Moritz Lipp

According to our database1, Moritz Lipp authored at least 14 papers between 2016 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
A Systematic Evaluation of Transient Execution Attacks and Defenses.
Proceedings of the 28th USENIX Security Symposium, 2019

NetSpectre: Read Arbitrary Memory over Network.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Spectre Attacks: Exploiting Speculative Execution.
meltdownattack.com, 2018

Meltdown
meltdownattack.com, 2018

Meltdown: Reading Kernel Memory from User Space.
Proceedings of the 27th USENIX Security Symposium, 2018

Another Flip in the Wall of Rowhammer Defenses.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
KASLR is Dead: Long Live KASLR.
Proceedings of the Engineering Secure Software and Systems - 9th International Symposium, 2017

Practical Keystroke Timing Attacks in Sandboxed JavaScript.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
ARMageddon: Cache Attacks on Mobile Devices.
Proceedings of the 25th USENIX Security Symposium, 2016

Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016


  Loading...