Publications
2026
StackWarp: Breaking AMD SEV-SNP Integrity via Deterministic Stack-Pointer Manipulation through the CPU’s Stack Engine
USENIX Security
Baltimore, MD, USA, August 12-14, 2026
InstrSem: Automatically and Generically Inferring Semantics of (Undocumented) CPU Instructions
USENIX Security
Baltimore, Maryland, USA, August 12-14, 2026
SNPeek: Side-Channel Analysis for Privacy Applications on Confidential VMs
Ruiyi Zhang,
Albert Cheu,
Adria Gascon,
Daniel Moghimi,
Phillipp Schoppmann, Michael Schwarz,
Octavian Suciu
NDSS
San Diego, CA, USA, February 23-27, 2026
Zero-Store Elimination and its Implications on the SIKE Cryptosystem
Lukas Gerlach,
Niklas Flentje, Michael Schwarz
uASC
Leuven, Belgium, February 3, 2026
2025
ExfilState: Automated Discovery of Timer-Free Cache Side Channels on ARM CPUs
Fabian Thomas,
Michael Torres,
Daniel Moghimi, Michael Schwarz
CCS
Taipei, Taiwan, October 13-17, 2025
RISCover: Automatic Discovery of User-exploitable Architectural Security Vulnerabilities in Closed-Source RISC-V CPUs
Fabian Thomas,
Eric García Arribas, Lorenz Hetterich, Daniel Weber, Lukas Gerlach, Ruiyi Zhang, Michael Schwarz
CCS
Taipei, Taiwan, October 13-17, 2025
Styled to Steal: The Overlooked Attack Surface in Email Clients
CCS
Taipei, Taiwan, October 13-17, 2025
Confusing Value with Enumeration: Studying the Use of CVEs in Academia
Moritz Schloegel,
Daniel Klischies,
Simon Koch,
David Klein, Lukas Gerlach,
Malte Wessels, Leon Trampert,
Martin Johns,
Mathy Vanhoef, Michael Schwarz,
Thorsten Holz,
Jo Van Bulck
USENIX Security
Seattle, Washington, USA, August 13-15, 2025
SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution
USENIX Security
Seattle, Washington, USA, August 13-15, 2025
Taming the Linux Memory Allocator for Rapid Prototyping
DIMVA
Graz University of Technology, Austria, July 9-11, 2025
Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage
Mikka Rainer, Lorenz Hetterich, Fabian Thomas, Tristan Hornetz, Leon Trampert, Lukas Gerlach, Michael Schwarz
S&P
San Francisco, California, USA, May 12-15, 2025
Do Compilers Break Constant-time Guarantees?
Lukas Gerlach,
Robert Pietsch, Michael Schwarz
FC
Miyakojima, Japan, April 14-18, 2025
Lixom: Protecting Encryption Keys with Execute-Only Memory
FC
Miyakojima, Japan, April 14-18, 2025
Peripheral Instinct: How External Devices Breach Browser Sandboxes
WWW
Sydney, Australia, April 8 - May 2, 2025
ShadowLoad: Injecting State into Hardware Prefetchers
Lorenz Hetterich, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang,
Nils Bernsdorf, Eduard Ebert, Michael Schwarz
ASPLOS
Rotterdam, Netherlands, March 30 - April 13, 2025
Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting
NDSS
San Diego, California, USA, February 23-28, 2025
PortPrint: Identifying Inaccessible Code with Port Contention
uASC
Bochum, Germany, February 19, 2025
Hidden in Plain Sight: Scriptless Microarchitectural Attacks via TrueType Font Hinting
uASC
Bochum, Germany, February 19, 2025
2024
No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks
ACSAC
Waikiki, Hawaii, USA, December 9-13, 2024
CacheWarp: Software-based Fault Injection using Selective State Reset
Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich,
Youheng Lü,
Andreas Kogler, Michael Schwarz
USENIX Security
Philadelphia, PA, USA, August 14-16, 2024
Switchpoline: A Software Mitigation for Spectre-BTB and Spectre-BHB on ARMv8
Markus Bauer, Lorenz Hetterich,
Christian Rossow, Michael Schwarz
ASIACCS
Singapore, July 1-5, 2024
Efficient and Generic Microarchitectural Hash-Function Recovery
