Daniel Moghimi
Title
Cited by
Cited by
Year
CacheZoom: How SGX Amplifies the Power of Cache Attacks
A Moghimi, G Irazoqui, T Eisenbarth
International Conference on Cryptographic Hardware and Embedded Systems …, 2017
1532017
ZombieLoad: Cross-Privilege-Boundary Data Sampling
M Schwarz, M Lipp, D Moghimi, J Van Bulck, J Stecklina, T Prescher, ...
The 26th ACM Conference on Computer and Communications Security (CCS 2019), 2019
802019
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations
A Moghimi, J Wichelmann, T Eisenbarth, B Sunar
International Journal of Parallel Programming 47 (4), 538-570, 2019
49*2019
Fallout: Leaking Data on Meltdown-resistant CPUs
C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ...
The 26th ACM Conference on Computer and Communications Security (CCS 2019), 2019
48*2019
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks
S Islam, A Moghimi, I Bruhns, M Krebbel, B Gulmezoglu, T Eisenbarth, ...
The 28th USENIX Security Symposium (USENIX Security 2019), 2019
362019
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks
F Dall, G De Micheli, T Eisenbarth, D Genkin, N Heninger, A Moghimi, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2018 …, 2018
352018
Microwalk: A Framework for Finding Side Channels in Binaries
J Wichelmann, A Moghimi, T Eisenbarth, B Sunar
The 34th Annual Computer Security Applications Conference (ACSAC 2018), 161-173, 2018
172018
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
J Van Bulck, D Moghimi, M Schwarz, M Lipp, M Minkin, D Genkin, ...
The 41st IEEE Symposium on Security and Privacy (S&P 2020), 2020
122020
TPM-FAIL: TPM meets Timing and Lattice Attacks
D Moghimi, B Sunar, T Eisenbarth, N Heninger
The 29th USENIX Security Symposium (USENIX Security 2020), 2020
62020
Subverting without EIP
D Moghimi
http://www.moghimi.org/subverting-without-eip/, 2014
42014
CopyCat: Controlled instruction-level attacks on enclaves
D Moghimi, J Van Bulck, N Heninger, F Piessens, B Sunar
The 29th USENIX Security Symposium (USENIX Security 2020), 2020
3*2020
Fortuneteller: Predicting microarchitectural attacks via unsupervised deep learning
B Gulmezoglu, A Moghimi, T Eisenbarth, B Sunar
arXiv preprint arXiv:1907.03651, 2019
22019
Abstract runtime structure for reasoning about security: Poster
M Abi-Antoun, E Khalaj, R Vanciu, A Moghimi
Proceedings of the Symposium and Bootcamp on the Science of Security, 1-3, 2016
22016
Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis
D Moghimi, M Lipp, B Sunar, M Schwarz
The 29th USENIX Security Symposium (USENIX Security 2020), 2020
12020
Side-Channel Attacks on Intel SGX: How SGX Amplifies The Power of Cache Attack
A Moghimi
Worcester Polytechnic Institute (Master Thesis), 2017
12017
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
Z Weissman, T Tiemann, D Moghimi, E Custodio, T Eisenbarth, B Sunar
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2020), 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–16