Daniel Moghimi

Orcid: 0000-0002-3123-5916

Affiliations:
  • Google


According to our database1, Daniel Moghimi authored at least 29 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

2023
Generic Attacks against Cryptographic Hardware through Long-Range Deep Learning.
CoRR, 2023

NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems.
Proceedings of the 32nd USENIX Security Symposium, 2023

Title Redacted Due to Vulnerability Embargo.
Proceedings of the 32nd USENIX Security Symposium, 2023

Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2022
A Turning Point for Verified Spectre Sandboxing.
CoRR, 2022

SoK: Practical Foundations for Software Spectre Defenses.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

EVAX: Towards a Practical, Pro-active & Adaptive Architecture for High Performance & Security.
Proceedings of the 55th IEEE/ACM International Symposium on Microarchitecture, 2022

2021
SoK: Practical Foundations for Spectre Defenses.
CoRR, 2021

Swivel: Hardening WebAssembly against Spectre.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2020

Data Sampling on MDS-resistant 10th Generation Intel Core (Ice Lake).
CoRR, 2020

CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction.
CoRR, 2020

TPM-FAIL: TPM meets Timing and Lattice Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020

Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis.
Proceedings of the 29th USENIX Security Symposium, 2020

CopyCat: Controlled Instruction-Level Attacks on Enclaves.
Proceedings of the 29th USENIX Security Symposium, 2020

LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

2019
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations.
Int. J. Parallel Program., 2019

FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning.
CoRR, 2019

Fallout: Reading Kernel Writes From User Space.
CoRR, 2019

SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019

Fallout: Leaking Data on Meltdown-resistant CPUs.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

ZombieLoad: Cross-Privilege-Boundary Data Sampling.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations in SGX.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018

MicroWalk: A Framework for Finding Side Channels in Binaries.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018

2017
CacheZoom: How SGX Amplifies The Power of Cache Attacks.
IACR Cryptol. ePrint Arch., 2017

MemJam: A False Dependency Attack against Constant-Time Crypto Implementations.
CoRR, 2017

2016
Abstract runtime structure for reasoning about security: poster.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016


  Loading...