Search Results for author: Moritz Lipp

Found 3 papers, 3 papers with code

A Systematic Evaluation of Transient Execution Attacks and Defenses

2 code implementations13 Nov 2018 Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss

Our systematization does not only yield a complete picture of the attack surface, but also allows a systematic evaluation of defenses.

Cryptography and Security

NetSpectre: Read Arbitrary Memory over Network

2 code implementations27 Jul 2018 Michael Schwarz, Martin Schwarzl, Moritz Lipp, Daniel Gruss

Beyond retrofitting existing attacks to a network scenario, we also demonstrate the first Spectre attack which does not use a cache covert channel.

Cryptography and Security

Meltdown

2 code implementations3 Jan 2018 Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg

The security of computer systems fundamentally relies on memory isolation, e. g., kernel address ranges are marked as non-accessible and are protected from user access.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.