Publications


Preprints

  1. D Moghimi, J Van Bulck, N Heninger, F Piessens, B Sunar. "CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction" arXiv preprint arXiv:2002.08437
  2. B Gulmezoglu, A Moghimi, T Eisenbarth, B Sunar. "FortuneTeller: Predicting Microarchitectural Attacks via Unsupervised Deep Learning" arXiv preprint arXiv:1907.03651

2020

  1. D Moghimi, M Lipp, B Sunar, M Schwarz. "Medusa: Microarchitectural Data Leakage via Automated Attack Synthesis" The 29th USENIX Security Symposium (SEC 2020).  [PDF]  [Cite]
  2. Z Weissman, T Tiemann, D Moghimi, E Custodio, T Eisenbarth, B Sunar. "JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms"  IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2020).  [PDF]  [Cite]
  3. J Van Bulck, D Moghimi, M Schwarz, M Lipp, M Minkin, D Genkin, Y Yarom, B Sunar, D Gruss, F Piessens."LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection" The 41st IEEE Symposium on Security and Privacy (S&P 2020).  [PDF]  [Cite]
  4. D Moghimi, B Sunar, T Eisenbarth, N Heninger. "TPM-Fail: TPM meets Timing and Lattice Attacks"  The 29th USENIX Security Symposium (SEC 2020).  [PDF]  [Cite]

2019

  1. M Schwarz, M Lipp, D Moghimi, J Van Bulck, J Stecklina, T Prescher, D Gruss. "ZombieLoad: Cross-Privilege-Boundary Data Sampling" The 26th ACM Conference on Computer and Communications Security (CCS 2019).  [PDF]  [Cite]
  2. M Minkin , D Moghimi , M Lipp , M Schwarz , J Van Bulck , D Genkin , D Gruss , F Piessens, B Sunar, Y Yarom. "Fallout: Reading Kernel Writes From User Space"  arXiv preprint arXiv:1905.12701 merged with Store-to-Leak (arXiv:1905.05725), under Canella et al. "Fallout: Leaking Data on Meltdown-resistant CPUs"  The 26th ACM Conference on Computer and Communications Security (CCS 2019).  [PDF]  [Cite]
  3. S Islam, A Moghimi, I Bruhns, M Krebbel, B Gulmezoglu, T Eisenbarth, B Sunar. "SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks" The 28th USENIX Security Symposium (SEC 2019).  [PDF]  [Cite]
  4. A Moghimi, J Wichelmann, T Eisenbarth, B Sunar. "MemJam: A False Dependency Attack against Constant-Time Crypto Implementations" (Extended Version) International Journal of Parallel Programming (IJPP 2019).  [PDF]  [Cite]

2018

  1. J Wichelmann, A Moghimi, T Eisenbarth, B Sunar. "MicroWalk: A Framework for Finding Side Channels in Binaries"  Annual Computer Security Applications Conference (ACSAC 2018).  [PDF]  [Cite]
  2. F Dall, G De Micheli, T Eisenbarth, D Genkin, N Heninger, A Moghimi, Y Yarom. "CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks"  IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES 2018).  [PDF]  [Cite]
  3. A Moghimi, T Eisenbarth, B Sunar. "MemJam: A False Dependency Attack against Constant-Time Crypto Implementations in SGX"  Cryptographers' Track at the RSA Conference (CT-RSA 2018).  [PDF]  [Cite]

2017

  1. A Moghimi, G Irazoqui, T Eisenbarth. "CacheZoom: How SGX Amplifies The Power of Cache Attacks"  International Conference on Cryptographic Hardware and Embedded Systems (CHES 2017).  [PDF]  [Cite]

Posters

  1. N Brown, N Patel, P Plenefisch, A Moghimi, T Eisenbarth, C Shue, and K Venkatasubramanian. "Poster: Scream: Sensory Channel Remote Execution Attack Methods"  Usenix Security (USENIX Security '16 Poster Session).  [PDF]
  2. M Abi-Antoun, E Khalaj, Radu Vanciu, and A Moghimi. "Poster: Abstract Runtime Structure for Reasoning about Security"  Proceedings of the Symposium and Bootcamp on the Science of Security (HotSos '16).  [PDF]  [Cite]

Presentations

  1. D Moghimi. "Exploiting Microarchitectural Flaws in the Heart of the Memory Subsystem​" Invited talk at Columbia University, New York City, NY.  [Slides]
  2. D Moghimi. "TPM-Fail: TPM meets Timing and Lattice Attacks" Conference talk at Real World Crypto 2020, New York City, NY.  [Slides]
  3. D Moghimi. "ZombieLoad: Leaking Data on Intel CPUs" Conference talk at ToorCon 21 (2019), San Diego, CA.  [Slides]
  4. D Moghimi. "SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks"  Conference talk at Usenix Security 2019, Santa Clara, CA.  [Slides]
  5. D Moghimi. "Microarchitectural Attacks and Cloud Accelerators" Guest talk at Intel SCAP Conference 2019, Intel, Hillsboro, OR.  [Slides]
  6. D Moghimi. "Microarchitectural Attacks: Protecting Cloud Accelerators" Guest talk at Intel SCAP Meeting 2019, University of Florida, Gainesville, FL.  [Slides]
  7. D Moghimi. "MemJam: A False Dependency Attack against Constant-Time Crypto..."  Conference talk at RSA Conference 2018 (CT-RSA 2018), San Francisco, CA.  [Slides]
  8. D Moghimi. "Side-channel Attacks on SGX Enclaves" Conference talk at New England Security Day (NESD 2017), Northeastern, Boston, MA.
  9. D Moghimi. "How SGX Amplifies the Power of Cache Attacks" MS Thesis defense at Worcester Polytechnic Institute 2017, Worcester, MA.  [Slides]