User profiles for Kaveh Razavi
Kaveh RazaviAssistant Professor at ETH Zurich Verified email at ethz.ch Cited by 5422 |
RIDL: Rogue in-flight data load
We present Rogue In-flight Data Load (RIDL), a new class of speculative unprivileged and
constrained attacks to leak arbitrary data across address spaces and privilege boundaries (eg…
constrained attacks to leak arbitrary data across address spaces and privilege boundaries (eg…
Drammer: Deterministic rowhammer attacks on mobile platforms
Recent work shows that the Rowhammer hardware bug can be used to craft powerful attacks
and completely subvert a system. However, existing efforts either describe probabilistic (…
and completely subvert a system. However, existing efforts either describe probabilistic (…
Scalable virtual machine deployment using VM image caches
K Razavi, T Kielmann - Proceedings of the International Conference on …, 2013 - dl.acm.org
In IaaS clouds, VM startup times are frequently perceived as slow, negatively impacting both
dynamic scaling of web applications and the startup of high-performance computing …
dynamic scaling of web applications and the startup of high-performance computing …
Crosstalk: Speculative data leaks across cores are real
Recent transient execution attacks have demonstrated that attackers may leak sensitive
information across security boundaries on a shared CPU core. Up until now, it seemed possible …
information across security boundaries on a shared CPU core. Up until now, it seemed possible …
Translation leak-aside buffer: Defeating cache side-channel protections with {TLB} attacks
To stop side channel attacks on CPU caches that have allowed attackers to leak secret
information and break basic security mechanisms, the security community has developed a …
information and break basic security mechanisms, the security community has developed a …
[PDF][PDF] ASLR on the Line: Practical Cache Attacks on the MMU.
Address space layout randomization (ASLR) is an important first line of defense against
memory corruption attacks and a building block for many modern countermeasures. Existing …
memory corruption attacks and a building block for many modern countermeasures. Existing …
Flip feng shui: Hammering a needle in the software stack
We introduce Flip Feng Shui (FFS), a new exploitation vector which allows an attacker to
induce bit flips over arbitrary physical memory in a fully controlled way. FFS relies on hardware …
induce bit flips over arbitrary physical memory in a fully controlled way. FFS relies on hardware …
Dedup est machina: Memory deduplication as an advanced exploitation vector
Memory deduplication, a well-known technique to reduce the memory footprint across
virtual machines, is now also a default-on feature inside the Windows 8.1 and Windows 10 …
virtual machines, is now also a default-on feature inside the Windows 8.1 and Windows 10 …
TRRespass: Exploiting the many sides of target row refresh
After a plethora of high-profile RowHammer attacks, CPU and DRAM vendors scrambled to
deliver what was meant to be the definitive hardware solution against the RowHammer …
deliver what was meant to be the definitive hardware solution against the RowHammer …
Exploiting correcting codes: On the effectiveness of ecc memory against rowhammer attacks
Given the increasing impact of Rowhammer, and the dearth of adequate other hardware
defenses, many in the security community have pinned their hopes on error-correcting code (…
defenses, many in the security community have pinned their hopes on error-correcting code (…