Lukas Gerlach
Lukas Gerlach
Home
Publications
Talks
Light
Dark
Automatic
paper-conference
CacheWarp: Software-based Fault Injection using Selective State Reset
AMD SEV is a trusted-execution environment (TEE), providing confidentiality and integrity for virtual machines (VMs). With AMD SEV, it …
Ruiyi Zhang
,
Lukas Gerlach
,
Daniel Weber
,
Lorenz Hetterich
,
Youheng Lü
,
Andreas Kogler
,
Michael Schwarz
PDF
Cite
Code
Website
Efficient and Generic Microarchitectural Hash-Function Recovery
Modern CPUs use a variety of undocumented microarchitectural hash functions to efficiently distribute data within microarchitectural …
Lukas Gerlach
,
Simon Schwarz
,
Nicolas Faroß
,
Michael Schwarz
PDF
Cite
Code
A Rowhammer Reproduction Study Using the Blacksmith Fuzzer
Rowhammer is a hardware vulnerability that can be exploited to induce bit flips in dynamic random access memory (DRAM), compromising …
Lukas Gerlach
,
Fabian Thomas
,
Robert Pietsch
,
Michael Schwarz
Cite
Indirect Meltdown: Building Novel Side-Channel Attacks from Transient-Execution Attacks
The transient-execution attack Meltdown leaks sensitive information by transiently accessing inaccessible data during out-of-order …
Daniel Weber
,
Fabian Thomas
,
Lukas Gerlach
,
Ruiyi Zhang
,
Michael Schwarz
PDF
Cite
Code
Reviving Meltdown 3a
Since the initial discovery of Meltdown and Spectre in 2017, different variants of these attacks have been discovered. One often …
Daniel Weber
,
Fabian Thomas
,
Lukas Gerlach
,
Ruiyi Zhang
,
Michael Schwarz
PDF
Cite
Code
Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels
Differential Power Analysis (DPA) measures single-bit differences between data values used in computer systems by statistical analysis …
Andreas Kogler
,
Jonas Juffinger
,
Lukas Giner
,
Lukas Gerlach
,
Martin Schwarzl
,
Michael Schwarz
,
Daniel Gruss
,
Stefan Mangard
PDF
Cite
Code
Video
Hammulator: Simulate Now-Exploit Later
Rowhammer, first considered a reliability issue, turned out to be a significant threat to the security of systems. Hence, several …
Fabian Thomas
,
Lukas Gerlach
,
Michael Schwarz
PDF
Cite
Code
Video
A Security RISC: Microarchitectural Attacks on Hardware RISC-V CPUs
Microarchitectural attacks threaten the security of computer systems even in the absence of software vulnerabilities. Such attacks are …
Lukas Gerlach
,
Daniel Weber
,
Ruiyi Zhang
,
Michael Schwarz
PDF
Cite
Code
Video
Cite
×