andreas Kogler and Michael Schwarz},
year={2024}
}BibTeX Citation
@misc{bauer2024switchpoline,
title={Switchpoline: A Software Mitigation for Spectre-BTB and Spectre-BHB on ARMv8},
howpublished={ASIACCS},
author={Markus Bauer and Lorenz Hetterich and Christian Rossow and Michael Schwarz},
year={2024}
}BibTeX Citation
@misc{gerlach2024hash,
title={Efficient and Generic Microarchitectural Hash-Function Recovery},
howpublished={S\&P},
author={Lukas Gerlach and Simon Schwarz and Nicolas Faroß and Michael Schwarz},
year={2024}
}BibTeX Citation
@misc{schlueter2023fetchbench,
title={FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers},
howpublished={CCS},
author={Till Schlüter and Amit Choudhari and Lorenz Hetterich and Leon Trampert and Hamed Nemati and Ahmad Ibrahim and Michael Schwarz and Christian Rossow and Nils Ole Tippenhauer},
year={2023}
}BibTeX Citation
@misc{gerlach2023blacksmithrepro,
title={A Rowhammer Reproduction Study Using the Blacksmith Fuzzer},
howpublished={ESORICS},
author={Lukas Gerlach and Fabian Thomas and Robert Pietsch and Michael Schwarz},
year={2023}
}BibTeX Citation
@misc{weber2023masc,
title={Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks},
howpublished={ESORICS},
author={Daniel Weber and Fabian Thomas and Lukas Gerlach and Ruiyi Zhang and Michael Schwarz},
year={2023}
}BibTeX Citation
@misc{weber2023meltdown3a,
title={Reviving Meltdown 3a},
howpublished={ESORICS},
author={Daniel Weber and Fabian Thomas and Lukas Gerlach and Ruiyi Zhang and Michael Schwarz},
year={2023}
}BibTeX Citation
@misc{kogler2023collidepower,
title={Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels},
howpublished={USENIX Security},
author={Andreas Kogler and Jonas Juffinger and Lukas Giner and Lukas Gerlach and Martin Schwarzl and Michael Schwarz and Daniel Gruss and Stefan Mangard},
year={2023}
}BibTeX Citation
@misc{zhang2023mwait,
title={(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels},
howpublished={USENIX Security},
author={Ruiyi Zhang and Taehyun Kim and Daniel Weber and Michael Schwarz},
year={2023}
}BibTeX Citation
@misc{thomas2023hammulator,
title={Hammulator: Simulate Now - Exploit Later},
howpublished={DRAMSec},
author={Fabian Thomas and Lukas Gerlach and Michael Schwarz},
year={2023}
}BibTeX Citation
@misc{borrello2023cpu,
title={CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode},
howpublished={WOOT},
author={Pietro Borrello and Catherine Easdon and Martin Schwarzl and Roland Czerny and Michael Schwarz},
year={2023}
}BibTeX Citation
@misc{gerlach2023riscv,
title={A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs},
howpublished={S\&P},
author={Lukas Gerlach and Daniel Weber and Ruiyi Zhang and Michael Schwarz},
year={2023}
}BibTeX Citation
@misc{schwarzl2023compression,
title={Practical Timing Side-Channel Attacks on Memory Compression},
howpublished={S\&P},
author={Martin Schwarzl and Pietro Borrello and Gururaj Saileshwar and Hanna Müller and Michael Schwarz and Daniel Gruss},
year={2023}
}BibTeX Citation
@misc{chakraborty2023talus,
title={TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors},
howpublished={FC},
author={Dhiman Chakraborty and Michael Schwarz and Sven Bugiel},
year={2023}
}BibTeX Citation
@misc{karvandi2022hyperdbg,
title={HyperDbg: Reinventing Hardware-Assisted Debugging},
howpublished={CCS},
author={Mohammad Sina Karvandi and MohammadHossein Gholamrezaei and Saleh Khalaj Monfared and Soroush Meghdadizanjani and Behrooz Abbassi and Ali Amini and Reza Mortazavi and Saeid Gorgin and Dara Rahmati and Michael Schwarz},
