Jonas Juffinger
YOU?
Author Swipe
View article: An Analysis of HMB-based SSD Rowhammer
An Analysis of HMB-based SSD Rowhammer Open
Rowhammer has been shown to be an extensive attack vector. In the years since its discovery, numerous exploits have been shown, attacking a wide range of targets from kernels, through web browsers to machine learning models. These attacks …
View article: SUIT: Secure Undervolting with Instruction Traps
SUIT: Secure Undervolting with Instruction Traps Open
Artifacts for the ASPLOS 2024 paper SUIT: Secure Undervolting with Instruction Traps. artifacts.zip contains all code of the experiments used for the paper and all our results.instruction_traces.tar.gz contains the instruction traces of al…
View article: Remote Scheduler Contention Attacks
Remote Scheduler Contention Attacks Open
In this paper, we investigate unexplored aspects of scheduler contention: We systematically study the leakage of all scheduler queues on AMD Zen 3 and show that all queues leak. We mount the first scheduler contention attacks on Zen 4, wit…
View article: IdleLeak: Exploiting Idle State Side Effects for Information Leakage
IdleLeak: Exploiting Idle State Side Effects for Information Leakage Open
Modern processors are equipped with numerous features to regulate energy consumption according to the workload.For this purpose, software brings processor cores into idle states via dedicated instructions such as hlt.Recently, Intel introd…
View article: Another Flip in the Wall of Rowhammer Defenses
Another Flip in the Wall of Rowhammer Defenses Open
The Rowhammer bug allows unauthorized modification of bits in DRAM cells from unprivileged software, enabling powerful privilege-escalation attacks. Sophisticated Rowhammer countermeasures have been presented, aiming at mitigating the Rowh…