I'm excited to announce that my first first-author paper is accepted at NDSS 2026 🥳.
Eviction Notice: Reviving and Advancing Page Cache Attacks
Check it out at: snee.la/posts/evicti...
@snee.la, @notimaginary.bsky.social, Lukas Maar, @gruss.cc
from @isec-tugraz.bsky.social, @tugraz.bsky.social
Posts by Jonas Juffinger
This week @snee.la and I presented our work Not So Secure TSC at ACNS in Munich.
www.jonasjuffinger.com/papers/secur...
I am happy to announce that my first paper has been accepted at USENIX Security!
We propose TEEcorrelate, a mitigation that statistically decorrelates reported performance counters from real ones during TEE execution.
I'm very happy to announce our new Cohere+Reload: Re-enabling High-Resolution Cache Attacks on AMD SEV-SNP was accepted at DIMVA 2025!
In it @snee.la, @gruss.cc and I investigate AMD's ciphertext coherence mechanism and show even low resolution leakage can go a long way.
Paper preview: cr.giner.cc
Stefan Gast, Daniel Gruss, and Jonas Juffinger presenting their research at NDSS 2025
Proud moment at #NDSS 2025! SPyCoDe researchers showcased 4 groundbreaking papers. Kudos to @matteomaffei.bsky.social, Z. Avarikioti, S. Gast, @gruss.cc, @notimaginary.bsky.social, @hannesweissteiner.xyz, S. Mangard, and co-authors. For more details and links, visit spycode.at/events/#2025...
Last week, @gruss.cc and his PhD students went to Germany and visited #µASC and #RuhrSec!
PhD candidate @notimaginary.bsky.social presented his paper “An Analysis of HMB-based SSD #Rowhammer”. 📑👇
uasc.cc/proceedings2...
#Microarchitecture #security #informationsecurity #cybersecurity #conference
This week I gave a talk at first #uASC conference about SSDs and why they will not #rowhammer your computer in the foreseeable future.
Don't forget to join next year! uasc.cc
First edition is happening on February 19 in Bochum, the day before RuhrSec.
We accept submissions (papers, posters, talks) starting today and try to provide reviews within a 2 week time frame of submission.
Last Submission Deadline: January 27, 2025
Got some negative or unrealistic threat model results that still bring interesting insights? A side channel that requires root to leak something from the kernel? Reproducing prior work? Somewhat related to microarchitecture? Here's your venue: uasc.cc