Moritz Lipp

Affiliations:
  • Amazon Web Services
  • Graz University of Technology, Austria (former)


According to our database1, Moritz Lipp authored at least 36 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
AMD Prefetch Attacks through Power and Time.
Proceedings of the 31st USENIX Security Symposium, 2022

Half-Double: Hammering From the Next Row Over.
Proceedings of the 31st USENIX Security Symposium, 2022

ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture.
Proceedings of the 31st USENIX Security Symposium, 2022

Finding and Exploiting CPU Features using MSR Templating.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Remote Memory-Deduplication Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2021
Sicherheitsaspekte von Mikroarchitektur-Optimierungen.
Proceedings of the Ausgezeichnete Informatikdissertationen 2021., 2021

PLATYPUS: Software-based Power Side-Channel Attacks on x86.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Meltdown: reading kernel memory from user space.
Commun. ACM, 2020

Spectre attacks: exploiting speculative execution.
Commun. ACM, 2020

Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis.
Proceedings of the 29th USENIX Security Symposium, 2020

LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

ConTExT: A Generic Approach for Mitigating Spectre.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Nethammer: Inducing Rowhammer Faults through Network Requests.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Fallout: Reading Kernel Writes From User Space.
CoRR, 2019

ConTExT: Leakage-Free Transient Execution.
CoRR, 2019

A Systematic Evaluation of Transient Execution Attacks and Defenses.
Proceedings of the 28th USENIX Security Symposium, 2019

NetSpectre: Read Arbitrary Memory over Network.
Proceedings of the Computer Security - ESORICS 2019, 2019

Fallout: Leaking Data on Meltdown-resistant CPUs.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

ZombieLoad: Cross-Privilege-Boundary Data Sampling.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Spectre Attacks: Exploiting Speculative Execution.
meltdownattack.com, 2018

Meltdown
meltdownattack.com, 2018

NetSpectre: Read Arbitrary Memory over Network.
CoRR, 2018

Meltdown: Reading Kernel Memory from User Space.
Proceedings of the 27th USENIX Security Symposium, 2018

Another Flip in the Wall of Rowhammer Defenses.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks.
CoRR, 2017

KASLR is Dead: Long Live KASLR.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

Practical Keystroke Timing Attacks in Sandboxed JavaScript.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
ARMageddon: Cache Attacks on Mobile Devices.
Proceedings of the 25th USENIX Security Symposium, 2016

Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
ARMageddon: Last-Level Cache Attacks on Mobile Devices.
CoRR, 2015


  Loading...