Spectre attacks: Exploiting speculative execution P Kocher, J Horn, A Fogh, D Genkin, D Gruss, W Haas, M Hamburg, ... 2019 IEEE Symposium on Security and Privacy (SP), 1-19, 2019 | 1917 | 2019 |
Meltdown: Reading kernel memory from user space M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, A Fogh, J Horn, ... 27th USENIX Security Symposium (USENIX Security 18), 973-990, 2018 | 1072 | 2018 |
Prefetch side-channel attacks: Bypassing SMAP and kernel ASLR D Gruss, C Maurice, A Fogh, M Lipp, S Mangard Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 216 | 2016 |
Conversion of data in particular for playing of audio and/or video information V Breitfeld, A Fogh US Patent App. 11/345,881, 2006 | 76 | 2006 |
Automated detection, exploitation, and elimination of double-fetch bugs using modern CPU features M Schwarz, D Gruss, M Lipp, C Maurice, T Schuster, A Fogh, S Mangard Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 44 | 2018 |
Page cache attacks D Gruss, E Kraft, T Tiwari, M Schwarz, A Trachtenberg, J Hennessey, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 27 | 2019 |
These are not your grand Daddys cpu performance counters–CPU hardware performance counters for security N Herath, A Fogh Black Hat Briefings, 2015 | 26 | 2015 |
Negative result: Reading kernel memory from user mode A Fogh Retrieved from, 2017 | 5 | 2017 |
Copy Protection For Audio, Video, and/or A/V Navigation Data V Breitfeld, A Fogh, T Taschner US Patent App. 11/618,395, 2007 | 4 | 2007 |
DRAMA: How your DRAM becomes a security problem M Schwarz, A Fogh Black Hat Europe, 2016 | 2 | 2016 |
Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process A Fogh, D Gruss Blackhat USA, 2016 | 2 | 2016 |
PC Chairs A Oprea, T Holz, A Aviv, D Balzarotti, G Barthe, L Bauer, K Bhargavan, ... | | |
Christopher Kruegel, UC Santa Barbara H Shacham, A Shelat, A Bates, A Doupé, A Perrig, AP Felt, A Kiayias, ... | | |