default search action
Kaveh Razavi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j1]Lois Orosa, Ulrich Rührmair, Abdullah Giray Yaglikçi, Haocong Luo, Ataberk Olgun, Patrick Jattke, Minesh Patel, Jeremie S. Kim, Kaveh Razavi, Onur Mutlu:
SpyHammer: Understanding and Exploiting RowHammer Under Fine-Grained Temperature Variations. IEEE Access 12: 80986-81003 (2024) - [c54]Michele Marazzi, Patrick Jattke, Jason Zibung, Kaveh Razavi:
PayRide: Secure Transport e-Ticketing with Untrusted Smartphone Location. DIMVA 2024: 261-282 - [c53]Michele Marazzi, Tristan Sachsenweger, Flavien Solt, Peng Zeng, Kubo Takashi, Maksym Yarema, Kaveh Razavi:
HiFi-DRAM: Enabling High-fidelity DRAM Research by Uncovering Sense Amplifiers with IC Imaging. ISCA 2024: 133-149 - [c52]Patrick Jattke, Max Wipfli, Flavien Solt, Michele Marazzi, Matej Bölcskei, Kaveh Razavi:
ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms. USENIX Security Symposium 2024 - [c51]Flavien Solt, Katharina Ceesay-Seitz, Kaveh Razavi:
Cascade: CPU Fuzzing via Intricate Program Generation. USENIX Security Symposium 2024 - 2023
- [c50]Johannes Wikner, Daniël Trujillo, Kaveh Razavi:
Phantom: Exploiting Decoder-detectable Mispredictions. MICRO 2023: 49-61 - [c49]Michele Marazzi, Flavien Solt, Patrick Jattke, Kubo Takashi, Kaveh Razavi:
REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations. SP 2023: 1684-1701 - [c48]Daniël Trujillo, Johannes Wikner, Kaveh Razavi:
Inception: Exposing New Attack Surfaces with Training in Transient Execution. USENIX Security Symposium 2023: 7303-7320 - 2022
- [c47]Andrei Bacs, Saidgani Musaev, Kaveh Razavi, Cristiano Giuffrida, Herbert Bos:
DUPEFS: Leaking Data Over the Network With Filesystem Deduplication Side Channels. FAST 2022: 281-296 - [c46]Flavien Solt, Patrick Jattke, Kaveh Razavi:
RemembERR: Leveraging Microprocessor Errata for Design Testing and Validation. MICRO 2022: 1126-1143 - [c45]Brian Johannesmeyer, Jakob Koschel, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:
Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel. NDSS 2022 - [c44]Patrick Jattke, Victor van der Veen, Pietro Frigo, Stijn Gunter, Kaveh Razavi:
BLACKSMITH: Scalable Rowhammering in the Frequency Domain. SP 2022: 716-734 - [c43]Michele Marazzi, Patrick Jattke, Flavien Solt, Kaveh Razavi:
ProTRR: Principled yet Optimal In-DRAM Target Row Refresh. SP 2022: 735-753 - [c42]Flavien Solt, Ben Gras, Kaveh Razavi:
CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL. USENIX Security Symposium 2022: 2549-2566 - [c41]Johannes Wikner, Kaveh Razavi:
RETBLEED: Arbitrary Speculative Code Execution with Return Instructions. USENIX Security Symposium 2022: 3825-3842 - [i6]Lois Orosa, Ulrich Rührmair, Abdullah Giray Yaglikçi, Haocong Luo, Ataberk Olgun, Patrick Jattke, Minesh Patel, Jeremie S. Kim, Kaveh Razavi, Onur Mutlu:
SpyHammer: Using RowHammer to Remotely Spy on Temperature. CoRR abs/2210.04084 (2022) - 2021
- [c40]Lois Orosa, Yaohua Wang, Mohammad Sadrosadati, Jeremie S. Kim, Minesh Patel, Ivan Puddu, Haocong Luo, Kaveh Razavi, Juan Gómez-Luna, Hasan Hassan, Nika Mansouri-Ghiasi, Saugata Ghose, Onur Mutlu:
CODIC: A Low-Cost Substrate for Enabling Custom In-DRAM Functionalities and Optimizations. ISCA 2021: 484-497 - [c39]Hasan Hassan, Yahya Can Tugrul, Jeremie S. Kim, Victor van der Veen, Kaveh Razavi, Onur Mutlu:
Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications. MICRO 2021: 1198-1213 - [c38]Hany Ragab, Alyssa Milburn, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:
CrossTalk: Speculative Data Leaks Across Cores Are Real. SP 2021: 1852-1867 - [c37]Finn de Ridder, Pietro Frigo, Emanuele Vannacci, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi:
SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript. USENIX Security Symposium 2021: 1001-1018 - [i5]Lois Orosa, Yaohua Wang, Mohammad Sadrosadati, Jeremie S. Kim, Minesh Patel, Ivan Puddu, Haocong Luo, Kaveh Razavi, Juan Gómez-Luna, Hasan Hassan, Nika Mansouri-Ghiasi, Saugata Ghose, Onur Mutlu:
CODIC: A Low-Cost Substrate for Enabling Custom In-DRAM Functionalities and Optimizations. CoRR abs/2106.05632 (2021) - [i4]Hasan Hassan, Yahya Can Tugrul, Jeremie S. Kim, Victor van der Veen, Kaveh Razavi, Onur Mutlu:
Uncovering In-DRAM RowHammer Protection Mechanisms: A New Methodology, Custom RowHammer Patterns, and Implications. CoRR abs/2110.10603 (2021) - 2020
- [c36]Enes Göktas, Kaveh Razavi, Georgios Portokalidis, Herbert Bos, Cristiano Giuffrida:
Speculative Probing: Hacking Blind in the Spectre Era. CCS 2020: 1871-1885 - [c35]Jakob Koschel, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs. EuroS&P 2020: 309-321 - [c34]Radhesh Krishnan Konoth, Björn Fischer, Wan J. Fokkink, Elias Athanasopoulos, Kaveh Razavi, Herbert Bos:
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions. EuroS&P 2020: 569-586 - [c33]Kaveh Razavi, Animesh Trivedi:
Stratus: Clouds with Microarchitectural Resource Management. HotCloud 2020 - [c32]Gian Luca Scoccia, Ibrahim Kanj, Ivano Malavolta, Kaveh Razavi:
Leave my apps alone!: a study on how Android developers access installed apps on user's device. MOBILESoft@ICSE 2020: 38-49 - [c31]Ben Gras, Cristiano Giuffrida, Michael Kurth, Herbert Bos, Kaveh Razavi:
ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures. NDSS 2020 - [c30]Michael Kurth, Ben Gras, Dennis Andriesse, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
: Practical Cache Attacks from the Network. SP 2020: 20-38 - [c29]Pietro Frigo, Emanuele Vannacci, Hasan Hassan, Victor van der Veen, Onur Mutlu, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
TRRespass: Exploiting the Many Sides of Target Row Refresh. SP 2020: 747-762 - [c28]Sebastian Österlund, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:
ParmeSan: Sanitizer-guided Greybox Fuzzing. USENIX Security Symposium 2020: 2289-2306 - [i3]Pietro Frigo, Emanuele Vannacci, Hasan Hassan, Victor van der Veen, Onur Mutlu, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
TRRespass: Exploiting the Many Sides of Target Row Refresh. CoRR abs/2004.01807 (2020)
2010 – 2019
- 2019
- [c27]Lucian Cojocar, Kaveh Razavi, Cristiano Giuffrida, Herbert Bos:
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks. IEEE Symposium on Security and Privacy 2019: 55-71 - [c26]Stephan van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Giorgi Maisuradze, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:
RIDL: Rogue In-Flight Data Load. IEEE Symposium on Security and Privacy 2019: 88-105 - [i2]Lois Orosa, Yaohua Wang, Ivan Puddu, Mohammad Sadrosadati, Kaveh Razavi, Juan Gómez-Luna, Hasan Hassan, Nika Mansouri-Ghiasi, Arash Tavakkol, Minesh Patel, Jeremie S. Kim, Vivek Seshadri, Uksong Kang, Saugata Ghose, Rodolfo Azevedo, Onur Mutlu:
Dataplant: In-DRAM Security Mechanisms for Low-Cost Devices. CoRR abs/1902.07344 (2019) - 2018
- [c25]Victor van der Veen, Martina Lindorfer, Yanick Fratantonio, Harikrishnan Padmanabha Pillai, Giovanni Vigna, Christopher Kruegel, Herbert Bos, Kaveh Razavi:
GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM. DIMVA 2018: 92-113 - [c24]Radhesh Krishnan Konoth, Marco Oliverio, Andrei Tatar, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida, Kaveh Razavi:
ZebRAM: Comprehensive and Compatible Software Protection Against Rowhammer Attacks. OSDI 2018: 697-710 - [c23]Andrei Tatar, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
Defeating Software Mitigations Against Rowhammer: A Surgical Precision Hammer. RAID 2018: 47-66 - [c22]Pietro Frigo, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU. IEEE Symposium on Security and Privacy 2018: 195-210 - [c21]Andrei Tatar, Radhesh Krishnan Konoth, Elias Athanasopoulos, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
