ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 1905.12701
  4. Cited By
Fallout: Reading Kernel Writes From User Space

Fallout: Reading Kernel Writes From User Space

29 May 2019
Marina Minkin
D. Moghimi
Moritz Lipp
Michael Schwarz
Jo Van Bulck
Daniel Genkin
Daniel Gruss
Frank Piessens
B. Sunar
Y. Yarom
ArXiv (abs)PDFHTML

Papers citing "Fallout: Reading Kernel Writes From User Space"

19 / 19 papers shown
Analyzing and Exploiting Branch Mispredictions in Microcode
Analyzing and Exploiting Branch Mispredictions in Microcode
Nicholas Mosier
Hamed Nemati
John C. Mitchell
Caroline Trippel
155
1
0
22 Jan 2025
TikTag: Breaking ARM's Memory Tagging Extension with Speculative
  Execution
TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution
Juhee Kim
Jinbum Park
Sihyeon Roh
Jaeyoung Chung
Youngjoo Lee
Taesoo Kim
Byoungyoung Lee
181
12
0
13 Jun 2024
This is How You Lose the Transient Execution War
This is How You Lose the Transient Execution War
Allison Randal
170
6
0
06 Sep 2023
SoK: Analysis of Root Causes and Defense Strategies for Attacks on
  Microarchitectural Optimizations
SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural OptimizationsEuropean Symposium on Security and Privacy (Euro S&P), 2022
N. Holtryd
M. Manivannan
P. Stenström
AAML
179
2
0
20 Dec 2022
Survey on Architectural Attacks: A Unified Classification and Attack
  Model
Survey on Architectural Attacks: A Unified Classification and Attack ModelACM Computing Surveys (ACM CSUR), 2022
Tara Ghasempouri
J. Raik
C. Reinbrecht
Said Hamdioui
M. Taouil
AAML
220
9
0
30 Aug 2022
Preventing Timing Side-Channels via Security-Aware Just-In-Time
  Compilation
Preventing Timing Side-Channels via Security-Aware Just-In-Time Compilation
Qi Qin
JulianAndres JiYang
Fu Song
Taolue Chen
Xinyu Xing
120
2
0
26 Feb 2022
Relational Models of Microarchitectures for Formal Security Analyses
Relational Models of Microarchitectures for Formal Security Analyses
Nicholas Mosier
Hanna Lachnitt
Hamed Nemati
Caroline Trippel
188
1
0
20 Dec 2021
MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third
  Parties
MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties
Guoxing Chen
Yinqian Zhang
132
37
0
21 Aug 2020
SESAME: Software defined Enclaves to Secure Inference Accelerators with
  Multi-tenant Execution
SESAME: Software defined Enclaves to Secure Inference Accelerators with Multi-tenant Execution
Sarbartha Banerjee
Prakash Ramrakhyani
Shijia Wei
Mohit Tiwari
118
9
0
14 Jul 2020
Survey of Transient Execution Attacks
Survey of Transient Execution Attacks
Wenjie Xiong
Jakub Szefer
SILM
199
26
0
27 May 2020
A Way Around UMIP and Descriptor-Table Exiting via TSX-based
  Side-Channel
A Way Around UMIP and Descriptor-Table Exiting via TSX-based Side-Channel
Mohammad Sina Karvandi
Saleh Khalaj Monfared
M. Kiarostami
Dara Rahmati
Saeid Gorgin
190
1
0
20 May 2020
SpectreRewind: Leaking Secrets to Past Instructions
SpectreRewind: Leaking Secrets to Past Instructions
Jacob Fustos
Michael Bechtel
H. Yun
167
6
0
27 Mar 2020
SPEECHMINER: A Framework for Investigating and Measuring Speculative
  Execution Vulnerabilities
SPEECHMINER: A Framework for Investigating and Measuring Speculative Execution VulnerabilitiesNetwork and Distributed System Security Symposium (NDSS), 2019
Yuan Xiao
Yinqian Zhang
R. Teodorescu
148
50
0
01 Dec 2019
Certified Side Channels
Certified Side ChannelsUSENIX Security Symposium (USENIX Security), 2019
Cesar Pereida García
Sohaib ul Hassan
Nicola Tuveri
I. Gridin
Alejandro Cabrera Aldaya
B. Brumley
112
14
0
04 Sep 2019
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised
  Deep Learning
FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning
Berk Gülmezoglu
A. Moghimi
T. Eisenbarth
B. Sunar
AAML
127
43
0
08 Jul 2019
SPECCFI: Mitigating Spectre Attacks using CFI Informed Speculation
SPECCFI: Mitigating Spectre Attacks using CFI Informed SpeculationIEEE Symposium on Security and Privacy (S&P), 2019
Esmaeil Mohammadian Koruyeh
Shirin Haji Amin Shirazi
Khaled N. Khasawneh
Chengyu Song
Nael B. Abu-Ghazaleh
120
72
0
04 Jun 2019
ConTExT: Leakage-Free Transient Execution
ConTExT: Leakage-Free Transient Execution
Michael Schwarz
R. Schilling
F. Kargl
Moritz Lipp
Claudio Canella
Daniel Gruss
112
21
0
22 May 2019
ZombieLoad: Cross-Privilege-Boundary Data Sampling
ZombieLoad: Cross-Privilege-Boundary Data SamplingConference on Computer and Communications Security (CCS), 2019
Michael Schwarz
Moritz Lipp
D. Moghimi
Jo Van Bulck
Julian Stecklina
Thomas Prescher
Daniel Gruss
215
451
0
14 May 2019
NetSpectre: Read Arbitrary Memory over Network
NetSpectre: Read Arbitrary Memory over Network
Michael Schwarz
Martin Schwarzl
Moritz Lipp
Daniel Gruss
168
245
0
27 Jul 2018
1