Lukas Gerlach
Lukas Gerlach
Home
Publications
Talks
Publications
2026
Zero-Store Elimination and its Implications on the SIKE Cryptosystem
Lukas Gerlach, Niklas Flentje, Michael Schwarz
uASC
2026
PDF
Cite
2025
RISCover: Automatic Discovery of User-exploitable Architectural Security Vulnerabilities in Closed-Source RISC-V CPUs
Fabian Thomas, Eric García Arribas, Lorenz Hetterich, Daniel Weber, Lukas Gerlach, Ruiyi Zhang, Michael Schwarz
CCS
2025
PDF
Code
Cite
Confusing Value with Enumeration: Studying the Use of CVEs in Academia
Moritz Schloegel, Daniel Klischies, Simon Koch, David Klein, Lukas Gerlach, Malte Wessels, Leon Trampert, Martin Johns, Mathy Vanhoef, Michael Schwarz, Thorsten Holz, Jo Van Bulck
USENIX Security
2025
PDF
Cite
SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution
Daniel Weber, Lukas Gerlach, Leon Trampert, Youheng Lue, Jo Van Bulck, Michael Schwarz
USENIX Security
2025
PDF
Code
Cite
Taming the Linux Memory Allocator for Rapid Prototyping
Ruiyi Zhang, Tristan Hornetz, Lukas Gerlach, Michael Schwarz
DIMVA
2025
PDF
Code
Cite
Rapid Reversing of Non-Linear CPU Cache Slice Functions: Unlocking Physical Address Leakage
Mikka Rainer, Lorenz Hetterich, Fabian Thomas, Tristan Hornetz, Leon Trampert, Lukas Gerlach, Michael Schwarz
S&P
2025
PDF
Code
Cite
Do Compilers Break Constant-time Guarantees?
Lukas Gerlach, Robert Pietsch, Michael Schwarz
FC
2025
PDF
Cite
Lixom: Protecting Encryption Keys with Execute-Only Memory
Tristan Hornetz, Lukas Gerlach, Michael Schwarz
FC
2025
PDF
Code
Cite
Cascading Spy Sheets: Exploiting the Complexity of Modern CSS for Email and Browser Fingerprinting
Leon Trampert, Daniel Weber, Lukas Gerlach, Christian Rossow, Michael Schwarz
NDSS
2025
PDF
Code
Cite
ShadowLoad: Injecting State into Hardware Prefetchers
Lorenz Hetterich, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang, Nils Bernsdorf, Eduard Ebert, Michael Schwarz
ASPLOS
2025
PDF
Code
Cite
Peripheral Instinct: How External Devices Breach Browser Sandboxes
Leon Trampert, Lorenz Hetterich, Lukas Gerlach, Mona Schappert, Christian Rossow, Michael Schwarz
WWW
2025
PDF
Code
Cite
2024
No Leakage Without State Change: Repurposing Configurable CPU Exceptions to Prevent Microarchitectural Attacks
Daniel Weber, Leonard Niemann, Lukas Gerlach, Jan Reineke, Michael Schwarz
ACSAC
2024
PDF
Code
Cite
CacheWarp: Software-based Fault Injection using Selective State Reset
Ruiyi Zhang, Lukas Gerlach, Daniel Weber, Lorenz Hetterich, Youheng Lü, Andreas Kogler, Michael Schwarz
USENIX Security
2024
PDF
Code
Cite
Efficient and Generic Microarchitectural Hash-Function Recovery
Lukas Gerlach, Simon Schwarz, Nicolas Faroß, Michael Schwarz
IEEE S&P
2024
PDF
Code
Cite
2023
A Rowhammer Reproduction Study Using the Blacksmith Fuzzer
Lukas Gerlach, Fabian Thomas, Robert Pietsch, Michael Schwarz
ESORICS
2023
PDF
Cite
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks
Daniel Weber, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang, Michael Schwarz
ESORICS
2023
PDF
Code
Cite
Reviving Meltdown 3a
Daniel Weber, Fabian Thomas, Lukas Gerlach, Ruiyi Zhang, Michael Schwarz
ESORICS
2023
PDF
Code
Cite
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels
Andreas Kogler, Jonas Juffinger, Lukas Giner, Lukas Gerlach, Martin Schwarzl, Michael Schwarz, Daniel Gruss, Stefan Mangard
USENIX Security
2023
PDF
Code
Cite
Hammulator: Simulate Now-Exploit Later
Fabian Thomas, Lukas Gerlach, Michael Schwarz
DRAMSec
2023
PDF
Code
Cite
A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs
Lukas Gerlach, Daniel Weber, Ruiyi Zhang, Michael Schwarz
IEEE S&P
2023
PDF
Code
Cite
Cite
×