Throwhammer: Rowhammer Attacks over the Network and Defenses. USENIX ATC 2018: 213-226 - [c20]Stephan van Schaik, Cristiano Giuffrida, Herbert Bos, Kaveh Razavi:
Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think. USENIX Security Symposium 2018: 937-954 - [c19]Ben Gras, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks. USENIX Security Symposium 2018: 955-972 - [i1]Arash Tavakkol, Aasheesh Kolli, Stanko Novakovic, Kaveh Razavi, Juan Gómez-Luna, Hasan Hassan, Claude Barthels, Yaohua Wang, Mohammad Sadrosadati, Saugata Ghose, Ankit Singla, Pratap Subrahmanyam, Onur Mutlu:
Enabling Efficient RDMA-based Synchronous Mirroring of Persistent Memory Transactions. CoRR abs/1810.09360 (2018) - 2017
- [c18]Lucian Cojocar, Kaveh Razavi, Herbert Bos:
Off-the-shelf Embedded Devices as Platforms for Security Research. EUROSEC 2017: 1:1-1:6 - [c17]Stephan van Schaik, Kaveh Razavi, Ben Gras, Herbert Bos, Cristiano Giuffrida:
RevAnC: A Framework for Reverse Engineering Hardware Page Table Caches. EUROSEC 2017: 3:1-3:6 - [c16]Sergey Legtchenko, Hugh Williams, Kaveh Razavi, Austin Donnelly, Richard Black, Andrew Douglas, Nathanael Cheriere, Daniel Fryer, Kai Mast, Angela Demke Brown, Ana Klimovic, Andy Slowey, Antony I. T. Rowstron:
Understanding Rack-Scale Disaggregated Storage. HotStorage 2017 - [c15]Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Bos, Cristiano Giuffrida:
ASLR on the Line: Practical Cache Attacks on the MMU. NDSS 2017 - [c14]Marco Oliverio, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:
Secure Page Fusion with VUsion: https: //www.vusec.net/projects/VUsion. SOSP 2017: 531-545 - 2016
- [c13]Victor van der Veen, Yanick Fratantonio, Martina Lindorfer, Daniel Gruss, Clémentine Maurice, Giovanni Vigna, Herbert Bos, Kaveh Razavi, Cristiano Giuffrida:
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms. CCS 2016: 1675-1689 - [c12]Erik Bosman, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida:
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector. IEEE Symposium on Security and Privacy 2016: 987-1004 - [c11]Kaveh Razavi, Ben Gras, Erik Bosman, Bart Preneel, Cristiano Giuffrida, Herbert Bos:
Flip Feng Shui: Hammering a Needle in the Software Stack. USENIX Security Symposium 2016: 1-18 - 2015
- [c10]Kaveh Razavi, Stefania Costache, Andrea Gardiman, Kees Verstoep, Thilo Kielmann:
Scaling VM Deployment in an Open Source Cloud Stack. ScienceCloud@HPDC 2015: 3-10 - [c9]Kaveh Razavi, Ana Ion, Genc Tato, Kyuho Jeong, Renato J. O. Figueiredo, Guillaume Pierre, Thilo Kielmann:
Kangaroo: A Tenant-Centric Software-Defined Cloud Infrastructure. IC2E 2015: 106-115 - [c8]Kaveh Razavi, Gerrit Van Der Kolk, Thilo Kielmann:
Prebaked µVMs: Scalable, Instant VM Startup for IaaS Clouds. ICDCS 2015: 245-255 - [c7]Paolo Costa, Hitesh Ballani, Kaveh Razavi, Ian A. Kash:
R2C2: A Network Stack for Rack-scale Computers. SIGCOMM 2015: 551-564 - [c6]Antonio Barresi, Kaveh Razavi, Mathias Payer, Thomas R. Gross:
CAIN: Silently Breaking ASLR in the Cloud. WOOT 2015 - 2014
- [c5]Kaveh Razavi, Ana Ion, Thilo Kielmann:
Squirrel: scatter hoarding VM image contents on IaaS compute nodes. HPDC 2014: 265-278 - 2013
- [c4]Kaveh Razavi, Liviu Mihai Razorea, Thilo Kielmann:
Reducing VM Startup Time and Storage Costs by VM Image Content Consolidation. Euro-Par Workshops 2013: 75-84 - [c3]Naeem Esfahani, Sam Malek, Kaveh Razavi:
GuideArch: guiding the exploration of architectural solution space under uncertainty. ICSE 2013: 43-52 - [c2]Kaveh Razavi, Thilo Kielmann:
Scalable virtual machine deployment using VM image caches. SC 2013: 65:1-65:12 - 2012
- [c1]Naeem Esfahani, Kaveh Razavi, Sam Malek:
Dealing with uncertainty in early software architecture. SIGSOFT FSE 2012: 21
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint