Kaveh Razavi

Orcid: 0000-0002-8588-7100

According to our database1, Kaveh Razavi authored at least 53 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Inception: Exposing New Attack Surfaces with Training in Transient Execution.
Proceedings of the 32nd USENIX Security Symposium, 2023

REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Phantom: Exploiting Decoder-detectable Mispredictions.
Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture, 2023

2022
SpyHammer: Using RowHammer to Remotely Spy on Temperature.
CoRR, 2022

RETBLEED: Arbitrary Speculative Code Execution with Return Instructions.
Proceedings of the 31st USENIX Security Symposium, 2022

CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL.
Proceedings of the 31st USENIX Security Symposium, 2022

ProTRR: Principled yet Optimal In-DRAM Target Row Refresh.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

BLACKSMITH: Scalable Rowhammering in the Frequency Domain.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

RemembERR: Leveraging Microprocessor Errata for Design Testing and Validation.
Proceedings of the 55th IEEE/ACM International Symposium on Microarchitecture, 2022

DUPEFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels.
Proceedings of the 20th USENIX Conference on File and Storage Technologies, 2022

2021
SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript.
Proceedings of the 30th USENIX Security Symposium, 2021

CrossTalk: Speculative Data Leaks Across Cores Are Real.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications.
Proceedings of the MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021

CODIC: A Low-Cost Substrate for Enabling Custom In-DRAM Functionalities and Optimizations.
Proceedings of the 48th ACM/IEEE Annual International Symposium on Computer Architecture, 2021

2020
ParmeSan: Sanitizer-guided Greybox Fuzzing.
Proceedings of the 29th USENIX Security Symposium, 2020

: Practical Cache Attacks from the Network.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

TRRespass: Exploiting the Many Sides of Target Row Refresh.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Leave my apps alone!: a study on how Android developers access installed apps on user's device.
Proceedings of the MOBILESoft '20: IEEE/ACM 7th International Conference on Mobile Software Engineering and Systems, 2020

Stratus: Clouds with Microarchitectural Resource Management.
Proceedings of the 12th USENIX Workshop on Hot Topics in Cloud Computing, 2020

TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

Speculative Probing: Hacking Blind in the Spectre Era.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Dataplant: In-DRAM Security Mechanisms for Low-Cost Devices.
CoRR, 2019

RIDL: Rogue In-Flight Data Load.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Enabling Efficient RDMA-based Synchronous Mirroring of Persistent Memory Transactions.
CoRR, 2018

Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think.
Proceedings of the 27th USENIX Security Symposium, 2018

Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks.
Proceedings of the 27th USENIX Security Symposium, 2018

Throwhammer: Rowhammer Attacks over the Network and Defenses.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks.
Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation, 2018

GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2018

2017
Secure Page Fusion with VUsion: https: //www.vusec.net/projects/VUsion.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

ASLR on the Line: Practical Cache Attacks on the MMU.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Understanding Rack-Scale Disaggregated Storage.
Proceedings of the 9th USENIX Workshop on Hot Topics in Storage and File Systems, 2017

RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches.
Proceedings of the 10th European Workshop on Systems Security, 2017

Off-the-shelf Embedded Devices as Platforms for Security Research.
Proceedings of the 10th European Workshop on Systems Security, 2017

2016
Flip Feng Shui: Hammering a Needle in the Software Stack.
Proceedings of the 25th USENIX Security Symposium, 2016

Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
CAIN: Silently Breaking ASLR in the Cloud.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

R2C2: A Network Stack for Rack-scale Computers.
Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication, 2015

Prebaked µVMs: Scalable, Instant VM Startup for IaaS Clouds.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Kangaroo: A Tenant-Centric Software-Defined Cloud Infrastructure.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

Scaling VM Deployment in an Open Source Cloud Stack.
Proceedings of the 6th Workshop on Scientific Cloud Computing, 2015

2014
Squirrel: scatter hoarding VM image contents on IaaS compute nodes.
Proceedings of the 23rd International Symposium on High-Performance Parallel and Distributed Computing, 2014

2013
Scalable virtual machine deployment using VM image caches.
Proceedings of the International Conference for High Performance Computing, 2013

GuideArch: guiding the exploration of architectural solution space under uncertainty.
Proceedings of the 35th International Conference on Software Engineering, 2013

Reducing VM Startup Time and Storage Costs by VM Image Content Consolidation.
Proceedings of the Euro-Par 2013: Parallel Processing Workshops, 2013

2012
Dealing with uncertainty in early software architecture.
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012


  Loading...