Michael Schwarz

According to our database1, Michael Schwarz authored at least 27 papers between 2014 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
ScatterCache: Thwarting Cache Attacks via Cache Set Randomization.
Proceedings of the 28th USENIX Security Symposium, 2019

A Systematic Evaluation of Transient Execution Attacks and Defenses.
Proceedings of the 28th USENIX Security Symposium, 2019

JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

NetSpectre: Read Arbitrary Memory over Network.
Proceedings of the Computer Security - ESORICS 2019, 2019

Practical Enclave Malware with Intel SGX.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

2018
Spectre Attacks: Exploiting Speculative Execution.
meltdownattack.com, 2018

Meltdown
meltdownattack.com, 2018

Meltdown: Reading Kernel Memory from User Space.
Proceedings of the 27th USENIX Security Symposium, 2018

Another Flip in the Wall of Rowhammer Defenses.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Human computation for constraint-based recommenders.
J. Intell. Inf. Syst., 2017

Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Personalized Dietary Self-Management Using Mobile Vision-Based Assistance.
Proceedings of the New Trends in Image Analysis and Processing - ICIAP 2017, 2017

Towards Real-time Probabilistic Evaluation of Situation Awareness from Human Gaze in Human-Robot Interaction.
Proceedings of the Companion of the 2017 ACM/IEEE International Conference on Human-Robot Interaction, 2017

Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript.
Proceedings of the Financial Cryptography and Data Security, 2017

KASLR is Dead: Long Live KASLR.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

Practical Keystroke Timing Attacks in Sandboxed JavaScript.
Proceedings of the Computer Security - ESORICS 2017, 2017

Malware Guard Extension: Using SGX to Conceal Cache Attacks.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2017

2016
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
MANGO - Mobile Augmented Reality with Functional Eating Guidance and Food Awareness.
Proceedings of the New Trends in Image Analysis and Processing - ICIAP 2015 Workshops, 2015

Human Computation Based Acquisition of Financial Service Advisory Practices.
Proceedings of the 1st International Workshop on Personalization & Recommender Systems in Financial Services, 2015

2014
Aggregated mapping of driver attention from matched optical flow.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Attention in mobile interactions: gaze recovery for large scale studies.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Towards Interactive Visualization of Longitudinal Data to Support Knowledge Discovery on Multi-touch Tablet Computers.
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014


  Loading...