What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kaveh Razavi
Google Scholar
35
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Breaking the Barrier: Post-Barrier Spectre Attacks.
Johannes Wikner
Kaveh Razavi
2025
conf/eurosp
Rubicon: Precise Microarchitectural Attacks with Page-Granular Massaging.
Matej Bölcskei
Patrick Jattke
Johannes Wikner
Kaveh Razavi
2025
conf/uss
Encarsia: Evaluating CPU Fuzzers via Automatic Bug Injection.
Matej Bölcskei
Flavien Solt
Katharina Ceesay-Seitz
Kaveh Razavi
2025
conf/uss
Branch Privilege Injection: Compromising Spectre v2 Hardware Mitigations by Exploiting Branch Predictor Race Conditions.
Sandro Rüegge
Johannes Wikner
Kaveh Razavi
2025
conf/uss
Posthammer: Pervasive Browser-based Rowhammer Attacks with Postponed Refresh Commands.
Finn de Ridder
Patrick Jattke
Kaveh Razavi
2025
conf/uss
Lost in Translation: Enabling Confused Deputy Attacks on EDA Software with TransFuzz.
Flavien Solt
Kaveh Razavi
2025
conf/uss
McSee: Evaluating Advanced Rowhammer Attacks and Defenses via Automated DRAM Traffic Analysis.
Patrick Jattke
Michele Marazzi
Flavien Solt
Max Wipfli
Stefan Gloor
Kaveh Razavi
2024
conf/ccs
μCFI: Formal Verification of Microarchitectural Control-flow Integrity.
Katharina Ceesay-Seitz
Flavien Solt
Kaveh Razavi
2024
conf/uss
Cascade: CPU Fuzzing via Intricate Program Generation.
Flavien Solt
Katharina Ceesay-Seitz
Kaveh Razavi
2024
conf/uss
ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms.
Patrick Jattke
Max Wipfli
Flavien Solt
Michele Marazzi
Matej Bölcskei
Kaveh Razavi
2023
conf/uss
Inception: Exposing New Attack Surfaces with Training in Transient Execution.
Daniël Trujillo
Johannes Wikner
Kaveh Razavi
2023
conf/sp
REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations.
Michele Marazzi
Flavien Solt
Patrick Jattke
Kubo Takashi
Kaveh Razavi
2022
conf/uss
CellIFT: Leveraging Cells for Scalable and Precise Dynamic Information Flow Tracking in RTL.
Flavien Solt
Ben Gras
Kaveh Razavi
2022
conf/uss
RETBLEED: Arbitrary Speculative Code Execution with Return Instructions.
Johannes Wikner
Kaveh Razavi
2022
conf/sp
BLACKSMITH: Scalable Rowhammering in the Frequency Domain.
Patrick Jattke
Victor van der Veen
Pietro Frigo
Stijn Gunter
Kaveh Razavi
2022
conf/sp
ProTRR: Principled yet Optimal In-DRAM Target Row Refresh.
Michele Marazzi
Patrick Jattke
Flavien Solt
Kaveh Razavi
2022
conf/ndss
Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel.
Brian Johannesmeyer
Jakob Koschel
Kaveh Razavi
Herbert Bos
Cristiano Giuffrida
2021
conf/uss
SMASH: Synchronized Many-sided Rowhammer Attacks from JavaScript.
Finn de Ridder
Pietro Frigo
Emanuele Vannacci
Herbert Bos
Cristiano Giuffrida
Kaveh Razavi
2021
conf/sp
CrossTalk: Speculative Data Leaks Across Cores Are Real.
Hany Ragab
Alyssa Milburn
Kaveh Razavi
Herbert Bos
Cristiano Giuffrida
2020
conf/ccs
Speculative Probing: Hacking Blind in the Spectre Era.
Enes Göktas
Kaveh Razavi
Georgios Portokalidis
Herbert Bos
Cristiano Giuffrida
2020
conf/uss
ParmeSan: Sanitizer-guided Greybox Fuzzing.
Sebastian Österlund
Kaveh Razavi
Herbert Bos
Cristiano Giuffrida
2020
conf/sp
: Practical Cache Attacks from the Network.
Michael Kurth
Ben Gras
Dennis Andriesse
Cristiano Giuffrida
Herbert Bos
Kaveh Razavi
2020
conf/sp
TRRespass: Exploiting the Many Sides of Target Row Refresh.
