Obserwuj
Daniel Moghimi
Daniel Moghimi
Senior Research Scientist, Google
Zweryfikowany adres z google.com - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
ZombieLoad: Cross-Privilege-Boundary Data Sampling
M Schwarz, M Lipp, D Moghimi, J Van Bulck, J Stecklina, T Prescher, ...
The 26th ACM Conference on Computer and Communications Security (CCS 2019), 2019
5712019
Fallout: Leaking Data on Meltdown-resistant CPUs
C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ...
The 26th ACM Conference on Computer and Communications Security (CCS 2019), 2019
426*2019
CacheZoom: How SGX Amplifies the Power of Cache Attacks
A Moghimi, G Irazoqui, T Eisenbarth
International Conference on Cryptographic Hardware and Embedded Systems …, 2017
4172017
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
J Van Bulck, D Moghimi, M Schwarz, M Lipp, M Minkin, D Genkin, ...
The 41st IEEE Symposium on Security and Privacy (S&P 2020), 2020
3362020
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations
A Moghimi, J Wichelmann, T Eisenbarth, B Sunar
International Journal of Parallel Programming 47 (4), 538-570, 2019
1792019
TPM-FAIL: TPM meets Timing and Lattice Attacks
D Moghimi, B Sunar, T Eisenbarth, N Heninger
The 29th USENIX Security Symposium (USENIX Security 2020), 2020
1352020
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks
F Dall, G De Micheli, T Eisenbarth, D Genkin, N Heninger, A Moghimi, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2018 …, 2018
1132018
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks
S Islam, A Moghimi, I Bruhns, M Krebbel, B Gulmezoglu, T Eisenbarth, ...
The 28th USENIX Security Symposium (USENIX Security 2019), 2019
1002019
Microwalk: A Framework for Finding Side Channels in Binaries
J Wichelmann, A Moghimi, T Eisenbarth, B Sunar
The 34th Annual Computer Security Applications Conference (ACSAC 2018), 161-173, 2018
972018
Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis
D Moghimi, M Lipp, B Sunar, M Schwarz
The 29th USENIX Security Symposium (USENIX Security 2020), 2020
962020
CopyCat: Controlled Instruction-level Attacks on Enclaves
D Moghimi, J Van Bulck, N Heninger, F Piessens, B Sunar
The 29th USENIX Security Symposium (USENIX Security 2020), 2020
812020
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
Z Weissman, T Tiemann, D Moghimi, E Custodio, T Eisenbarth, B Sunar
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2020), 2020
812020
Swivel: Hardening WebAssembly against Spectre
S Narayan, C Disselkoen, D Moghimi, S Cauligi, E Johnson, Z Gang, ...
The 30th USENIX Security Symposium (USENIX Security 2021), 2021
782021
SoK: Practical Foundations for Spectre Defenses
S Cauligi, C Disselkoen, D Moghimi, G Barthe, D Stefan
The 43st IEEE Symposium on Security and Privacy (S&P 2022), 2022
61*2022
Fortuneteller: Predicting microarchitectural attacks via unsupervised deep learning
B Gulmezoglu, A Moghimi, T Eisenbarth, B Sunar
arXiv preprint arXiv:1907.03651, 2019
542019
Downfall: Exploiting Speculative Data Gathering
D Moghimi
The 32th USENIX Security Symposium (USENIX Security 2023), 2023
412023
Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI
S Narayan, T Garfinkel, M Taram, J Rudek, D Moghimi, E Johnson, ...
28th ACM International Conference on Architectural Support for Programming …, 2023
242023
EVAX: Towards a Practical, Pro-active & Adaptive Architecture for High Performance & Security
SM Ajorpaz, D Moghimi, JN Collins, G Pokam, N Abu-Ghazaleh, ...
IEEE/ACM International Symposium on Microarchitecture (MICRO 2022), 2022
242022
NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems
Z Wang, M Taram, D Moghimi, S Swanson, D Tullsen, J Zhao
The 32th USENIX Security Symposium (USENIX Security 2023), 2023
182023
Subverting without EIP
D Moghimi
https://web.archive.org/web/20220907000257/https://moghimi.org/blog …, 2014
92014
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20