Lukas Gerlach,
Simon Schwarz,
Nicolas Faroß, Michael Schwarz
S&P
San Francisco, California, USA, May 20-23, 2024
2023
FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers
Till Schlüter,
Amit Choudhari, Lorenz Hetterich, Leon Trampert,
Hamed Nemati,
Ahmad Ibrahim, Michael Schwarz,
Christian Rossow,
Nils Ole Tippenhauer
CCS
Copenhagen, Denmark, November 26-30, 2023
Honey, I Cached our Security Tokens - Re-usage of Security Tokens in the Wild
Leon Trampert,
Ben Stock,
Sebastian Roth
RAID
Hong Kong, October 16-18, 2023
A Rowhammer Reproduction Study Using the Blacksmith Fuzzer
ESORICS
The Hague, The Netherlands, September 25-29, 2023
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks
ESORICS
The Hague, The Netherlands, September 25-29, 2023
Reviving Meltdown 3a
ESORICS
The Hague, The Netherlands, September 25-29, 2023
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels
Andreas Kogler,
Jonas Juffinger,
Lukas Giner, Lukas Gerlach,
Martin Schwarzl, Michael Schwarz,
Daniel Gruss,
Stefan Mangard
USENIX Security
Anaheim, California, USA, August 9-11, 2023
(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels
USENIX Security
Anaheim, California, USA, August 9-11, 2023
Hammulator: Simulate Now - Exploit Later
DRAMSec
Virtual, June 17, 2023
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode
Pietro Borrello,
Catherine Easdon,
Martin Schwarzl,
Roland Czerny, Michael Schwarz
WOOT
San Francisco, California, USA, May 25, 2023
A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs
S&P
San Francisco, California, USA, May 22-25, 2023
Practical Timing Side-Channel Attacks on Memory Compression
Martin Schwarzl,
Pietro Borrello,
Gururaj Saileshwar,
Hanna Müller, Michael Schwarz,
Daniel Gruss
S&P
San Francisco, California, USA, May 22-25, 2023
TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors
Dhiman Chakraborty, Michael Schwarz,
Sven Bugiel
FC
Bol, Brač, Croatia, May 1-5, 2023
2022
HyperDbg: Reinventing Hardware-Assisted Debugging
Mohammad Sina Karvandi,
MohammadHossein Gholamrezaei,
Saleh Khalaj Monfared,
Soroush Meghdadizanjani,
Behrooz Abbassi,
Ali Amini,
Reza Mortazavi,
Saeid Gorgin,
Dara Rahmati, Michael Schwarz
CCS
Los Angeles, California, USA, November 7-11, 2022
CPU Port Contention Without SMT
Thomas Rokicki,
Clémentine Maurice, Michael Schwarz
ESORICS
Copenhagen, Denmark, September 26-30, 2022
Robust and Scalable Process Isolation against Spectre in the Cloud
Martin Schwarzl,
Pietro Borrello,
Andreas Kogler,
Kenton Varda,
Thomas Schuster, Michael Schwarz,
Daniel Gruss
ESORICS
Copenhagen, Denmark, September 26-30, 2022
Browser-based CPU Fingerprinting
Leon Trampert,
Christian Rossow, Michael Schwarz
ESORICS
Copenhagen, Denmark, September 26-30, 2022
ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture
Pietro Borrello,
Andreas Kogler,
Martin Schwarzl,
Moritz Lipp,
Daniel Gruss, Michael Schwarz
USENIX Security
Boston, Massachusetts, USA, August 10-12, 2022
Rapid Prototyping for Microarchitectural Attacks
Catherine Easdon, Michael Schwarz,
Martin Schwarzl,
Daniel Gruss
USENIX Security
Boston, Massachusetts, USA, August 10-12, 2022
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX
Lukas Giner,
Andreas Kogler,
Claudio Canella, Michael Schwarz,
Daniel Gruss
USENIX Security
Boston, Massachusetts, USA, August 10-12, 2022
Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks
Andreas Kogler,
Daniel Gruss, Michael Schwarz
USENIX Security
Boston, Massachusetts, USA, August 10-12, 2022
AMD Prefetch Attacks through Power and Time