Pietro Frigo
Emanuele Vannacci
Hasan Hassan
Victor van der Veen
Onur Mutlu
Cristiano Giuffrida
Herbert Bos
Kaveh Razavi
2020
conf/eurosp
SecurePay: Strengthening Two-Factor Authentication for Arbitrary Transactions.
Radhesh Krishnan Konoth
Björn Fischer
Wan J. Fokkink
Elias Athanasopoulos
Kaveh Razavi
Herbert Bos
2020
conf/eurosp
TagBleed: Breaking KASLR on the Isolated Kernel Address Space using Tagged TLBs.
Jakob Koschel
Cristiano Giuffrida
Herbert Bos
Kaveh Razavi
2020
conf/ndss
ABSynthe: Automatic Blackbox Side-channel Synthesis on Commodity Microarchitectures.
Ben Gras
Cristiano Giuffrida
Michael Kurth
Herbert Bos
Kaveh Razavi
2019
conf/sp
Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks.
Lucian Cojocar
Kaveh Razavi
Cristiano Giuffrida
Herbert Bos
2019
conf/sp
RIDL: Rogue In-Flight Data Load.
Stephan van Schaik
Alyssa Milburn
Sebastian Österlund
Pietro Frigo
Giorgi Maisuradze
Kaveh Razavi
Herbert Bos
Cristiano Giuffrida
2018
conf/uss
Translation Leak-aside Buffer: Defeating Cache Side-channel Protections with TLB Attacks.
Ben Gras
Kaveh Razavi
Herbert Bos
Cristiano Giuffrida
2018
conf/uss
Malicious Management Unit: Why Stopping Cache Attacks in Software is Harder Than You Think.
Stephan van Schaik
Cristiano Giuffrida
Herbert Bos
Kaveh Razavi
2018
conf/sp
Grand Pwning Unit: Accelerating Microarchitectural Attacks with the GPU.
Pietro Frigo
Cristiano Giuffrida
Herbert Bos
Kaveh Razavi
2017
conf/ndss
ASLR on the Line: Practical Cache Attacks on the MMU.
Ben Gras
Kaveh Razavi
Erik Bosman
Herbert Bos
Cristiano Giuffrida
2016
conf/ccs
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms.
Victor van der Veen
Yanick Fratantonio
Martina Lindorfer
Daniel Gruss
Clémentine Maurice
Giovanni Vigna
Herbert Bos
Kaveh Razavi
Cristiano Giuffrida
2016
conf/uss
Flip Feng Shui: Hammering a Needle in the Software Stack.
Kaveh Razavi
Ben Gras
Erik Bosman
Bart Preneel
Cristiano Giuffrida
Herbert Bos
2016
conf/sp
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector.
Erik Bosman
Kaveh Razavi
Herbert Bos
Cristiano Giuffrida
Coauthors
Alyssa Milburn
(2)
Bart Preneel
(1)
Ben Gras
(6)
Björn Fischer
(1)
Brian Johannesmeyer
(1)
Clémentine Maurice
(1)
Cristiano Giuffrida
(18)
Daniel Gruss
(1)
Daniël Trujillo
(1)
Dennis Andriesse
(1)
Elias Athanasopoulos
(1)
Emanuele Vannacci
(2)
Enes Göktas
(1)
Erik Bosman
(3)
Finn de Ridder
(2)
Flavien Solt
(9)
Georgios Portokalidis
(1)
Giorgi Maisuradze
(1)
Giovanni Vigna
(1)
Hany Ragab
(1)
Hasan Hassan
(1)
Herbert Bos
(19)
Jakob Koschel
(2)
Johannes Wikner
(5)
Katharina Ceesay-Seitz
(3)
Kaveh Razavi
(35)
Kubo Takashi
(1)
Lucian Cojocar
(1)
Martina Lindorfer
(1)
Matej Bölcskei
(3)
Max Wipfli
(2)
Michael Kurth
(2)
Michele Marazzi
(4)
Onur Mutlu
(1)
Patrick Jattke
(7)
Pietro Frigo
(5)
Radhesh Krishnan Konoth
(1)
Sandro Rüegge
(1)
Sebastian Österlund
(2)
Stefan Gloor
(1)
Stephan van Schaik
(2)
Stijn Gunter
(1)
Victor van der Veen
(3)
Wan J. Fokkink
(1)
Yanick Fratantonio
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to