Daniel Moghimi
Home
Publications
Talks
Security Advisory
Blog
Video
In the Press
Publications
2020
D Moghimi
, J Van Bulck, N Heninger, F Piessens, B Sunar.
"CopyCat: Controlled Instruction-Level Attacks on Enclaves"
The 29th USENIX Security Symposium (SEC 2020).
[PDF]
[Cite]
D Moghimi
, M Lipp, B Sunar, M Schwarz.
"Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis"
The 29th USENIX Security Symposium (SEC 2020).
[PDF]
[Cite]
Z Weissman, T Tiemann,
D Moghimi
, E Custodio, T Eisenbarth, B Sunar.
"JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms"
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2020).
[PDF]
[Cite]
J Van Bulck,
D Moghimi
, M Schwarz, M Lipp, M Minkin, D Genkin, Y Yarom, B Sunar, D Gruss, F Piessens.
"LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection"
The 41st IEEE Symposium on Security and Privacy (S&P 2020).
[PDF]
[Cite]
D Moghimi
, B Sunar, T Eisenbarth, N Heninger.
"TPM-Fail: TPM meets Timing and Lattice Attacks"
The 29th USENIX Security Symposium (SEC 2020).
[PDF]
[Cite]
2019
M Schwarz, M Lipp,
D Moghimi
, J Van Bulck, J Stecklina, T Prescher, D Gruss.
"ZombieLoad: Cross-Privilege-Boundary Data Sampling"
The 26th ACM Conference on Computer and Communications Security (CCS 2019).
[PDF]
[Cite]
M Minkin ,
D Moghimi
, M Lipp , M Schwarz , J Van Bulck , D Genkin , D Gruss , F Piessens, B Sunar, Y Yarom.
"Fallout: Reading Kernel Writes From User Space"
arXiv preprint arXiv:1905.12701 merged with
Store-to-Leak
(arXiv:1905.05725), under Canella et al.
"Fallout: Leaking Data on Meltdown-resistant CPUs"
The 26th ACM Conference on Computer and Communications Security (CCS 2019).
[PDF]
[Cite]
S Islam,
A Moghimi
, I Bruhns, M Krebbel, B Gulmezoglu, T Eisenbarth, B Sunar.
"SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks"
The 28th USENIX Security Symposium (SEC 2019).
[PDF]
[Cite]
A Moghimi
, J Wichelmann, T Eisenbarth, B Sunar.
"MemJam: A False Dependency Attack against Constant-Time Crypto Implementations"
(Extended Version) International Journal of Parallel Programming (IJPP 2019).
[PDF]
[Cite]
2018
J Wichelmann,
A Moghimi
, T Eisenbarth, B Sunar.
"MicroWalk: A Framework for Finding Side Channels in Binaries"
Annual Computer Security Applications Conference (ACSAC 2018).
[PDF]
[Cite]
F Dall, G De Micheli, T Eisenbarth, D Genkin, N Heninger,
A Moghimi
, Y Yarom.
"CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks"
IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2018).
[PDF]
[Cite]
A Moghimi
, T Eisenbarth, B Sunar.
"MemJam: A False Dependency Attack against Constant-Time Crypto Implementations in SGX"
Cryptographers' Track at the RSA Conference (CT-RSA 2018).
[PDF]
[Cite]
2017
A Moghimi
, G Irazoqui, T Eisenbarth.
"CacheZoom: How SGX Amplifies The Power of Cache Attacks"
International Conference on Cryptographic Hardware and Embedded Systems (CHES 2017).
[PDF]
[Cite]
Technical Report
D Moghimi
. "Data Sampling on MDS-resistant 10th Generation Intel Core (Ice Lake)"
[PDF]
[Cite]
Preprints
B Gulmezoglu,
A Moghimi
, T Eisenbarth, B Sunar.
"FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning
" arXiv preprint arXiv:1907.03651
Posters
N Brown, N Patel, P Plenefisch,
A Moghimi
, T Eisenbarth, C Shue, and K Venkatasubramanian.
"Poster: Scream: Sensory Channel Remote Execution Attack Methods"
Usenix Security (USENIX Security '16 Poster Session).
[PDF]
M Abi-Antoun, E Khalaj, Radu Vanciu, and
A Moghimi
.
"Poster: Abstract Runtime Structure for Reasoning about Security"
Proceedings of the Symposium and Bootcamp on the Science of Security (HotSos '16).
[PDF]
[Cite]
Tweets by danielmgmi