
Fabian Rauscher
@v4m1n
Security Researcher | PhD Candidate with CoreSec at @tugraz
ID: 979106285022056448
https://responsible.fyi 28-03-2018 21:21:44
20 Tweet
100 Followers
169 Following




I am happy to announce that Collide+Power, our new and generic software-based power side-channel technique, has been accepted at USENIX Security 2023 #usesec23. collidepower.com


I'm happy to announce that my first paper, "IdleLeak: Exploiting Idle State Side Effects for Information Leakage", has been accepted at #NDSS2024 🥳 ndss-symposium.org/wp-content/upl… Also, a huge thanks to my co-authors Andreas Kogler Jonas - j² Daniel Gruss

If you're at the NDSS Symposium, please have a chat with my PhD student Fabian Rauscher. He has worked on several interesting projects on OS/HV and processor security.


Announcing #SnailLoad, a website- and video-fingerprinting attack via TCP connections, without any attacker code on the victim machine: snailload.com Great collaboration with Roland Czerny, @notimaginary, Fabian Rauscher, Simone Franza and Daniel Gruss (1/3)


Announcing #CounterSEVeillance, a novel attack on AMD SEV-SNP inferring control-flow information and operand properties from performance-counter data with single-instruction resolution. Thanks to Hannes Weissteiner, Robin Leander Schröder and Daniel Gruss for the amazing collaboration!



Recently, Daniel Gruss, Martin Heckel, and Florian A. gave a talk about #Rowhammer at #38C3. Now, they are looking for participants for their large-scale Rowhammer study! 🔨 Find out more about Rowhammer & participate in the study 👇 isec.tugraz.at/flippyram or flippyr.am

