Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks |
40th IEEE Symposium on Security and Privacy
|
RIDL: Rogue In-Flight Data Load |
40th IEEE Symposium on Security and Privacy
|
GLitch Chronicles: Turning WebGL Into A Hammer |
HITBSecConf2018 – Dubai
|
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense |
ACM CCS 2018
|
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU |
39th IEEE Symposium on Security and Privacy
|
Drammer: The Making-Of |
HITBSecConf2017 – Amsterdam
|
Bypassing Clang's SafeStack for Fun and Profit |
Black Hat Europe 2016
|
Flip Feng Shui: Rowhammering the VM's Isolation |
Black Hat Europe 2016
|
Over the Edge: Silently Owning Windows 10's Secure Browser |
Black Hat USA 2016
|
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector |
37th IEEE Symposium on Security and Privacy
|