default search action
Moritz Lipp
Person information
- affiliation: Amazon Web Services
- affiliation (former): Graz University of Technology, Austria
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c27]Jonas Juffinger, Lukas Lamster, Andreas Kogler, Maria Eichlseder, Moritz Lipp, Daniel Gruss:
CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer. SP 2023: 1702-1718 - 2022
- [c26]Martin Schwarzl, Erik Kraft, Moritz Lipp, Daniel Gruss:
Remote Memory-Deduplication Attacks. NDSS 2022 - [c25]Andreas Kogler, Daniel Weber, Martin Haubenwallner, Moritz Lipp, Daniel Gruss, Michael Schwarz:
Finding and Exploiting CPU Features using MSR Templating. SP 2022: 1474-1490 - [c24]Moritz Lipp, Daniel Gruss, Michael Schwarz:
AMD Prefetch Attacks through Power and Time. USENIX Security Symposium 2022: 643-660 - [c23]Andreas Kogler, Jonas Juffinger, Salman Qazi, Yoongu Kim, Moritz Lipp, Nicolas Boichat, Eric Shiu, Mattias Nissler, Daniel Gruss:
Half-Double: Hammering From the Next Row Over. USENIX Security Symposium 2022: 3807-3824 - [c22]Pietro Borrello, Andreas Kogler, Martin Schwarzl, Moritz Lipp, Daniel Gruss, Michael Schwarz:
ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture. USENIX Security Symposium 2022: 3917-3934 - 2021
- [c21]Moritz Lipp, Andreas Kogler, David F. Oswald, Michael Schwarz, Catherine Easdon, Claudio Canella, Daniel Gruss:
PLATYPUS: Software-based Power Side-Channel Attacks on x86. SP 2021: 355-371 - [p1]Moritz Lipp:
Sicherheitsaspekte von Mikroarchitektur-Optimierungen. Ausgezeichnete Informatikdissertationen 2021: 161-170 - [i15]Martin Schwarzl, Erik Kraft, Moritz Lipp, Daniel Gruss:
Remote Memory-Deduplication Attacks. CoRR abs/2111.08553 (2021) - 2020
- [j2]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, Raoul Strackx:
Meltdown: reading kernel memory from user space. Commun. ACM 63(6): 46-56 (2020) - [j1]Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre attacks: exploiting speculative execution. Commun. ACM 63(7): 93-101 (2020) - [c20]Moritz Lipp, Vedad Hadzic, Michael Schwarz, Arthur Perais, Clémentine Maurice, Daniel Gruss:
Take A Way: Exploring the Security Implications of AMD's Cache Way Predictors. AsiaCCS 2020: 813-825 - [c19]Moritz Lipp, Michael Schwarz, Lukas Raab, Lukas Lamster, Misiker Tadesse Aga, Clémentine Maurice, Daniel Gruss:
Nethammer: Inducing Rowhammer Faults through Network Requests. EuroS&P Workshops 2020: 710-719 - [c18]Michael Schwarz, Moritz Lipp, Claudio Canella, Robert Schilling, Florian Kargl, Daniel Gruss:
ConTExT: A Generic Approach for Mitigating Spectre. NDSS 2020 - [c17]Jo Van Bulck, Daniel Moghimi, Michael Schwarz, Moritz Lipp, Marina Minkin, Daniel Genkin, Yuval Yarom, Berk Sunar, Daniel Gruss, Frank Piessens:
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. SP 2020: 54-72 - [c16]Daniel Moghimi, Moritz Lipp, Berk Sunar, Michael Schwarz:
Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis. USENIX Security Symposium 2020: 1427-1444
2010 – 2019
- 2019
- [c15]Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, Daniel Gruss:
ZombieLoad: Cross-Privilege-Boundary Data Sampling. CCS 2019: 753-768 - [c14]Claudio Canella, Daniel Genkin, Lukas Giner, Daniel Gruss, Moritz Lipp, Marina Minkin, Daniel Moghimi, Frank Piessens, Michael Schwarz, Berk Sunar, Jo Van Bulck, Yuval Yarom:
Fallout: Leaking Data on Meltdown-resistant CPUs. CCS 2019: 769-784 - [c13]Michael Schwarz, Martin Schwarzl, Moritz Lipp, Jon Masters, Daniel Gruss:
NetSpectre: Read Arbitrary Memory over Network. ESORICS (1) 2019: 279-299 - [c12]Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. IEEE Symposium on Security and Privacy 2019: 1-19 - [c11]Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss:
A Systematic Evaluation of Transient Execution Attacks and Defenses. USENIX Security Symposium 2019: 249-266 - [i14]Michael Schwarz, Moritz Lipp, Daniel Moghimi, Jo Van Bulck, Julian Stecklina, Thomas Prescher, Daniel Gruss:
ZombieLoad: Cross-Privilege-Boundary Data Sampling. CoRR abs/1905.05726 (2019) - [i13]Michael Schwarz, Robert Schilling, Florian Kargl, Moritz Lipp, Claudio Canella, Daniel Gruss:
ConTExT: Leakage-Free Transient Execution. CoRR abs/1905.09100 (2019) - [i12]Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Frank Piessens, Berk Sunar, Yuval Yarom:
Fallout: Reading Kernel Writes From User Space. CoRR abs/1905.12701 (2019) - 2018
- [c10]Daniel Gruss, Michael Schwarz, Matthias Wübbeling, Simon Guggi, Timo Malderle, Stefan More, Moritz Lipp:
Use-After-FreeMail: Generalizing the Use-After-Free Problem and Applying it to Email Services. AsiaCCS 2018: 297-311 - [c9]Michael Schwarz, Daniel Gruss, Moritz Lipp, Clémentine Maurice, Thomas Schuster, Anders Fogh, Stefan Mangard:
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features. AsiaCCS 2018: 587-600 - [c8]Michael Schwarz, Moritz Lipp, Daniel Gruss:
JavaScript Zero: Real JavaScript and Zero Side-Channel Attacks. NDSS 2018 - [c7]Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard:
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks. NDSS 2018 - [c6]Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom:
Another Flip in the Wall of Rowhammer Defenses. IEEE Symposium on Security and Privacy 2018: 245-261 - [c5]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown: Reading Kernel Memory from User Space. USENIX Security Symposium 2018: 973-990 - [i11]Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. CoRR abs/1801.01203 (2018) - [i10]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown. CoRR abs/1801.01207 (2018) - [i9]Moritz Lipp, Misiker Tadesse Aga, Michael Schwarz, Daniel Gruss, Clémentine Maurice, Lukas Raab, Lukas Lamster:
Nethammer: Inducing Rowhammer Faults through Network Requests. CoRR abs/1805.04956 (2018) - [i8]Michael Schwarz, Martin Schwarzl, Moritz Lipp, Daniel Gruss:
NetSpectre: Read Arbitrary Memory over Network. CoRR abs/1807.10535 (2018) - [i7]Claudio Canella, Jo Van Bulck, Michael Schwarz, Moritz Lipp, Benjamin von Berg, Philipp Ortner, Frank Piessens, Dmitry Evtyushkin, Daniel Gruss:
A Systematic Evaluation of Transient Execution Attacks and Defenses. CoRR abs/1811.05441 (2018) - [i6]Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg:
Meltdown. meltdownattack.com (2018) - [i5]Paul Kocher, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre Attacks: Exploiting Speculative Execution. meltdownattack.com (2018) - 2017
- [c4]Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, Clémentine Maurice, Stefan Mangard:
Practical Keystroke Timing Attacks in Sandboxed JavaScript. ESORICS (2) 2017: 191-209 - [c3]Daniel Gruss, Moritz Lipp, Michael Schwarz, Richard Fellner, Clémentine Maurice, Stefan Mangard:
KASLR is Dead: Long Live KASLR. ESSoS 2017: 161-176 - [i4]Michael Schwarz, Moritz Lipp, Daniel Gruss, Samuel Weiser, Clémentine Maurice, Raphael Spreitzer, Stefan Mangard:
KeyDrown: Eliminating Keystroke Timing Side-Channel Attacks. CoRR abs/1706.06381 (2017) - [i3]Daniel Gruss, Moritz Lipp, Michael Schwarz, Daniel Genkin, Jonas Juffinger, Sioli O'Connell, Wolfgang Schoechl, Yuval Yarom:
Another Flip in the Wall of Rowhammer Defenses. CoRR abs/1710.00551 (2017) - [i2]Michael Schwarz, Daniel Gruss, Moritz Lipp, Clémentine Maurice, Thomas Schuster, Anders Fogh, Stefan Mangard:
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features. CoRR abs/1711.01254 (2017) - 2016
- [c2]Daniel Gruss, Clémentine Maurice, Anders Fogh, Moritz Lipp, Stefan Mangard:
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR. CCS 2016: 368-379 - [c1]Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Clémentine Maurice, Stefan Mangard:
ARMageddon: Cache Attacks on Mobile Devices. USENIX Security Symposium 2016: 549-564 - 2015
- [i1]Moritz Lipp, Daniel Gruss, Raphael Spreitzer, Stefan Mangard:
ARMageddon: Last-Level Cache Attacks on Mobile Devices. CoRR abs/1511.04897 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint