Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks 40th IEEE Symposium on Security and Privacy
RIDL: Rogue In-Flight Data Load 40th IEEE Symposium on Security and Privacy
GLitch Chronicles: Turning WebGL Into A Hammer HITBSecConf2018 – Dubai
MineSweeper: An In-depth Look into Drive-by Cryptocurrency Mining and Its Defense ACM CCS 2018
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU 39th IEEE Symposium on Security and Privacy
Drammer: The Making-Of HITBSecConf2017 – Amsterdam
Bypassing Clang's SafeStack for Fun and Profit Black Hat Europe 2016
Flip Feng Shui: Rowhammering the VM's Isolation Black Hat Europe 2016
Over the Edge: Silently Owning Windows 10's Secure Browser Black Hat USA 2016
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector 37th IEEE Symposium on Security and Privacy