Follow
Stefan Gast
Title
Cited by
Cited by
Year
SQUIP: Exploiting the Scheduler Queue Contention Side Channel
S Gast, J Juffinger, M Schwarzl, G Saileshwar, A Kogler, S Franza, M Köstl, ...
2023 IEEE Symposium on Security and Privacy (SP), 2256-2272, 2023
242023
SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel
L Maar, S Gast, M Unterguggenberger, M Oberhuber, S Mangard
USENIX Security Symposium, 4051-4068, 2024
52024
Divide and Surrender: Exploiting Variable Division Instruction Timing in HQC Key Recovery Attacks
RL Schröder, S Gast, Q Guo
USENIX Security Symposium, 6669-6686, 2024
32024
Remote Scheduler Contention Attacks
S Gast, J Juffinger, L Maar, C Royer, A Kogler, D Gruss
Financial Cryptography and Data Security, 2024
32024
Systematic Analysis of Programming Languages and Their Execution Environments for Spectre Attacks
A Naseredini, S Gast, M Schwarzl, PMS Bernardo, A Smajic, C Canella, ...
arXiv preprint arXiv:2111.12528, 2021
32021
CounterSEVeillance: Performance-Counter Attacks on AMD SEV-SNP
S Gast, H Weissteiner, RL Schröder, D Gruss
Network and Distributed System Security Symposium 2025: NDSS 2025, 2025
2025
SnailLoad: Exploiting Remote Network Latency Measurements without JavaScript
S Gast, R Czerny, J Juffinger, F Rauscher, S Franza, D Gruss
USENIX Security Symposium, 2315-2332, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–7