Moritz Lipp,
Daniel Gruss, Michael Schwarz
USENIX Security
Boston, Massachusetts, USA, August 10-12, 2022
Branch Different - Spectre Attacks on Apple Silicon
DIMVA
Cagliari, Italy, June 29 - July 1, 2022
Finding and Exploiting CPU Features using MSR Templating
Andreas Kogler, Daniel Weber,
Martin Haubenwallner,
Moritz Lipp,
Daniel Gruss, Michael Schwarz
S&P
San Francisco, California, USA, May 23-26, 2022
2021
Automating Seccomp Filter Generation for Linux Applications
Claudio Canella,
Mario Werner,
Daniel Gruss, Michael Schwarz
CCSW
Virtual, November 14, 2021
Osiris: Automated Discovery of Microarchitectural Side Channels
Daniel Weber,
Ahmad Ibrahim,
Hamed Nemati, Michael Schwarz,
Christian Rossow
USENIX Security
Virtual, August 11-13, 2021
PLATYPUS: Software-based Power Side-Channel Attacks on x86
Moritz Lipp,
Andreas Kogler,
David Oswald, Michael Schwarz,
Catherine Easdon,
Claudio Canella,
Daniel Gruss
S&P
Virtual, May 23-27, 2021
Speculative Dereferencing of Registers: Reviving Foreshadow
Martin Schwarzl,
Thomas Schuster, Michael Schwarz,
Daniel Gruss
FC
Virtual, March 1-5, 2021
Specfuscator: Evaluating Branch Removal as a Spectre Mitigation
Martin Schwarzl,
Claudio Canella,
Daniel Gruss, Michael Schwarz
FC
Virtual, March 1-5, 2021
BibTeX Citation
@inproceedings{zhang2024cachewarp,
title={StackWarp: Breaking AMD SEV-SNP Integrity via Deterministic Stack-Pointer Manipulation through the CPU’s Stack Engine},
booktitle={USENIX Security},
author={Ruiyi Zhang and Tristan Hornetz and Daniel Weber and Fabian Thomas and Michael Schwarz},
year={2026}
}BibTeX Citation
@inproceedings{hetterich2026instrsem,
title={InstrSem: Automatically and Generically Inferring Semantics of (Undocumented) CPU Instructions},
booktitle={USENIX Security},
author={Lorenz Hetterich and Fabian Thomas and Tristan Hornetz and Michael Schwarz},
year={2026}
}BibTeX Citation
@inproceedings{zhang2026snpeek,
title={SNPeek: Side-Channel Analysis for Privacy Applications on Confidential VMs},
booktitle={NDSS},
author={Ruiyi Zhang and Albert Cheu and Adria Gascon and Daniel Moghimi and Phillipp Schoppmann and Michael Schwarz and Octavian Suciu},
year={2026}
}BibTeX Citation
@inproceedings{gerlach2026zerostore,
title={Zero-Store Elimination and its Implications on the SIKE Cryptosystem},
booktitle={uASC},
author={Lukas Gerlach and Niklas Flentje and Michael Schwarz},
year={2026}
}BibTeX Citation
@inproceedings{thomas2025exfilstate,
title={ExfilState: Automated Discovery of Timer-Free Cache Side Channels on ARM CPUs},
booktitle={CCS},
author={Fabian Thomas and Michael Torres and Daniel Moghimi and Michael Schwarz},
year={2025}
}BibTeX Citation
@inproceedings{thomas2025riscover,
title={RISCover: Automatic Discovery of User-exploitable Architectural Security Vulnerabilities in Closed-Source RISC-V CPUs},
booktitle={CCS},
author={Fabian Thomas and Eric García Arribas and Lorenz Hetterich and Daniel Weber and Lukas Gerlach and Ruiyi Zhang and Michael Schwarz},
year={2025}
}BibTeX Citation
@inproceedings{trampert2025styled,
title={Styled to Steal: The Overlooked Attack Surface in Email Clients},
booktitle={CCS},
author={Leon Trampert and Daniel Weber and Christian Rossow and Michael Schwarz},
year={2025}
}BibTeX Citation
@inproceedings{schloegel2025cve,
title={Confusing Value with Enumeration: Studying the Use of CVEs in Academia},
booktitle={USENIX Security},
author={Moritz Schloegel and Daniel Klischies and Simon Koch and David Klein and Lukas Gerlach and Malte Wessels and Leon Trampert and Martin Johns and Mathy Vanhoef and Michael Schwarz and Thorsten Holz and Jo Van Bulck},
