Michael Schwarz
TitleCited byYear
Spectre Attacks: Exploiting Speculative Execution
P Kocher, D Genkin, D Gruss, W Haas, M Hamburg, M Lipp, S Mangard, ...
40th IEEE Symposium on Security and Privacy (S&P'19), 2019
6942019
Meltdown: Reading Kernel Memory from User Space
M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, A Fogh, J Horn, ...
27th USENIX Security Symposium (USENIX Security 18), 2018
628*2018
Malware Guard Extension: Using SGX to Conceal Cache Attacks
M Schwarz, S Weiser, D Gruss, C Maurice, S Mangard
14th Conference on Detection of Intrusions and Malware & Vulnerability …, 2017
2092017
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
P Pessl, D Gruss, C Maurice, M Schwarz, S Mangard
25th USENIX Security Symposium, 2016
165*2016
KASLR is Dead: Long Live KASLR
D Gruss, M Lipp, M Schwarz, R Fellner, C Maurice, S Mangard
International Symposium on Engineering Secure Software and Systems, 161-176, 2017
922017
Hello from the Other Side: SSH over Robust Cache Covert Channels in the Cloud
C Maurice, M Weber, M Schwarz, L Giner, D Gruss, CA Boano, K Römer, ...
NDSS, San Diego, CA, US, 2017
722017
Another Flip in the Wall of Rowhammer Defenses
D Gruss, M Lipp, M Schwarz, D Genkin, J Juffinger, S O'Connell, ...
39th IEEE Symposium on Security and Privacy (S&P'18), 2018
562018
NetSpectre: Read Arbitrary Memory over Network
M Schwarz, M Schwarzl, M Lipp, D Gruss
24th European Symposium on Research in Computer Security, 2018
532018
A Systematic Evaluation of Transient Execution Attacks and Defenses
C Canella, J Van Bulck, M Schwarz, M Lipp, B von Berg, P Ortner, ...
28th USENIX Security Symposium (USENIX Security 19), 249-266, 2019
512019
Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript
M Schwarz, C Maurice, D Gruss, S Mangard
Financial Cryptography and Data Security 2017 (FC), 2017
382017
ZombieLoad: Cross-Privilege-Boundary Data Sampling
M Schwarz, M Lipp, D Moghimi, J Van Bulck, J Stecklina, T Prescher, ...
26th ACM Conference on Computer and Communications Security, 2019
252019
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
M Schwarz, M Lipp, D Gruss, S Weiser, C Maurice, R Spreitzer, ...
NDSS, San Diego, CA, US, 2018
24*2018
Practical Keystroke Timing Attacks in Sandboxed JavaScript
M Lipp, D Gruss, M Schwarz, D Bidner, C Maurice, S Mangard
European Symposium on Research in Computer Security, 191-209, 2017
242017
Nethammer: Inducing Rowhammer Faults through Network Requests
M Lipp, MT Aga, M Schwarz, D Gruss, C Maurice, L Raab, L Lamster
arXiv preprint arXiv:1805.04956, 2018
232018
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features
M Schwarz, D Gruss, M Lipp, C Maurice, T Schuster, A Fogh, S Mangard
13th ACM ASIA Conference on Information, Computer and Communications Security, 2018
152018
JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks
M Schwarz, M Lipp, D Gruss
NDSS, San Diego, CA, US, 2018
132018
Recturk: Constraint-based recommendation based on human computation
A Felfernig, S Haas, G Ninaus, M Schwarz, T Ulz, M Stettinger, K Isak, ...
RecSys 2014 CrowdRec Workshop, 1-6, 2014
132014
Fallout: Leaking Data on Meltdown-resistant CPUs
C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
12*2019
Practical Enclave Malware with Intel SGX
M Schwarz, S Weiser, D Gruss
International Conference on Detection of Intrusions and Malware, and …, 2019
92019
Human computation for constraint-based recommenders
T Ulz, M Schwarz, A Felfernig, S Haas, A Shehadeh, S Reiterer, ...
Journal of Intelligent Information Systems 49 (1), 37-57, 2017
92017
The system can't perform the operation now. Try again later.
Articles 1–20