Martin Unterguggenberger

Orcid: 0000-0002-2713-192X

According to our database1, Martin Unterguggenberger authored at least 11 papers between 2022 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
TME-Box: Scalable In-Process Isolation through Intel TME-MK Memory Encryption.
CoRR, 2024

SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel.
Proceedings of the 33rd USENIX Security Symposium, 2024

Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC.
Proceedings of the 33rd USENIX Security Symposium, 2024

Memory Tagging using Cryptographic Integrity on Commodity x86 CPUs.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

2023
HashTag: Hash-based Integrity Protection for Tagged Architectures.
Proceedings of the 32nd USENIX Security Symposium, 2023

MEMES: Memory Encryption-Based Memory Safety on Commodity Hardware.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

SCFI: State Machine Control-Flow Hardening Against Fault Attacks.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2023

Cryptographically Enforced Memory Safety.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Multi-Tag: A Hardware-Software Co-Design for Memory Safety based on Multi-Granular Memory Tagging.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

SPEAR-V: Secure and Practical Enclave Architecture for RISC-V.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
SFP: Providing System Call Flow Protection against Software and Fault Attacks.
Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, 2022


  Loading...