Follow
Daniel Moghimi
Title
Cited by
Cited by
Year
ZombieLoad: Cross-Privilege-Boundary Data Sampling
M Schwarz, M Lipp, D Moghimi, J Van Bulck, J Stecklina, T Prescher, ...
The 26th ACM Conference on Computer and Communications Security (CCS 2019), 2019
3502019
CacheZoom: How SGX Amplifies the Power of Cache Attacks
A Moghimi, G Irazoqui, T Eisenbarth
International Conference on Cryptographic Hardware and Embedded Systems …, 2017
2962017
Fallout: Leaking Data on Meltdown-resistant CPUs
C Canella, D Genkin, L Giner, D Gruss, M Lipp, M Minkin, D Moghimi, ...
The 26th ACM Conference on Computer and Communications Security (CCS 2019), 2019
2002019
LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection
J Van Bulck, D Moghimi, M Schwarz, M Lipp, M Minkin, D Genkin, ...
The 41st IEEE Symposium on Security and Privacy (S&P 2020), 2020
1792020
MemJam: A False Dependency Attack Against Constant-Time Crypto Implementations
A Moghimi, J Wichelmann, T Eisenbarth, B Sunar
International Journal of Parallel Programming 47 (4), 538-570, 2019
1202019
CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks
F Dall, G De Micheli, T Eisenbarth, D Genkin, N Heninger, A Moghimi, ...
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2018 …, 2018
792018
TPM-FAIL: TPM meets Timing and Lattice Attacks
D Moghimi, B Sunar, T Eisenbarth, N Heninger
The 29th USENIX Security Symposium (USENIX Security 2020), 2020
702020
SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks
S Islam, A Moghimi, I Bruhns, M Krebbel, B Gulmezoglu, T Eisenbarth, ...
The 28th USENIX Security Symposium (USENIX Security 2019), 2019
672019
Fallout: Reading kernel writes from user space
M Minkin, D Moghimi, M Lipp, M Schwarz, J Van Bulck, D Genkin, D Gruss, ...
arXiv preprint arXiv:1905.12701, 2019
652019
Microwalk: A Framework for Finding Side Channels in Binaries
J Wichelmann, A Moghimi, T Eisenbarth, B Sunar
The 34th Annual Computer Security Applications Conference (ACSAC 2018), 161-173, 2018
592018
Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis
D Moghimi, M Lipp, B Sunar, M Schwarz
The 29th USENIX Security Symposium (USENIX Security 2020), 2020
472020
JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms
Z Weissman, T Tiemann, D Moghimi, E Custodio, T Eisenbarth, B Sunar
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2020), 2020
382020
CopyCat: Controlled Instruction-level Attacks on Enclaves
D Moghimi, J Van Bulck, N Heninger, F Piessens, B Sunar
The 29th USENIX Security Symposium (USENIX Security 2020), 2020
352020
Swivel: Hardening WebAssembly against Spectre
S Narayan, C Disselkoen, D Moghimi, S Cauligi, E Johnson, Z Gang, ...
The 30th USENIX Security Symposium (USENIX Security 2021), 2021
292021
Fortuneteller: Predicting microarchitectural attacks via unsupervised deep learning
B Gulmezoglu, A Moghimi, T Eisenbarth, B Sunar
arXiv preprint arXiv:1907.03651, 2019
282019
Subverting without EIP
D Moghimi
https://web.archive.org/web/20220907000257/https://moghimi.org/blog …, 2014
82014
SoK: Practical Foundations for Spectre Defenses
S Cauligi, C Disselkoen, D Moghimi, G Barthe, D Stefan
The 43st IEEE Symposium on Security and Privacy (S&P 2022), 2022
6*2022
Data Sampling on MDS-resistant 10th Generation Intel Core (Ice Lake)
D Moghimi
arXiv preprint arXiv:2007.07428 (Whitepaper), 2020
42020
Side-Channel Attacks on Intel SGX: How SGX Amplifies The Power of Cache Attack
A Moghimi
Worcester Polytechnic Institute (Master Thesis), 2017
42017
Scream: Sensory channel remote execution attack methods
N Brown, N Patel, P Plenefisch, A Moghimi, T Eisenbarth, C Shue, ...
Usenix Security Symposium (Poster), 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20