year={2022}
}BibTeX Citation
@misc{rokicki2022portcontention,
title={CPU Port Contention Without SMT},
howpublished={ESORICS},
author={Thomas Rokicki and Clémentine Maurice and Michael Schwarz},
year={2022}
}BibTeX Citation
@misc{schwarzl2022dpi,
title={Robust and Scalable Process Isolation against Spectre in the Cloud},
howpublished={ESORICS},
author={Martin Schwarzl and Pietro Borrello and Andreas Kogler and Kenton Varda and Thomas Schuster and Michael Schwarz and Daniel Gruss},
year={2022}
}BibTeX Citation
@misc{trampert2022uarchfp,
title={Browser-based CPU Fingerprinting},
howpublished={ESORICS},
author={Leon Trampert and Christian Rossow and Michael Schwarz},
year={2022}
}BibTeX Citation
@misc{borrello2022aepicleak,
title={ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture},
howpublished={USENIX Security},
author={Pietro Borrello and Andreas Kogler and Martin Schwarzl and Moritz Lipp and Daniel Gruss and Michael Schwarz},
year={2022}
}BibTeX Citation
@misc{easdon2022rapid,
title={Rapid Prototyping for Microarchitectural Attacks},
howpublished={USENIX Security},
author={Catherine Easdon and Michael Schwarz and Martin Schwarzl and Daniel Gruss},
year={2022}
}BibTeX Citation
@misc{giner2022lvi,
title={Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX},
howpublished={USENIX Security},
author={Lukas Giner and Andreas Kogler and Claudio Canella and Michael Schwarz and Daniel Gruss},
year={2022}
}BibTeX Citation
@misc{kogler2022minefield,
title={Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks},
howpublished={USENIX Security},
author={Andreas Kogler and Daniel Gruss and Michael Schwarz},
year={2022}
}BibTeX Citation
@misc{lipp2022amd,
title={AMD Prefetch Attacks through Power and Time},
howpublished={USENIX Security},
author={Moritz Lipp and Daniel Gruss and Michael Schwarz},
year={2022}
}BibTeX Citation
@misc{hetterich2022applespectre,
title={Branch Different - Spectre Attacks on Apple Silicon},
howpublished={DIMVA},
author={Lorenz Hetterich and Michael Schwarz},
year={2022}
}BibTeX Citation
@misc{kogler2022msrtemplate,
title={Finding and Exploiting CPU Features using MSR Templating},
howpublished={S\&P},
author={Andreas Kogler and Daniel Weber and Martin Haubenwallner and Moritz Lipp and Daniel Gruss and Michael Schwarz},
year={2022}
}BibTeX Citation
@misc{canella2021chestnut,
title={Automating Seccomp Filter Generation for Linux Applications},
howpublished={CCSW},
author={Claudio Canella and Mario Werner and Daniel Gruss and Michael Schwarz},
year={2021}
}BibTeX Citation
@misc{weber2021osiris,
title={Osiris: Automated Discovery of Microarchitectural Side Channels},
howpublished={USENIX Security},
author={Daniel Weber and Ahmad Ibrahim and Hamed Nemati and Michael Schwarz and Christian Rossow},
year={2021}
}BibTeX Citation
@misc{lipp2021platypus,
title={PLATYPUS: Software-based Power Side-Channel Attacks on x86},
howpublished={S\&P},
author={Moritz Lipp and Andreas Kogler and David Oswald and Michael Schwarz and Catherine Easdon and Claudio Canella and Daniel Gruss},
year={2021}
}BibTeX Citation
@misc{schwarzl2021specderef,
title={Speculative Dereferencing of Registers: Reviving Foreshadow},
howpublished={FC},
author={Martin Schwarzl and Thomas Schuster and Michael Schwarz and Daniel Gruss},
year={2021}
}BibTeX Citation
@misc{schwarzl2021specfuscator,
title={Specfuscator: Evaluating Branch Removal as a Spectre Mitigation},
howpublished={FC},
author={Martin Schwarzl and Claudio Canella and Daniel Gruss and Michael Schwarz},
year={2021}
