ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2106.03470
  4. Cited By
Osiris: Automated Discovery of Microarchitectural Side Channels

Osiris: Automated Discovery of Microarchitectural Side Channels

7 June 2021
Daniel Weber
A. Ibrahim
Hamed Nemati
Michael Schwarz
C. Rossow
ArXivPDFHTML

Papers citing "Osiris: Automated Discovery of Microarchitectural Side Channels"

22 / 22 papers shown
Title
Demoting Security via Exploitation of Cache Demote Operation in Intel's Latest ISA Extension
Demoting Security via Exploitation of Cache Demote Operation in Intel's Latest ISA Extension
Taehun Kim
Hyerean Jang
Youngjoo Shin
64
0
0
13 Mar 2025
FastSpec: Scalable Generation and Detection of Spectre Gadgets Using
  Neural Embeddings
FastSpec: Scalable Generation and Detection of Spectre Gadgets Using Neural Embeddings
M. Caner Tol
Berk Gülmezoglu
Koray Yurtseven
B. Sunar
27
15
0
25 Jun 2020
SPEECHMINER: A Framework for Investigating and Measuring Speculative
  Execution Vulnerabilities
SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution Vulnerabilities
Yuan Xiao
Yinqian Zhang
R. Teodorescu
24
45
0
01 Dec 2019
ZombieLoad: Cross-Privilege-Boundary Data Sampling
ZombieLoad: Cross-Privilege-Boundary Data Sampling
Michael Schwarz
Moritz Lipp
D. Moghimi
Jo Van Bulck
Julian Stecklina
Thomas Prescher
Daniel Gruss
54
419
0
14 May 2019
Store-to-Leak Forwarding: Leaking Data on Meltdown-resistant CPUs
  (Updated and Extended Version)
Store-to-Leak Forwarding: Leaking Data on Meltdown-resistant CPUs (Updated and Extended Version)
Michael Schwarz
Claudio Canella
Lukas Giner
Daniel Gruss
55
44
0
14 May 2019
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy
  Cache Attacks
RELOAD+REFRESH: Abusing Cache Replacement Policies to Perform Stealthy Cache Attacks
Samira Briongos
Pedro Malagón
Jose M. Moya
T. Eisenbarth
22
85
0
12 Apr 2019
SMoTherSpectre: exploiting speculative execution through port contention
SMoTherSpectre: exploiting speculative execution through port contention
Atri Bhattacharyya
A. Sandulescu
M. Neugschwandtner
A. Sorniotti
Babak Falsafi
Mathias Payer
Anil Kurmus
37
243
0
05 Mar 2019
A Systematic Evaluation of Transient Execution Attacks and Defenses
A Systematic Evaluation of Transient Execution Attacks and Defenses
Claudio Canella
Jo Van Bulck
Michael Schwarz
Moritz Lipp
Benjamin von Berg
Philipp Ortner
Frank Piessens
Dmitry Evtyushkin
Daniel Gruss
37
403
0
13 Nov 2018
Theory and Practice of Finding Eviction Sets
Theory and Practice of Finding Eviction Sets
Pepe Vila
Boris Köpf
J. Morales
30
129
0
02 Oct 2018
NetSpectre: Read Arbitrary Memory over Network
NetSpectre: Read Arbitrary Memory over Network
Michael Schwarz
Martin Schwarzl
Moritz Lipp
Daniel Gruss
23
230
0
27 Jul 2018
ret2spec: Speculative Execution Using Return Stack Buffers
ret2spec: Speculative Execution Using Return Stack Buffers
G. Maisuradze
C. Rossow
SILM
27
254
0
26 Jul 2018
LazyFP: Leaking FPU Register State using Microarchitectural
  Side-Channels
LazyFP: Leaking FPU Register State using Microarchitectural Side-Channels
Julian Stecklina
Thomas Prescher
26
118
0
19 Jun 2018
Angora: Efficient Fuzzing by Principled Search
Angora: Efficient Fuzzing by Principled Search
Peng Chen
Hao Chen
26
536
0
04 Mar 2018
Speculose: Analyzing the Security Implications of Speculative Execution
  in CPUs
Speculose: Analyzing the Security Implications of Speculative Execution in CPUs
G. Maisuradze
C. Rossow
44
24
0
12 Jan 2018
Spectre Attacks: Exploiting Speculative Execution
Spectre Attacks: Exploiting Speculative Execution
P. Kocher
Daniel Genkin
Daniel Gruss
Werner Haas
Michael Hamburg
Moritz Lipp
Stefan Mangard
Thomas Prescher
Michael Schwarz
Y. Yarom
SILM
46
2,171
0
03 Jan 2018
Software-based Microarchitectural Attacks
Software-based Microarchitectural Attacks
Daniel Gruss
32
15
0
19 Jun 2017
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch
  Shadowing
Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing
Sangho Lee
Ming-Wei Shih
Prasun Gera
Taesoo Kim
Hyesoon Kim
Marcus Peinado
40
504
0
21 Nov 2016
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
P. Pessl
Daniel Gruss
Clémentine Maurice
Michael Schwarz
Stefan Mangard
41
447
0
27 Nov 2015
ARMageddon: Cache Attacks on Mobile Devices
ARMageddon: Cache Attacks on Mobile Devices
Moritz Lipp
Daniel Gruss
Raphael Spreitzer
Clémentine Maurice
Stefan Mangard
FedML
25
427
0
16 Nov 2015
Flush+Flush: A Fast and Stealthy Cache Attack
Flush+Flush: A Fast and Stealthy Cache Attack
Daniel Gruss
Clémentine Maurice
Klaus Wagner
Stefan Mangard
48
577
0
14 Nov 2015
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
Daniel Gruss
Clémentine Maurice
Stefan Mangard
29
415
0
24 Jul 2015
The Spy in the Sandbox -- Practical Cache Attacks in Javascript
The Spy in the Sandbox -- Practical Cache Attacks in Javascript
Yossef Oren
V. Kemerlis
S. Sethumadhavan
A. Keromytis
33
330
0
25 Feb 2015
1