Follow
Raoul Strackx
Raoul Strackx
Fortanix
Verified email at fortanix.com
Title
Cited by
Cited by
Year
Meltdown: Reading kernel memory from user space
M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, J Horn, S Mangard, ...
Communications of the ACM 63 (6), 46-56, 2020
12432020
Foreshadow: Extracting the Keys to the Intel {SGX} Kingdom with Transient {Out-of-Order} Execution
J Van Bulck, M Minkin, O Weisse, D Genkin, B Kasikci, F Piessens, ...
27th USENIX Security Symposium (USENIX Security 18), 991–1008, 2018
9672018
Sancus: Low-cost trustworthy extensible networked devices with a zero-software trusted computing base
J Noorman, P Agten, W Daniels, R Strackx, A Van Herrewege, C Huygens, ...
22nd USENIX Security Symposium (USENIX Security 13), 479-498, 2013
2802013
Telling Your Secrets without Page Faults: Stealthy Page {Table-Based} Attacks on Enclaved Execution
J Van Bulck, N Weichbrodt, R Kapitza, F Piessens, R Strackx
26th USENIX Security Symposium (USENIX Security 17), 1041-1056, 2017
2452017
Breaking the memory secrecy assumption
R Strackx, Y Younan, P Philippaerts, F Piessens, S Lachmund, T Walter
Proceedings of the Second European Workshop on System Security, 1-8, 2009
2132009
Foreshadow-NG: Breaking the virtual memory abstraction with transient out-of-order execution
O Weisse, J Van Bulck, M Minkin, D Genkin, B Kasikci, F Piessens, ...
1762018
SGX-Step: A practical attack framework for precise enclave execution control
J Van Bulck, F Piessens, R Strackx
Proceedings of the 2nd Workshop on System Software for Trusted Execution, 1-6, 2017
1642017
Fides: Selectively hardening software application components against kernel-level or process-level malware
R Strackx, F Piessens
Proceedings of the 19th ACM conference on Computer and Communications …, 2012
1252012
Efficient Isolation of Trusted Subsystems in Embedded Systems
R Strackx, F Piessens, B Preneel
Security and Privacy in Communication Networks, 344-361, 2010
1232010
Secure compilation to protected module architectures
M Patrignani, P Agten, R Strackx, B Jacobs, D Clarke, F Piessens
ACM transactions on programming languages and systems (TOPLAS) 37 (2), 1-50, 2015
1092015
Ariadne: A minimal approach to state continuity
R Strackx, F Piessens
25th USENIX Security Symposium (USENIX Security 16), 875-892, 2016
962016
Secure compilation to modern processors
P Agten, R Strackx, B Jacobs, F Piessens
942012
Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic
J Van Bulck, F Piessens, R Strackx
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
892018
{Dependence-Preserving} Data Compaction for Scalable Forensic Analysis
MN Hossain, J Wang, O Weisse, R Sekar, D Genkin, B He, SD Stoller, ...
27th USENIX Security Symposium (USENIX Security 18), 1723-1740, 2018
752018
ICE: A passive, high-speed, state-continuity scheme
R Strackx, B Jacobs, F Piessens
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
432014
Protected software module architectures
R Strackx, J Noorman, I Verbauwhede, B Preneel, F Piessens
ISSE 2013 Securing Electronic Business Processes, 241-251, 2013
342013
Off-limits: Abusing legacy x86 memory segmentation to spy on enclaved execution
J Gyselinck, J Van Bulck, F Piessens, R Strackx
International Symposium on Engineering Secure Software and Systems, 44-60, 2018
262018
The Heisenberg defense: Proactively defending SGX enclaves against page-table-based side-channel attacks
R Strackx, F Piessens
arXiv preprint arXiv:1712.08519, 2017
252017
Mitigating password database breaches with Intel SGX
H Brekalo, R Strackx, F Piessens
Proceedings of the 1st Workshop on System Software for Trusted Execution, 1-6, 2016
192016
Breaking virtual memory protection and the SGX ecosystem with foreshadow
J Van Bulck, M Minkin, O Weisse, D Genkin, B Kasikci, F Piessens, ...
Ieee Micro 39 (3), 66-74, 2019
182019
The system can't perform the operation now. Try again later.
Articles 1–20