}Talks
2026
Cascading Spy Sheets: The Privacy & Security Implications of CSS in Emails
FOSDEM
Brussels, Belgium, January 31, 2026
2025
CPU Security Myths: Busted, Roasted, and Repeated Anyway
Qualcomm Innovation Fellowship
Virtual, June 3, 2025
2024
Leaky Processors: When the Laws of Nature Reveal Secrets
Forschung in Natur- und Ingenieurwissenschaften
Saarland University, July 15, 2024
2023
(In)visible Bugs - From Transient Execution to Architectural CPU Vulnerabilities
AsianHOST
Tianjin, China, December 15, 2023
A Security RISC? The State of Microarchitectural Attacks on RISC-V
Black Hat Europe
London, United Kingdom, December 7, 2023
Beyond the Noise: Automated Discovery of Microarchitectural Security Leaks
CISPA Summer School
Saarbruecken, Germany, August 23, 2023
CPU Fuzzing: Automatic Discovery of Microarchitectural Attacks
RuhrSec
Bochum, Germany, May 11-12, 2023
Sichere die digitale Zukunft! - Smart Home und Passwortsicherheit
Otto-Hahn-Gymnasium
Saarbruecken, Germany, March 1, 2023
Transient Execution Attacks
Moritz Lipp, Michael Schwarz,
Daniel Gruss
IT-Defense
Mainz, Germany, February 9, 2023
2022
Bug-Free Software but Insecure Systems?
Airbus & CISPA Day
Saarbrücken, Germany, November 30, 2022
From Random Timings to Data Leakage
Mathematics Preparatory Course UdS
Saarbrücken, Germany, October 13, 2022
Sicherheit von Prozessoren
Tag der offenen Tür | Universität des Saarlandes
Saarbruecken, Germany, May 21, 2022
CPU Fuzzing for Discovering Hardware-caused Information Leakage
hardwear.io
Virtual, January 11, 2022
2021
Learning Security through Gamified Challenges
Best-Practice E-Learning an der UdS
Virtual, November 17, 2021
Unsichere Systeme trotz fehlerfreier Software? Wie Hardware die Sicherheit von Software untergräbt
Regionaltagung des Senior Experten Service
IHK Saarland, October 21, 2021
Seitenkanal-Angriffe: Wie Seiteneffekte Geheimnisse Verraten
CISPA Roadshow
Virtual Event, September 18, 2021
Pubquiz rund um Informatik und Cybersicherheit
Digitaltag
Virtual Event, June 18, 2021
Enter Sandbox
Claudio Canella,
Mario Werner, Michael Schwarz
Black Hat Asia
Virtual Event, May 6-7, 2021
BibTeX Citation
@misc{trampert2025spysheets,
title={Cascading Spy Sheets: The Privacy & Security Implications of CSS in Emails},
howpublished={FOSDEM},
author={Leon Trampert and Daniel Weber and Michael Schwarz},
year={2026}
}BibTeX Citation
@misc{schwarz2025cpu,
title={CPU Security Myths: Busted, Roasted, and Repeated Anyway},
howpublished={Qualcomm Innovation Fellowship},
author={Michael Schwarz},
year={2025}
}BibTeX Citation
@misc{schwarz2024wie,
title={Wie man unsichere Webseiten erkennt und sich schützt},
howpublished={Saar-Security},
author={Michael Schwarz},
year={2024}
}BibTeX Citation
@misc{schwarz2024leaky,
title={Leaky Processors: When the Laws of Nature Reveal Secrets},
howpublished={Forschung in Natur- und Ingenieurwissenschaften},
author={Michael Schwarz},
year={2024}
}BibTeX Citation
@misc{schwarz2023visible,
title={(In)visible Bugs - From Transient Execution to Architectural CPU Vulnerabilities},
howpublished={AsianHOST},
author={Michael Schwarz},
year={2023}
}BibTeX Citation
@misc{schwarz2023great,
title={With Great Power Comes Great Potential},
howpublished={Tsinghua University},
author={Michael Schwarz},
year={2023}
}BibTeX Citation
@misc{gerlach2023security,
title={A Security RISC? The State of Microarchitectural Attacks on RISC-V},
howpublished={Black Hat Europe},
author={Lukas Gerlach and Daniel Weber and Michael Schwarz},
year={2023}
}BibTeX Citation
