RIDL: Rogue in-flight data load S Van Schaik, A Milburn, S Österlund, P Frigo, G Maisuradze, K Razavi, ... 2019 IEEE Symposium on Security and Privacy (SP), 88-105, 2019 | 498 | 2019 |
ret2spec: Speculative execution using return stack buffers G Maisuradze, C Rossow Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 300 | 2018 |
What Cannot Be Read, Cannot Be Leveraged? Revisiting Assumptions of {JIT-ROP} Defenses G Maisuradze, M Backes, C Rossow 25th USENIX Security Symposium (USENIX Security 16), 139-156, 2016 | 56 | 2016 |
Speculose: Analyzing the security implications of speculative execution in CPUs G Maisuradze, C Rossow arXiv preprint arXiv:1801.04084, 2018 | 31 | 2018 |
Dachshund: digging for and securing against (non-) blinded constants in jit code G Maisuradze, M Backes, C Rossow Symposium on Network and Distributed System Security (NDSS), 2017 | 26* | 2017 |
Addendum to RIDL: Rogue in-flight data load.(2019) S van Schaik, A Milburn, S Osterlund, P Frigo, G Maisuradze, K Razavi, ... | 2 | 2019 |
Assessing the security of hardware-assisted isolation techniques G Maisuradze Saarländische Universitäts-und Landesbibliothek, 2019 | 1 | 2019 |