Andreas Kogler

Orcid: 0009-0003-7314-9033

According to our database1, Andreas Kogler authored at least 19 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Remote Scheduler Contention Attacks.
CoRR, 2024

CacheWarp: Software-based Fault Injection using Selective State Reset.
Proceedings of the 33rd USENIX Security Symposium, 2024

IdleLeak: Exploiting Idle State Side Effects for Information Leakage.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

Generic and Automated Drive-by GPU Cache Attacks from the Browser.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
Side-Channel Attacks on Optane Persistent Memory.
Proceedings of the 32nd USENIX Security Symposium, 2023

Collide+Power: Leaking Inaccessible Data with Software-based Power Side Channels.
Proceedings of the 32nd USENIX Security Symposium, 2023

CSI:Rowhammer - Cryptographic Security and Integrity against Rowhammer.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

SQUIP: Exploiting the Scheduler Queue Contention Side Channel.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

PT-Guard: Integrity-Protected Page Tables to Defend Against Breakthrough Rowhammer Attacks.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
Half-Double: Hammering From the Next Row Over.
Proceedings of the 31st USENIX Security Symposium, 2022

Minefield: A Software-only Protection for SGX Enclaves against DVFS Attacks.
Proceedings of the 31st USENIX Security Symposium, 2022

Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX.
Proceedings of the 31st USENIX Security Symposium, 2022

ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture.
Proceedings of the 31st USENIX Security Symposium, 2022

Finding and Exploiting CPU Features using MSR Templating.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Robust and Scalable Process Isolation Against Spectre in the Cloud.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Domain Page-Table Isolation.
CoRR, 2021

Dynamic Process Isolation.
CoRR, 2021

PLATYPUS: Software-based Power Side-Channel Attacks on x86.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
Data Relevance and Sources for Carbon Footprint Calculation in Powertrain Production.
Proceedings of the Product Lifecycle Management Enabling Smart X, 2020


  Loading...