Martin Schwarzl

About Martin Schwarzl

Martin Schwarzl, With an exceptional h-index of 9 and a recent h-index of 9 (since 2020), a distinguished researcher at Technische Universität Graz, specializes in the field of Reverse Engineering, Exploitation, System Security, Cache Attacks, Side Channel Attacks.

His recent articles reflect a diverse array of research interests and contributions to the field:

{Collide+ Power}: Leaking Inaccessible Data with Software-based Power Side Channels

DOPE: DOmain Protection Enforcement with PKS

Layered Binary Templating

CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode

Squip: Exploiting the scheduler queue contention side channel

Practical timing side-channel attacks on memory compression

Robust and scalable process isolation against spectre in the cloud

{ÆPIC} leak: Architecturally leaking uninitialized data from the microarchitecture

Martin Schwarzl Information

University

Position

___

Citations(all)

561

Citations(since 2020)

557

Cited By

132

hIndex(all)

9

hIndex(since 2020)

9

i10Index(all)

9

i10Index(since 2020)

9

Email

University Profile Page

Google Scholar

Martin Schwarzl Skills & Research Interests

Reverse Engineering

Exploitation

System Security

Cache Attacks

Side Channel Attacks

Top articles of Martin Schwarzl

{Collide+ Power}: Leaking Inaccessible Data with Software-based Power Side Channels

2023

DOPE: DOmain Protection Enforcement with PKS

2023/12/4

Layered Binary Templating

2023/5/29

Martin Schwarzl
Martin Schwarzl

H-Index: 3

Daniel Gruss
Daniel Gruss

H-Index: 30

CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode

2023/5/25

Squip: Exploiting the scheduler queue contention side channel

2023/5/21

Practical timing side-channel attacks on memory compression

2023/5/21

Robust and scalable process isolation against spectre in the cloud

2022/9/22

{ÆPIC} leak: Architecturally leaking uninitialized data from the microarchitecture

2022

Rapid prototyping for microarchitectural attacks

2022

Systematic analysis of programming languages and their execution environments for spectre attacks

arXiv preprint arXiv:2111.12528

2021/11/24

Remote memory-deduplication attacks

arXiv preprint arXiv:2111.08553

2021/11/16

Specfuscator: Evaluating branch removal as a Spectre mitigation

2021

Speculative dereferencing of registers: Reviving Foreshadow

2021

Donky: Domain Keys–Efficient {In-Process} Isolation for {RISC-V} and x86

2020

See List of Professors in Martin Schwarzl University(Technische Universität Graz)

Co-Authors

academic-engine