Follow
Andreas Kogler
Andreas Kogler
Verified email at iaik.tugraz.at - Homepage
Title
Cited by
Cited by
Year
PLATYPUS: Software-based power side-channel attacks on x86
M Lipp, A Kogler, D Oswald, M Schwarz, C Easdon, C Canella, D Gruss
2021 IEEE Symposium on Security and Privacy (SP), 355-371, 2021
1792021
{Half-Double}: Hammering from the next row over
A Kogler, J Juffinger, S Qazi, Y Kim, M Lipp, N Boichat, E Shiu, M Nissler, ...
31st USENIX Security Symposium (USENIX Security 22), 3807-3824, 2022
522022
{ĈPIC} leak: Architecturally leaking uninitialized data from the microarchitecture
P Borrello, A Kogler, M Schwarzl, M Lipp, D Gruss, M Schwarz
31st USENIX Security Symposium (USENIX Security 22), 3917-3934, 2022
492022
CSI: Rowhammer–Cryptographic security and integrity against rowhammer
J Juffinger, L Lamster, A Kogler, M Eichlseder, M Lipp, D Gruss
2023 IEEE Symposium on Security and Privacy (SP), 1702-1718, 2023
292023
Squip: Exploiting the scheduler queue contention side channel
S Gast, J Juffinger, M Schwarzl, G Saileshwar, A Kogler, S Franza, M Köstl, ...
2023 IEEE Symposium on Security and Privacy (SP), 2256-2272, 2023
142023
{Side-Channel} Attacks on Optane Persistent Memory
S Liu, S Kanniwadi, M Schwarzl, A Kogler, D Gruss, S Khan
32nd USENIX Security Symposium (USENIX Security 23), 6807-6824, 2023
142023
Robust and scalable process isolation against spectre in the cloud
M Schwarzl, P Borrello, A Kogler, K Varda, T Schuster, M Schwarz, ...
European Symposium on Research in Computer Security, 167-186, 2022
122022
Minefield: A Software-only Protection for {SGX} Enclaves against {DVFS} Attacks
A Kogler, D Gruss, M Schwarz
31st USENIX Security Symposium (USENIX Security 22), 4147-4164, 2022
102022
Dynamic process isolation
M Schwarzl, P Borrello, A Kogler, K Varda, T Schuster, D Gruss, ...
arXiv preprint arXiv:2110.04751, 2021
102021
Pt-guard: Integrity-protected page tables to defend against breakthrough rowhammer attacks
A Saxena, G Saileshwar, J Juffinger, A Kogler, D Gruss, M Qureshi
2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2023
82023
Finding and Exploiting CPU Features using MSR Templating
A Kogler, D Weber, M Haubenwallner, M Lipp, D Gruss, M Schwarz
2022 IEEE Symposium on Security and Privacy (SP), 1474-1490, 2022
82022
Repurposing Segmentation as a Practical {LVI-NULL} Mitigation in {SGX}
L Giner, A Kogler, C Canella, M Schwarz, D Gruss
31st USENIX Security Symposium (USENIX Security 22), 3111-3127, 2022
62022
{Collide+ Power}: Leaking Inaccessible Data with Software-based Power Side Channels
A Kogler, J Juffinger, L Giner, L Gerlach, M Schwarzl, M Schwarz, D Gruss, ...
32nd USENIX Security Symposium (USENIX Security 23), 7285-7302, 2023
42023
Domain Page-Table Isolation
C Canella, A Kogler, L Giner, D Gruss, M Schwarz
arXiv preprint arXiv:2111.10876, 2021
42021
CacheWarp: Software-based Fault Injection using Selective State Reset
R Zhang, CH Center, L Gerlach, D Weber, L Hetterich, Y Lü, A Kogler, ...
32024
Remote Scheduler Contention Attacks
S Gast, J Juffinger, L Maar, C Royer, A Kogler, D Gruss
Financial Cryptography and Data Security 2024, 2024
12024
Generic and Automated Drive-by GPU Cache Attacks from the Browser
L Giner, R Czerny, C Gruber, F Rauscher, A Kogler, DDA Braga, D Gruss
2024 ACM ASIA Conference on Computer and Communications Security, 2024
2024
IdleLeak: Exploiting Idle State Side Effects for Information Leakage
F Rauscher, A Kogler, J Juffinger, D Gruss
Network and Distributed System Security (NDSS) Symposium 2024, 2024
2024
Robust and Scalable Process Isolation against Spectre in the Cloud (Extended Version)
M Schwarzl, P Borrello, A Kogler, K Varda, T Schuster, M Schwarz, ...
The system can't perform the operation now. Try again later.
Articles 1–19