ZombieLoad: Cross-Privilege-Boundary Data Sampling M Schwarz, M Lipp, D Moghimi, J Van Bulck, J Stecklina, T Prescher, ... The 26th ACM Conference on Computer and Communications Security (CCS 2019), 2019 | 513 | 2019 |
Fallout: Leaking Data on Meltdown-resistant CPUs C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ... The 26th ACM Conference on Computer and Communications Security (CCS 2019), 2019 | 387* | 2019 |
CacheZoom: How SGX Amplifies the Power of Cache Attacks A Moghimi, G Irazoqui, T Eisenbarth International Conference on Cryptographic Hardware and Embedded Systems …, 2017 | 384 | 2017 |
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection J Van Bulck, D Moghimi, M Schwarz, M Lipp, M Minkin, D Genkin, ... The 41st IEEE Symposium on Security and Privacy (S&P 2020), 2020 | 311 | 2020 |
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations A Moghimi, J Wichelmann, T Eisenbarth, B Sunar International Journal of Parallel Programming 47 (4), 538-570, 2019 | 162 | 2019 |
TPM-FAIL: TPM meets Timing and Lattice Attacks D Moghimi, B Sunar, T Eisenbarth, N Heninger The 29th USENIX Security Symposium (USENIX Security 2020), 2020 | 115 | 2020 |
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks F Dall, G De Micheli, T Eisenbarth, D Genkin, N Heninger, A Moghimi, ... IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2018 …, 2018 | 105 | 2018 |
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks S Islam, A Moghimi, I Bruhns, M Krebbel, B Gulmezoglu, T Eisenbarth, ... The 28th USENIX Security Symposium (USENIX Security 2019), 2019 | 96 | 2019 |
Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis D Moghimi, M Lipp, B Sunar, M Schwarz The 29th USENIX Security Symposium (USENIX Security 2020), 2020 | 90 | 2020 |
Microwalk: A Framework for Finding Side Channels in Binaries J Wichelmann, A Moghimi, T Eisenbarth, B Sunar The 34th Annual Computer Security Applications Conference (ACSAC 2018), 161-173, 2018 | 86 | 2018 |
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms Z Weissman, T Tiemann, D Moghimi, E Custodio, T Eisenbarth, B Sunar IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2020), 2020 | 72 | 2020 |
CopyCat: Controlled Instruction-level Attacks on Enclaves D Moghimi, J Van Bulck, N Heninger, F Piessens, B Sunar The 29th USENIX Security Symposium (USENIX Security 2020), 2020 | 71 | 2020 |
Swivel: Hardening WebAssembly against Spectre S Narayan, C Disselkoen, D Moghimi, S Cauligi, E Johnson, Z Gang, ... The 30th USENIX Security Symposium (USENIX Security 2021), 2021 | 64 | 2021 |
Fortuneteller: Predicting microarchitectural attacks via unsupervised deep learning B Gulmezoglu, A Moghimi, T Eisenbarth, B Sunar arXiv preprint arXiv:1907.03651, 2019 | 48 | 2019 |
SoK: Practical Foundations for Spectre Defenses S Cauligi, C Disselkoen, D Moghimi, G Barthe, D Stefan The 43st IEEE Symposium on Security and Privacy (S&P 2022), 2022 | 45* | 2022 |
Downfall: Exploiting Speculative Data Gathering D Moghimi The 32th USENIX Security Symposium (USENIX Security 2023), 2023 | 24 | 2023 |
NVLeak: Off-Chip Side-Channel Attacks via Non-Volatile Memory Systems Z Wang, M Taram, D Moghimi, S Swanson, D Tullsen, J Zhao The 32th USENIX Security Symposium (USENIX Security 2023), 2023 | 16 | 2023 |
Going beyond the Limits of SFI: Flexible and Secure Hardware-Assisted In-Process Isolation with HFI S Narayan, T Garfinkel, M Taram, J Rudek, D Moghimi, E Johnson, ... 28th ACM International Conference on Architectural Support for Programming …, 2023 | 13 | 2023 |
EVAX: Towards a Practical, Pro-active & Adaptive Architecture for High Performance & Security SM Ajorpaz, D Moghimi, JN Collins, G Pokam, N Abu-Ghazaleh, ... IEEE/ACM International Symposium on Microarchitecture (MICRO 2022), 2022 | 12 | 2022 |
Subverting without EIP D Moghimi https://web.archive.org/web/20220907000257/https://moghimi.org/blog …, 2014 | 9 | 2014 |