Publications


Refereed Papers

  1. S Narayan, C Disselkoen, D Moghimi, S Cauligi, E Johnson, Z Gang, A Vahldiek-Oberwagner, R Sahita, H Shacham, D Tullsen, D Stefan. "Swivel: Hardening WebAssembly against Spectre"  The 30th USENIX Security Symposium (SEC 2021).  [arXiv]  [PDF]  [Cite]
  2. D Moghimi, J Van Bulck, N Heninger, F Piessens, B Sunar. "CopyCat: Controlled Instruction-Level Attacks on Enclaves"  The 29th USENIX Security Symposium (SEC 2020).  [PDF]  [Cite]
  3. D Moghimi, M Lipp, B Sunar, M Schwarz. "Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis" The 29th USENIX Security Symposium (SEC 2020).  [PDF]  [Cite]
  4. Z Weissman, T Tiemann, D Moghimi, E Custodio, T Eisenbarth, B Sunar. "JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms"  IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2020).  [PDF]  [Cite]   Press Coverage:  [ZDNet]  [tom's Hardware]
  5. J Van Bulck, D Moghimi, M Schwarz, M Lipp, M Minkin, D Genkin, Y Yarom, B Sunar, D Gruss, F Piessens."LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection" The 41st IEEE Symposium on Security and Privacy (S&P 2020).  [PDF]  [Cite]   Press Coverage:  [Dark Reading]  [The Register]  [ZDNet]  [tom's Hardware]
  6. D Moghimi, B Sunar, T Eisenbarth, N Heninger. "TPM-Fail: TPM meets Timing and Lattice Attacks"  The 29th USENIX Security Symposium (SEC 2020).  [PDF]  [Cite]   Press Coverage:  [Dark Reading]  [Hacker News]  [The Register]  [ZDNet]
  7. M Schwarz, M Lipp, D Moghimi, J Van Bulck, J Stecklina, T Prescher, D Gruss. "ZombieLoad: Cross-Privilege-Boundary Data Sampling" The 26th ACM Conference on Computer and Communications Security (CCS 2019).  [PDF]  [Cite]   Press Coverage:  [Tech Target]  [Fox News]
  8. M Minkin , D Moghimi , M Lipp , M Schwarz , J Van Bulck , D Genkin , D Gruss , F Piessens, B Sunar, Y Yarom. "Fallout: Reading Kernel Writes From User Space"  arXiv preprint arXiv:1905.12701 merged with Store-to-Leak (arXiv:1905.05725), under Canella et al. "Fallout: Leaking Data on Meltdown-resistant CPUs"  The 26th ACM Conference on Computer and Communications Security (CCS 2019).  [PDF]  [Cite]   Press Coverage:  [Wired News]
  9. S Islam, A Moghimi, I Bruhns, M Krebbel, B Gulmezoglu, T Eisenbarth, B Sunar. "SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks" The 28th USENIX Security Symposium (SEC 2019).  [PDF]  [Cite]   Press Coverage:  [The Register]  [ZDNet]  [Forbes Article]
  10. A Moghimi, J Wichelmann, T Eisenbarth, B Sunar. "MemJam: A False Dependency Attack against Constant-Time Crypto Implementations" (Extended Version) International Journal of Parallel Programming (IJPP 2019).  [PDF]  [Cite]
  11. J Wichelmann, A Moghimi, T Eisenbarth, B Sunar. "MicroWalk: A Framework for Finding Side Channels in Binaries"  Annual Computer Security Applications Conference (ACSAC 2018).  [PDF]  [Cite]
  12. F Dall, G De Micheli, T Eisenbarth, D Genkin, N Heninger, A Moghimi, Y Yarom. "CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks"  IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2018).  [PDF]  [Cite]
  13. A Moghimi, T Eisenbarth, B Sunar. "MemJam: A False Dependency Attack against Constant-Time Crypto Implementations in SGX"  Cryptographers' Track at the RSA Conference (CT-RSA 2018).  [PDF]  [Cite]
  14. A Moghimi, G Irazoqui, T Eisenbarth. "CacheZoom: How SGX Amplifies The Power of Cache Attacks"  International Conference on Cryptographic Hardware and Embedded Systems (CHES 2017).  [PDF]  [Cite]

Preprints


Technical Report

  • D Moghimi. "Data Sampling on MDS-resistant 10th Generation Intel Core (Ice Lake)"  [PDF]  [Cite]

Posters