Spectre attacks: Exploiting speculative execution P Kocher, J Horn, A Fogh, D Genkin, D Gruss, W Haas, M Hamburg, ... Communications of the ACM 63 (7), 93-101, 2020 | 3179 | 2020 |
Meltdown: Reading kernel memory from user space M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, J Horn, S Mangard, ... Communications of the ACM 63 (6), 46-56, 2020 | 1962 | 2020 |
speculative execution, variant 4: speculative store bypass J Horn | 111 | 2018 |
Reading privileged memory with a side-channel J Horn Project Zero 39, 2018 | 78 | 2018 |
Speculative execution, variant 4: Speculative store bypass, 2018 J Horn URl: https://bugs. chromium. org/p/project-zero/issues/detail, 2018 | 21 | 2018 |
Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. Spectre Attacks: Exploiting Speculative Execution P Kocher, J Horn, A Fogh, D Genkin 40th IEEE Symposium on Security and Privacy (S&P’19), 2019 | 10 | 2019 |
Project Zero: Reading privileged memory with a side-channel J Horn Jan, 2018 | 10 | 2018 |
Issue 1528: speculative execution, variant 4: speculative store bypass J Horn | 7 | 2018 |
Speculative Store Bypass J Horn May, 2018 | 5 | 2018 |
Meltdown: Reading Kernel Memory from User Space J Horn, W Haas, T Prescher, D Gruss, M Lipp, S Mangard, M Schwarz 27th Security Symposium Security 18, 2018 | 5 | 2018 |
Jann Horn an d Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. Meltdown: Reading kernel memory from user space M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, A Fogh 27th USENIX Security Symposium (USENIX Security 18), 2018 | 4 | 2018 |
A cache invalidation bug in Linux memory management J Horn URL https://googleprojectzero. blogspot. com/2018/09/a-cache-invalidation …, 2018 | 4 | 2018 |
CVE-2014-7911: Android< 5. 0 Privilege Escalation using ObjectInput Stream J Horn URL: http://seclists. org/fulldisclosure/2014/Nov/51, 2014 | 4 | 2014 |
Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution P Kocher, J Horn, A Fogh, D Genkin 40th IEEE Symposium on Security and Privacy (S&P’19), 0 | 4 | |
Mitigations are attack surface, too J Horn | 3 | 2021 |
Linux Email list: CONFIG_DEBUG_INFO_BTF and CONFIG_GCC_PLUGIN_RANDSTRUCT J Horn | 3 | 2020 |
Reading privileged memory with a side-channel.(3 January 2018) J Horn | 3 | 2018 |
Cve-2014-7911: Privilege escalation using objectinputstream J Horn | 3 | 2014 |
Project zero J Horn Dosegljivo: https://googleprojectzero. blogspot. com/2018/01/reading …, 2018 | 2 | 2018 |
A cache invalidation bug in Linux memory management.(2018) J Horn | 2 | 2018 |