year={2025}
}BibTeX Citation
@inproceedings{weber2025scase,
title={SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution},
booktitle={USENIX Security},
author={Daniel Weber and Lukas Gerlach and Leon Trampert and Youheng Lue and Jo Van Bulck and Michael Schwarz},
year={2025}
}BibTeX Citation
@inproceedings{zhang2025mapalloc,
title={Taming the Linux Memory Allocator for Rapid Prototyping},
booktitle={DIMVA},
author={Ruiyi Zhang and Tristan Hornetz and Lukas Gerlach and Michael Schwarz},
year={2025}
}BibTeX Citation
@inproceedings{rainer2025rapid,
title={Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage},
booktitle={S\&P},
author={Mikka Rainer and Lorenz Hetterich and Fabian Thomas and Tristan Hornetz and Leon Trampert and Lukas Gerlach and Michael Schwarz},
year={2025}
}BibTeX Citation
@inproceedings{gerlach2025compiler,
title={Do Compilers Break Constant-time Guarantees?},
booktitle={FC},
author={Lukas Gerlach and Robert Pietsch and Michael Schwarz},
year={2025}
}BibTeX Citation
@inproceedings{hornetz2025lixom,
title={Lixom: Protecting Encryption Keys with Execute-Only Memory},
booktitle={FC},
author={Tristan Hornetz and Lukas Gerlach and Michael Schwarz},
year={2025}
}BibTeX Citation
@inproceedings{trampert2025peripheralinstinct,
title={Peripheral Instinct: How External Devices Breach Browser Sandboxes},
booktitle={WWW},
author={Leon Trampert and Lorenz Hetterich and Lukas Gerlach and Mona Schappert and Christian Rossow and Michael Schwarz},
year={2025}
}BibTeX Citation
@inproceedings{hetterich2025shadowload,
title={ShadowLoad: Injecting State into Hardware Prefetchers},
booktitle={ASPLOS},
author={Lorenz Hetterich and Fabian Thomas and Lukas Gerlach and Ruiyi Zhang and Nils Bernsdorf and Eduard Ebert and Michael Schwarz},
year={2025}
}BibTeX Citation
@inproceedings{trampert2025cascadingspysheets,
title={Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting},
booktitle={NDSS},
author={Leon Trampert and Daniel Weber and Lukas Gerlach and Christian Rossow and Michael Schwarz},
year={2025}
}BibTeX Citation
@inproceedings{hornetz2025portprint,
title={PortPrint: Identifying Inaccessible Code with Port Contention},
booktitle={uASC},
author={Tristan Hornetz and Michael Schwarz},
year={2025}
}BibTeX Citation
@inproceedings{trampert2025hiddenplainsight,
title={Hidden in Plain Sight: Scriptless Microarchitectural Attacks via TrueType Font Hinting},
booktitle={uASC},
author={Leon Trampert and Michael Schwarz},
year={2025}
}BibTeX Citation
@inproceedings{weber2024irqguard,
title={No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks},
booktitle={ACSAC},
author={Daniel Weber and Leonard Niemann and Lukas Gerlach and Jan Reineke and Michael Schwarz},
year={2024}
}BibTeX Citation
@inproceedings{zhang2024cachewarp,
title={CacheWarp: Software-based Fault Injection using Selective State Reset},
booktitle={USENIX Security},
author={Ruiyi Zhang and Lukas Gerlach and Daniel Weber and Lorenz Hetterich and Youheng Lü and Andreas Kogler and Michael Schwarz},
year={2024}
}BibTeX Citation
@inproceedings{bauer2024switchpoline,
title={Switchpoline: A Software Mitigation for Spectre-BTB and Spectre-BHB on ARMv8},
booktitle={ASIACCS},
author={Markus Bauer and Lorenz Hetterich and Christian Rossow and Michael Schwarz},
year={2024}
}BibTeX Citation
@inproceedings{gerlach2024hash,
title={Efficient and Generic Microarchitectural Hash-Function Recovery},
booktitle={S\&P},
