Clémentine Maurice
Clémentine Maurice
Univ Rennes, CNRS, IRISA
Bestätigte E-Mail-Adresse bei irisa.fr - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Flush+Flush: A Fast and Stealthy Cache Attack
D Gruss, C Maurice, K Wagner, S Mangard
13th Conference on Detection of Intrusions and Malware & Vulnerability …, 2016
3042016
ARMageddon: Cache Attacks on Mobile Devices.
M Lipp, D Gruss, R Spreitzer, C Maurice, S Mangard
USENIX Security Symposium, 549-564, 2016
2922016
Malware Guard Extension: abusing Intel SGX to conceal cache attacks
M Schwarz, S Weiser, D Gruss, C Maurice, S Mangard
Cybersecurity 3 (1), 2, 2020
284*2020
Rowhammer.js: A Remote Software-Induced Fault Attack in JavaScript
D Gruss, C Maurice, S Mangard
13th Conference on Detection of Intrusions and Malware & Vulnerability …, 2016
2462016
DRAMA: Exploiting DRAM Addressing for Cross-CPU Attacks
P Pessl, D Gruss, C Maurice, M Schwarz, S Mangard
25th USENIX Security Symposium (USENIX Security 16), 2016
226*2016
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
V van der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ...
23rd ACM Conference on Computer and Communications Security (CCS'16), 1675-1689, 2016
1772016
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR
D Gruss, C Maurice, A Fogh, M Lipp, S Mangard
23rd ACM Conference on Computer and Communications Security (CCS'16), 2016
1512016
Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters
C Maurice, N Le Scouarnec, C Neumann, O Heen, A Francillon
18th International Symposium on Research in Attacks, Intrusions and Defenses …, 2015
1462015
KASLR is Dead: Long Live KASLR
D Gruss, M Lipp, M Schwarz, R Fellner, C Maurice, S Mangard
International Symposium on Engineering Secure Software and Systems (ESSoS'17), 2017
1442017
Hello from the other side: SSH over robust cache covert channels in the cloud
C Maurice, M Weber, M Schwartz, L Giner, D Gruss, CA Boano, K Römer, ...
Network and Distributed System Security Symposium 2017 (NDSS'17), 2017
1042017
C5: Cross-Cores Cache Covert Channel
C Maurice, C Neumann, O Heen, A Francillon
12th Conference on Detection of Intrusions and Malware & Vulnerability …, 2015
752015
Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript
M Schwarz, C Maurice, D Gruss, S Mangard
Financial Cryptography and Data Security 2017 (FC'17), 2017
642017
Confidentiality Issues on a GPU in a Virtualized Environment
C Maurice, C Neumann, O Heen, A Francillon
Financial Cryptography and Data Security 2014 (FC'14), 2014
462014
Nethammer: Inducing rowhammer faults through network requests
M Lipp, M Schwarz, L Raab, L Lamster, MT Aga, C Maurice, D Gruss
2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2020
362020
Practical Keystroke Timing Attacks in Sandboxed JavaScript
M Lipp, D Gruss, M Schwarz, D Bidner, C Maurice, S Mangard
European Symposium on Research in Computer Security (ESORICS'17), 191-209, 2017
312017
KeyDrown: Eliminating Software-Based Keystroke Timing Side-Channel Attacks
M Schwarz, M Lipp, D Gruss, S Weiser, C Maurice, R Spreitzer, ...
Network and Distributed System Security Symposium 2018 (NDSS'18), 2018
302018
Automated Detection, Exploitation, and Elimination of Double-Fetch Bugs using Modern CPU Features
M Schwarz, D Gruss, M Lipp, C Maurice, T Schuster, A Fogh, S Mangard
13th ACM ASIA Conference on Computer and Communications Security (ASIACCS'18), 2018
282018
Improving 802.11 Fingerprinting of Similar Devices by Cooperative Fingerprinting
C Maurice, S Onno, C Neumann, O Heen, A Francillon
International Conference on Security and Cryptography (SECRYPT), 2013
132013
Method and device for countering fingerprint forgery attacks in a communication system
C Neumann, O Heen, C Maurice, S Onno
US Patent 9,143,528, 2015
52015
Take A Way: Exploring the Security Implications of AMD’s Cache Way Predictors
M Lipp, V Hadžić, M Schwarz, A Perais, C Maurice, D Gruss
15th ACM ASIA Conference on Computer and Communications Security (ASIACCS'20), 2020
32020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20