Follow
Jonas Juffinger
Title
Cited by
Cited by
Year
Another flip in the wall of rowhammer defenses
D Gruss, M Lipp, M Schwarz, D Genkin, J Juffinger, S O'Connell, ...
2018 IEEE Symposium on Security and Privacy (SP), 245-261, 2018
2582018
{Half-Double}: Hammering from the next row over
A Kogler, J Juffinger, S Qazi, Y Kim, M Lipp, N Boichat, E Shiu, M Nissler, ...
31st USENIX Security Symposium (USENIX Security 22), 3807-3824, 2022
482022
CSI: Rowhammer–Cryptographic security and integrity against rowhammer
J Juffinger, L Lamster, A Kogler, M Eichlseder, M Lipp, D Gruss
2023 IEEE Symposium on Security and Privacy (SP), 1702-1718, 2023
252023
Squip: Exploiting the scheduler queue contention side channel
S Gast, J Juffinger, M Schwarzl, G Saileshwar, A Kogler, S Franza, M Köstl, ...
2023 IEEE Symposium on Security and Privacy (SP), 2256-2272, 2023
142023
Pt-guard: Integrity-protected page tables to defend against breakthrough rowhammer attacks
A Saxena, G Saileshwar, J Juffinger, A Kogler, D Gruss, M Qureshi
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2023
62023
{Collide+ Power}: Leaking Inaccessible Data with Software-based Power Side Channels
A Kogler, J Juffinger, L Giner, L Gerlach, M Schwarzl, M Schwarz, D Gruss, ...
32nd USENIX Security Symposium (USENIX Security 23), 7285-7302, 2023
42023
Remote Scheduler Contention Attacks
S Gast, J Juffinger, L Maar, C Royer, A Kogler, D Gruss
Financial Cryptography and Data Security 2024, 2024
12024
SUIT: Secure Undervolting with Instruction Traps
J Juffinger, S Kalinin, D Gruss, F Mueller
ACM International Conference on Architectural Support for Programming …, 2024
2024
IdleLeak: Exploiting Idle State Side Effects for Information Leakage
F Rauscher, A Kogler, J Juffinger, D Gruss
Network and Distributed System Security (NDSS) Symposium 2024, 2024
2024
Side-Channel Security
J Juffinger
2023
Rowhammer Exploits are still possible
J Juffinger
The system can't perform the operation now. Try again later.
Articles 1–11