关注
Daniel Moghimi
Daniel Moghimi
其他姓名Ahmad Moghimi
Senior Research Scientist, Google
在 google.com 的电子邮件经过验证 - 首页
标题
引用次数
年份
A Turning Point for Verified Spectre Sandboxing
S Cauligi, M Guarnieri, D Moghimi, D Stefan, M Vassena
arXiv preprint arXiv:2208.01548, 2022
2022
Abstract runtime structure for reasoning about security: Poster
M Abi-Antoun, E Khalaj, R Vanciu, A Moghimi
Proceedings of the Symposium and Bootcamp on the Science of Security, 1-3, 2016
22016
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks
F Dall, G De Micheli, T Eisenbarth, D Genkin, N Heninger, A Moghimi, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2018 …, 2018
1052018
CacheZoom: How SGX Amplifies the Power of Cache Attacks
A Moghimi, G Irazoqui, T Eisenbarth
International Conference on Cryptographic Hardware and Embedded Systems …, 2017
3842017
CopyCat: Controlled Instruction-level Attacks on Enclaves
D Moghimi, J Van Bulck, N Heninger, F Piessens, B Sunar
The 29th USENIX Security Symposium (USENIX Security 2020), 2020
712020
Data Sampling on MDS-resistant 10th Generation Intel Core (Ice Lake)
D Moghimi
arXiv preprint arXiv:2007.07428 (Whitepaper), 2020
42020
Downfall: Exploiting Speculative Data Gathering
D Moghimi
The 32th USENIX Security Symposium (USENIX Security 2023), 2023
242023
EVAX: Towards a Practical, Pro-active & Adaptive Architecture for High Performance & Security
SM Ajorpaz, D Moghimi, JN Collins, G Pokam, N Abu-Ghazaleh, ...
IEEE/ACM International Symposium on Microarchitecture (MICRO 2022), 2022
122022
Fallout: Leaking Data on Meltdown-resistant CPUs
C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ...
The 26th ACM Conference on Computer and Communications Security (CCS 2019), 2019
387*2019
Fortuneteller: Predicting microarchitectural attacks via unsupervised deep learning
B Gulmezoglu, A Moghimi, T Eisenbarth, B Sunar
arXiv preprint arXiv:1907.03651, 2019
482019
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning
E Bursztein, L Invernizzi, K Král, D Moghimi, JM Picod, M Zhang
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2024), 2024
1*2024
Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI
S Narayan, T Garfinkel, M Taram, J Rudek, D Moghimi, E Johnson, ...
28th ACM International Conference on Architectural Support for Programming …, 2023
132023
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
Z Weissman, T Tiemann, D Moghimi, E Custodio, T Eisenbarth, B Sunar
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2020), 2020
722020
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
J Van Bulck, D Moghimi, M Schwarz, M Lipp, M Minkin, D Genkin, ...
The 41st IEEE Symposium on Security and Privacy (S&P 2020), 2020
3112020
Medusa Code Repository
D Moghimi
2020
Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis
D Moghimi, M Lipp, B Sunar, M Schwarz
The 29th USENIX Security Symposium (USENIX Security 2020), 2020
902020
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations
A Moghimi, J Wichelmann, T Eisenbarth, B Sunar
International Journal of Parallel Programming 47 (4), 538-570, 2019
1622019
Microwalk: A Framework for Finding Side Channels in Binaries
J Wichelmann, A Moghimi, T Eisenbarth, B Sunar
The 34th Annual Computer Security Applications Conference (ACSAC 2018), 161-173, 2018
862018
NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems
Z Wang, M Taram, D Moghimi, S Swanson, D Tullsen, J Zhao
The 32th USENIX Security Symposium (USENIX Security 2023), 2023
162023
Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor
H Yavarzadeh, A Agarwal, M Christman, D Genkin, A Kwong, D Moghimi, ...
29th ACM International Conference on Architectural Support for Programming …, 2024
12024
系统目前无法执行此操作,请稍后再试。
文章 1–20