author={Lukas Gerlach and Simon Schwarz and Nicolas Faroß and Michael Schwarz},
year={2024}
}BibTeX Citation
@inproceedings{schlueter2023fetchbench,
title={FetchBench: Systematic Identification and Characterization of Proprietary Prefetchers},
booktitle={CCS},
author={Till Schlüter and Amit Choudhari and Lorenz Hetterich and Leon Trampert and Hamed Nemati and Ahmad Ibrahim and Michael Schwarz and Christian Rossow and Nils Ole Tippenhauer},
year={2023}
}BibTeX Citation
@inproceedings{trampert2023honey,
title={Honey, I Cached our Security Tokens - Re-usage of Security Tokens in the Wild},
booktitle={RAID},
author={Leon Trampert and Ben Stock and Sebastian Roth},
year={2023}
}BibTeX Citation
@inproceedings{gerlach2023blacksmithrepro,
title={A Rowhammer Reproduction Study Using the Blacksmith Fuzzer},
booktitle={ESORICS},
author={Lukas Gerlach and Fabian Thomas and Robert Pietsch and Michael Schwarz},
year={2023}
}BibTeX Citation
@inproceedings{weber2023masc,
title={Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks},
booktitle={ESORICS},
author={Daniel Weber and Fabian Thomas and Lukas Gerlach and Ruiyi Zhang and Michael Schwarz},
year={2023}
}BibTeX Citation
@inproceedings{weber2023meltdown3a,
title={Reviving Meltdown 3a},
booktitle={ESORICS},
author={Daniel Weber and Fabian Thomas and Lukas Gerlach and Ruiyi Zhang and Michael Schwarz},
year={2023}
}BibTeX Citation
@inproceedings{kogler2023collidepower,
title={Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels},
booktitle={USENIX Security},
author={Andreas Kogler and Jonas Juffinger and Lukas Giner and Lukas Gerlach and Martin Schwarzl and Michael Schwarz and Daniel Gruss and Stefan Mangard},
year={2023}
}BibTeX Citation
@inproceedings{zhang2023mwait,
title={(M)WAIT for It: Bridging the Gap between Microarchitectural and Architectural Side Channels},
booktitle={USENIX Security},
author={Ruiyi Zhang and Taehyun Kim and Daniel Weber and Michael Schwarz},
year={2023}
}BibTeX Citation
@inproceedings{thomas2023hammulator,
title={Hammulator: Simulate Now - Exploit Later},
booktitle={DRAMSec},
author={Fabian Thomas and Lukas Gerlach and Michael Schwarz},
year={2023}
}BibTeX Citation
@inproceedings{borrello2023cpu,
title={CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode},
booktitle={WOOT},
author={Pietro Borrello and Catherine Easdon and Martin Schwarzl and Roland Czerny and Michael Schwarz},
year={2023}
}BibTeX Citation
@inproceedings{gerlach2023riscv,
title={A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs},
booktitle={S\&P},
author={Lukas Gerlach and Daniel Weber and Ruiyi Zhang and Michael Schwarz},
year={2023}
}BibTeX Citation
@inproceedings{schwarzl2023compression,
title={Practical Timing Side-Channel Attacks on Memory Compression},
booktitle={S\&P},
author={Martin Schwarzl and Pietro Borrello and Gururaj Saileshwar and Hanna Müller and Michael Schwarz and Daniel Gruss},
year={2023}
}BibTeX Citation
@inproceedings{chakraborty2023talus,
title={TALUS: Reinforcing TEE Confidentiality with Cryptographic Coprocessors},
booktitle={FC},
author={Dhiman Chakraborty and Michael Schwarz and Sven Bugiel},
year={2023}
}BibTeX Citation
@inproceedings{karvandi2022hyperdbg,
title={HyperDbg: Reinventing Hardware-Assisted Debugging},
booktitle={CCS},
author={Mohammad Sina Karvandi and MohammadHossein Gholamrezaei and Saleh Khalaj Monfared and Soroush Meghdadizanjani and Behrooz Abbassi and Ali Amini and Reza Mortazavi and Saeid Gorgin and Dara Rahmati and Michael Schwarz},
year={2022}
}BibTeX Citation
@inproceedings{rokicki2022portcontention,
title={CPU Port Contention Without SMT},
booktitle={ESORICS},
author={Thomas Rokicki and Clémentine Maurice and Michael Schwarz},
year={2022}
}BibTeX Citation
@inproceedings{schwarzl2022dpi,
title={Robust and Scalable Process Isolation against Spectre in the Cloud},
booktitle={ESORICS},
author={Martin Schwarzl and Pietro Borrello and Andreas Kogler and Kenton Varda and Thomas Schuster and Michael Schwarz and Daniel Gruss},
year={2022}
}BibTeX Citation
@inproceedings{trampert2022uarchfp,
title={Browser-based CPU Fingerprinting},
booktitle={ESORICS},
author={Leon Trampert and Christian Rossow and Michael Schwarz},
year={2022}
}BibTeX Citation
@inproceedings{borrello2022aepicleak,
title={ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture},
booktitle={USENIX Security},
author={Pietro Borrello and Andreas Kogler and Martin Schwarzl and Moritz Lipp and Daniel Gruss and Michael Schwarz},
year={2022}
}BibTeX Citation
@inproceedings{easdon2022rapid,
title={Rapid Prototyping for Microarchitectural Attacks},
booktitle={USENIX Security},
author={Catherine Easdon and Michael Schwarz and Martin Schwarzl and Daniel Gruss},
year={2022}
}BibTeX Citation
@inproceedings{giner2022lvi,
title={Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX},
booktitle={USENIX Security},
author={Lukas Giner and Andreas Kogler and Claudio Canella and Michael Schwarz and Daniel Gruss},
year={2022}
}BibTeX Citation
@inproceedings{kogler2022minefield,
title={Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks},
booktitle={USENIX Security},
author={Andreas Kogler and Daniel Gruss and Michael Schwarz},
year={2022}
}BibTeX Citation
@inproceedings{lipp2022amd,
title={AMD Prefetch Attacks through Power and Time},
booktitle={USENIX Security},
author={Moritz Lipp and Daniel Gruss and Michael Schwarz},
year={2022}
}BibTeX Citation
@inproceedings{hetterich2022applespectre,
title={Branch Different - Spectre Attacks on Apple Silicon},
booktitle={DIMVA},
author={Lorenz Hetterich and Michael Schwarz},
year={2022}
}BibTeX Citation
@inproceedings{kogler2022msrtemplate,
title={Finding and Exploiting CPU Features using MSR Templating},
booktitle={S\&P},
author={Andreas Kogler and Daniel Weber and Martin Haubenwallner and Moritz Lipp and Daniel Gruss and Michael Schwarz},
year={2022}
}BibTeX Citation
@inproceedings{canella2021chestnut,
title={Automating Seccomp Filter Generation for Linux Applications},
booktitle={CCSW},
author={Claudio Canella and Mario Werner and Daniel Gruss and Michael Schwarz},
year={2021}
}BibTeX Citation
@inproceedings{weber2021osiris,
title={Osiris: Automated Discovery of Microarchitectural Side Channels},
booktitle={USENIX Security},
author={Daniel Weber and Ahmad Ibrahim and Hamed Nemati and Michael Schwarz and Christian Rossow},
year={2021}
}BibTeX Citation
@inproceedings{lipp2021platypus,
title={PLATYPUS: Software-based Power Side-Channel Attacks on x86},
booktitle={S\&P},
author={Moritz Lipp and Andreas Kogler and David Oswald and Michael Schwarz and Catherine Easdon and Claudio Canella and Daniel Gruss},
year={2021}
}BibTeX Citation
@inproceedings{schwarzl2021specderef,
title={Speculative Dereferencing of Registers: Reviving Foreshadow},
booktitle={FC},
author={Martin Schwarzl and Thomas Schuster and Michael Schwarz and Daniel Gruss},
year={2021}
}BibTeX Citation
@inproceedings{schwarzl2021specfuscator,
title={Specfuscator: Evaluating Branch Removal as a Spectre Mitigation},
booktitle={FC},
author={Martin Schwarzl and Claudio Canella and Daniel Gruss and Michael Schwarz},
year={2021}
}