A Turning Point for Verified Spectre Sandboxing S Cauligi, M Guarnieri, D Moghimi, D Stefan, M Vassena arXiv preprint arXiv:2208.01548, 2022 | | 2022 |
Abstract runtime structure for reasoning about security: Poster M Abi-Antoun, E Khalaj, R Vanciu, A Moghimi Proceedings of the Symposium and Bootcamp on the Science of Security, 1-3, 2016 | 2 | 2016 |
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks F Dall, G De Micheli, T Eisenbarth, D Genkin, N Heninger, A Moghimi, ... IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2018 …, 2018 | 105 | 2018 |
CacheZoom: How SGX Amplifies the Power of Cache Attacks A Moghimi, G Irazoqui, T Eisenbarth International Conference on Cryptographic Hardware and Embedded Systems …, 2017 | 384 | 2017 |
CopyCat: Controlled Instruction-level Attacks on Enclaves D Moghimi, J Van Bulck, N Heninger, F Piessens, B Sunar The 29th USENIX Security Symposium (USENIX Security 2020), 2020 | 71 | 2020 |
Data Sampling on MDS-resistant 10th Generation Intel Core (Ice Lake) D Moghimi arXiv preprint arXiv:2007.07428 (Whitepaper), 2020 | 4 | 2020 |
Downfall: Exploiting Speculative Data Gathering D Moghimi The 32th USENIX Security Symposium (USENIX Security 2023), 2023 | 24 | 2023 |
EVAX: Towards a Practical, Pro-active & Adaptive Architecture for High Performance & Security SM Ajorpaz, D Moghimi, JN Collins, G Pokam, N Abu-Ghazaleh, ... IEEE/ACM International Symposium on Microarchitecture (MICRO 2022), 2022 | 12 | 2022 |
Fallout: Leaking Data on Meltdown-resistant CPUs C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ... The 26th ACM Conference on Computer and Communications Security (CCS 2019), 2019 | 387* | 2019 |
Fortuneteller: Predicting microarchitectural attacks via unsupervised deep learning B Gulmezoglu, A Moghimi, T Eisenbarth, B Sunar arXiv preprint arXiv:1907.03651, 2019 | 48 | 2019 |
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning E Bursztein, L Invernizzi, K Král, D Moghimi, JM Picod, M Zhang IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2024), 2024 | 1* | 2024 |
Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI S Narayan, T Garfinkel, M Taram, J Rudek, D Moghimi, E Johnson, ... 28th ACM International Conference on Architectural Support for Programming …, 2023 | 13 | 2023 |
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms Z Weissman, T Tiemann, D Moghimi, E Custodio, T Eisenbarth, B Sunar IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2020), 2020 | 72 | 2020 |
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection J Van Bulck, D Moghimi, M Schwarz, M Lipp, M Minkin, D Genkin, ... The 41st IEEE Symposium on Security and Privacy (S&P 2020), 2020 | 311 | 2020 |
Medusa Code Repository D Moghimi | | 2020 |
Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis D Moghimi, M Lipp, B Sunar, M Schwarz The 29th USENIX Security Symposium (USENIX Security 2020), 2020 | 90 | 2020 |
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations A Moghimi, J Wichelmann, T Eisenbarth, B Sunar International Journal of Parallel Programming 47 (4), 538-570, 2019 | 162 | 2019 |
Microwalk: A Framework for Finding Side Channels in Binaries J Wichelmann, A Moghimi, T Eisenbarth, B Sunar The 34th Annual Computer Security Applications Conference (ACSAC 2018), 161-173, 2018 | 86 | 2018 |
NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems Z Wang, M Taram, D Moghimi, S Swanson, D Tullsen, J Zhao The 32th USENIX Security Symposium (USENIX Security 2023), 2023 | 16 | 2023 |
Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor H Yavarzadeh, A Agarwal, M Christman, D Genkin, A Kwong, D Moghimi, ... 29th ACM International Conference on Architectural Support for Programming …, 2024 | 1 | 2024 |