@misc{schwarz2023keine,
title={Keine Frage des ob, sondern des wann...},
howpublished={Cyber Security Tag},
author={Michael Schwarz},
year={2023}
}BibTeX Citation
@misc{schwarz2023unsichere,
title={Unsichere Webseiten Erkennen},
howpublished={CISPA <3 IGB},
author={Michael Schwarz},
year={2023}
}BibTeX Citation
@misc{schwarz2023beyond,
title={Beyond the Noise: Automated Discovery of Microarchitectural Security Leaks},
howpublished={CISPA Summer School},
author={Michael Schwarz},
year={2023}
}BibTeX Citation
@misc{weber2023cpu,
title={CPU Fuzzing: Automatic Discovery of Microarchitectural Attacks},
howpublished={RuhrSec},
author={Daniel Weber and Michael Schwarz},
year={2023}
}BibTeX Citation
@misc{schwarz2023sichere,
title={Sichere die digitale Zukunft! - Smart Home und Passwortsicherheit},
howpublished={Otto-Hahn-Gymnasium},
author={Michael Schwarz},
year={2023}
}BibTeX Citation
@misc{lipp2023transient,
title={Transient Execution Attacks},
howpublished={IT-Defense},
author={Moritz Lipp and Michael Schwarz and Daniel Gruss},
year={2023}
}BibTeX Citation
@misc{schwarz2022bug,
title={Bug-Free Software but Insecure Systems?},
howpublished={Airbus \& CISPA Day},
author={Michael Schwarz},
year={2022}
}BibTeX Citation
@misc{schwarz2022automated,
title={Automated CPU-vulnerability Discovery},
howpublished={EC Visit CISPA},
author={Michael Schwarz},
year={2022}
}BibTeX Citation
@misc{schwarz2022random,
title={From Random Timings to Data Leakage},
howpublished={Mathematics Preparatory Course UdS},
author={Michael Schwarz},
year={2022}
}BibTeX Citation
@misc{schwarz2022sicherheit,
title={Sicherheit von Prozessoren},
howpublished={Tag der offenen Tür | Universität des Saarlandes},
author={Michael Schwarz},
year={2022}
}BibTeX Citation
@misc{schwarz2022cpu,
title={CPU Fuzzing for Discovering Hardware-caused Information Leakage},
howpublished={hardwear.io},
author={Michael Schwarz},
year={2022}
}BibTeX Citation
@misc{schwarz2021learning,
title={Learning Security through Gamified Challenges},
howpublished={Best-Practice E-Learning an der UdS},
author={Michael Schwarz},
year={2021}
}BibTeX Citation
@misc{schwarz2021unsichere,
title={Unsichere Systeme trotz fehlerfreier Software? Wie Hardware die Sicherheit von Software untergräbt},
howpublished={Regionaltagung des Senior Experten Service},
author={Michael Schwarz},
year={2021}
}BibTeX Citation
@misc{schwarz2021seitenkanal,
title={Seitenkanal-Angriffe: Wie Seiteneffekte Geheimnisse Verraten},
howpublished={CISPA Roadshow},
author={Michael Schwarz},
year={2021}
}BibTeX Citation
@misc{schwarz2021pubquiz,
title={Pubquiz rund um Informatik und Cybersicherheit},
howpublished={Digitaltag},
author={Michael Schwarz},
year={2021}
}BibTeX Citation
@misc{canella2021enter,
title={Enter Sandbox},
howpublished={Black Hat Asia},
author={Claudio Canella and Mario Werner and Michael Schwarz},
year={2021}
}Trainings
BibTeX Citation
@misc{schwarz2022turning,
title={Turning Timing Differences into Data Leakage},
howpublished={MIC-SEC},
author={Michael Schwarz and Daniel Weber},
year={2022}
}Awards
2025
Distinguished Artifact Award
ExfilState: Automated Discovery of Timer-Free Cache Side Channels on ARM CPUs
CCS
October 13, 2025
Distinguished Artifact Award
Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting
NDSS
February 23, 2025
2023
Best Paper Award
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode
WOOT
May 25, 2023
2022
Pwnie Award for Best Desktop Bug
ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture
Black Hat USA
August 10, 2022
