Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Proceedings of the Microarchitecture Security Conference
Current
Archives
About
About the Journal
Submissions
Privacy Statement
Contact
Search
Login
Home
/
Archives
/
2025: Proceeding of the 1st Microarchitecture Security Conference (uASC '25)
2025: Proceeding of the 1st Microarchitecture Security Conference (uASC '25)
Published:
2025-03-01
Preface
Daniel Gruss, Yuval Yarom, Veelasha Moonsamy (Author)
PDF
Articles
REFault: A Fault Injection Platform for Rowhammer Research on DDR5 Memory
Stefan Gloor, Patrick Jattke, Kaveh Razavi (Author)
PDF
Flipper: Rowhammer on Steroids
Martin Heckel, Florian Adamsky (Author)
PDF
An Analysis of HMB-based SSD Rowhammer
Jonas Juffinger (Author)
PDF
PortPrint: Identifying Inaccessible Code with Port Contention
Tristan Hornetz, Michael Schwarz (Author)
PDF
Hidden in Plain Sight: Scriptless Microarchitectural Attacks via TrueType Font Hinting
Leon Trampert, Michael Schwarz (Author)
PDF
Key recovery on static Kyber based on transient execution attacks
Luccas Ruben J. Constantin-Sukul, Rasmus Ø. Gammelgaard, Alexander N. Henriksen, Diego F. Aranha (Author)
PDF
Talk Abstracts
Talk: Transient-execution attacks on the CHERI Morello platform
Jacqueline Henes, Marius Muench, David Oswald, Hany Ragab (Author)
PDF
Talk: GlueZilla: Efficient and Scalable Software to Hardware Binding using Rowhammer
Ruben Mechelinck, Daniel Dorfmeister, Bernhard Fischer, Stefan Brunthaler, Stijn Volckaert (Author)
PDF
Talk: Blurring Enclave Page Accesses in Space and Time with Compile-Time Instrumentation
Daan Vanoverloop, Andrés Sánchez, Victor Bullynck, Flavio Toffalini, Frank Piessens, Mathias Payer, Jo Van Bulck (Author)
PDF
Poster Abstracts
Poster: LockedApart: Faster GPU Fingerprinting Through the Compute API
Tomer Laor, Yossi Oren (Author)
PDF
Poster: A microarchitectural signals analysis platform to craft Hardware Security Counters
Lucas Georget, Vincent Migliore, Vincent Nicomette, Arthur Villard, Frédéric Silvi (Author)
PDF
Poster: Isolating PIM from OS Level Adversaries
Fabian van Rissenbeck, Amit Choudhari, Christian Rossow (Author)
PDF
Poster: Systematic Evaluation of Automated Tools for Side-Channel Vulnerability Detection in Cryptographic Libraries
Antoine Geimer, Mathéo Vergnolle, Frédéric Recoules, Lesly-Ann Daniel, Sébastien Bardin, Clémentine Maurice (Author)
PDF