Kaveh Razavi
Kaveh Razavi
Assistant Professor at ETH Zurich
Adresse e-mail validée de ethz.ch - Page d'accueil
Titre
Citée par
Citée par
Année
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms
V van der Veen, Y Fratantonio, M Lindorfer, D Gruss, C Maurice, G Vigna, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1712016
Flip Feng Shui: Hammering a Needle in the Software Stack
K Razavi, B Gras, E Bosman, B Preneel, C Giuffrida, H Bos
USENIX Security Symposium, 2016
1432016
ASLR on the Line: Practical Cache Attacks on the MMU.
B Gras, K Razavi, E Bosman, H Bos, C Giuffrida
NDSS 17, 26, 2017
1382017
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector
E Bosman, K Razavi, H Bos, C Giuffrida
IEEE Symposium on Security and Privacy (S&P), 2016
1372016
Translation leak-aside buffer: defeating cache side-channel protections with TLB attacks
B Gras, K Razavi, H Bos, C Giuffrida
USENIX Security 18, 2018
962018
RIDL: Rogue In-Flight Data Load
S van Schaik, A Milburn, S Österlund, P Frigo, G Maisuradze, K Razavi, ...
S&P (May 2019), 2019
942019
Throwhammer: Rowhammer Attacks over the Network and Defenses
A Tatar, R Krishnan, E Athanasopoulos, C Giuffrida, H Bos, K Razavi
USENIX ATC, 2018
622018
Scalable virtual machine deployment using VM image caches
K Razavi, T Kielmann
Proceedings of the International Conference on High Performance Computing …, 2013
542013
CAIN: Silently Breaking ASLR in the Cloud
A Barresi, K Razavi, M Payer, M Gross
USENIX Workshop on Offensive Technologies, WOOT, 2015
522015
Grand pwning unit: Accelerating microarchitectural attacks with the GPU
P Frigo, C Giuffrida, H Bos, K Razavi
2018 IEEE Symposium on Security and Privacy (SP), 195-210, 2018
502018
R2C2: a network stack for rack-scale computers
P Costa, H Ballani, K Razavi, I Kash
ACM SIGCOMM Computer Communication Review 45 (4), 551-564, 2015
432015
Exploiting correcting codes: On the effectiveness of ecc memory against rowhammer attacks
L Cojocar, K Razavi, C Giuffrida, H Bos
S&P, 2019
352019
Reducing vm startup time and storage costs by vm image content consolidation
K Razavi, LM Razorea, T Kielmann
European Conference on Parallel Processing, 75-84, 2013
312013
GuardION: Practical Mitigation of DMA-Based Rowhammer Attacks on ARM
V van der Veen, M Lindorfer, Y Fratantonio, HP Pillai, G Vigna, C Kruegel, ...
International Conference on Detection of Intrusions and Malware, and …, 2018
242018
Defeating software mitigations against rowhammer: a surgical precision hammer
A Tatar, C Giuffrida, H Bos, K Razavi
International Symposium on Research in Attacks, Intrusions, and Defenses, 47-66, 2018
232018
Kangaroo: A tenant-centric software-defined cloud infrastructure
K Razavi, A Ion, G Tato, K Jeong, R Figueiredo, G Pierre, T Kielmann
2015 IEEE International Conference on Cloud Engineering, 106-115, 2015
222015
Malicious management unit: why stopping cache attacks in software is harder than you think
S Van Schaik, C Giuffrida, H Bos, K Razavi
27th {USENIX} Security Symposium ({USENIX} Security 18), 937-954, 2018
212018
ZebRAM: comprehensive and compatible software protection against rowhammer attacks
RK Konoth, M Oliverio, A Tatar, D Andriesse, H Bos, C Giuffrida, K Razavi
13th {USENIX} Symposium on Operating Systems Design and Implementation …, 2018
192018
Prebaked µVMs: Scalable, Instant VM Startup for IaaS Clouds
K Razavi, G van der Kolk, T Kielmann
Proceedings of the 35th International Conference on Distributed Computing …, 2015
192015
Squirrel: scatter hoarding VM image contents on IaaS compute nodes
K Razavi, A Ion, T Kielmann
Proceedings of the 23rd international symposium on High-performance parallel …, 2014
192014
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20