Spectre attacks: Exploiting speculative execution P Kocher, J Horn, A Fogh, D Genkin, D Gruss, W Haas, M Hamburg, ... Communications of the ACM 63 (7), 93-101, 2020 | 3190 | 2020 |
Meltdown: Reading kernel memory from user space M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, J Horn, S Mangard, ... Communications of the ACM 63 (6), 46-56, 2020 | 1971 | 2020 |
Prefetch side-channel attacks: Bypassing SMAP and kernel ASLR D Gruss, C Maurice, A Fogh, M Lipp, S Mangard Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 337 | 2016 |
Conversion of data in particular for playing of audio and/or video information V Breitfeld, A Fogh US Patent App. 11/345,881, 2006 | 98 | 2006 |
Automated detection, exploitation, and elimination of double-fetch bugs using modern cpu features M Schwarz, D Gruss, M Lipp, C Maurice, T Schuster, A Fogh, S Mangard Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 66 | 2018 |
Page cache attacks D Gruss, E Kraft, T Tiwari, M Schwarz, A Trachtenberg, J Hennessey, ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 55 | 2019 |
These are not your grand Daddys cpu performance counters–cpu hardware performance counters for security N Herath, A Fogh Black Hat Briefings 47, 48, 2015 | 44 | 2015 |
Negative result: Reading kernel memory from user mode A Fogh Retrieved from, 2017 | 7 | 2017 |
Copy Protection For Audio, Video, and/or A/V Navigation Data V Breitfeld, A Fogh, T Taschner US Patent App. 11/618,395, 2007 | 4 | 2007 |
Drama: How your dram becomes a security problem M Schwarz, A Fogh Black Hat Europe, 2016 | 3 | 2016 |
Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process A Fogh, D Gruss Blackhat USA, 2016 | 2 | 2016 |
PC Chairs A Oprea, T Holz, A Aviv, D Balzarotti, G Barthe, L Bauer, K Bhargavan, ... | | |
Christopher Kruegel, UC Santa Barbara H Shacham, A Shelat, A Bates, A Doupé, A Perrig, AP Felt, A Kiayias, ... | | |