About Me:

I am a PhD student at the Institute of Applied Information Processing and Communications at Graz University of Technology. I focus on microarchitectural attacks and side channels.


Papers

2021
Repurposing Segmentation as a Practical LVI-NULL Mitigation in SGX
Lukas Giner, Andreas Kogler, Claudio Canella, Michael Schwarz, Daniel Gruss
GitHub
2020
PLATYPUS: Software-based Power Side-Channel Attacks on x86
Moritz Lipp, Andreas Kogler, David Oswald, Michael Schwarz, Catherine Easdon, Claudio Canella, Daniel Gruss
CVE: CVE-2020-8694, CVE-2020-8695
Media: futurezone, sr, heise, golem, zdnet, arstechnica, csoonline, techradar, computerweekly
Info Recording Demo

Presentations

2020
Attacking CPUs with Power Side Channels from Software: Warum leaked hier Strom?
Moritz Lipp, Michael Schwarz, Andreas Kogler, Daniel Gruss
Talk @ Remote Chaos Experience 2020 , Online , December 27, 2020

CVEs

2020
CVE-2020-8694
Moritz Lipp, Andreas Kogler, David Oswald, Michael Schwarz, Daniel Gruss
Description: Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. , November 10, 2020
CVE-2020-8695
Moritz Lipp, Andreas Kogler, David Oswald, Michael Schwarz, Daniel Gruss
Description: Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access. , November 10, 2020