Browse Research
Home Research
Agus Susilo, Warto
Dekonstruksi dan Transformasi Makna Tradisi Mandi Kasai dalam Masyarakat Lubuklinggau
Anthropology

Tradisi Mandi Kasai merupakan salah satu praktik budaya yang telah lama melekat dalam masyarakat Lubuklinggau, Sumatera Selatan. Namun, seiring perkem...

Review:

This paper, "Dekonstruksi dan Transformasi Makna Tradisi Mandi Kasai dalam Masyarakat Lubuklinggau," offers a timely and pertinent examination of how...

View Full Research
Septian Andi Cahyo, M Agus Gunawan, Moch Lukman Hakim, Ilfiana Firzaq Arifin
Prasasti Batu Gong : Studi Historis Peninggalan Sejarah Lokal Jember yang Terbengkalai
History

Local history is a branch of history that is interesting to discuss the culture or history of a region. One of Jember's local historical relics is the...

Review:

This paper addresses a crucial and often overlooked aspect of historical studies: the preservation and understanding of local heritage, specifically f...

View Full Research
Jonas Juffinger
An Analysis of HMB-based SSD Rowhammer
Cyber

Rowhammer has been shown to be an extensive attack vector. In the years since its discovery, numerous exploits have been shown, attacking...

Review:

This paper investigates a novel and increasingly relevant attack surface for Rowhammer: Solid State Drives (SSDs), specifically those leveraging the H...

View Full Research
Ruben Mechelinck, Daniel Dorfmeister, Bernhard Fischer, Stefan Brunthaler, Stijn Volckaert
Talk: GlueZilla: Efficient and Scalable Software to Hardware Binding using Rowhammer
Cyber

Industrial-scale reverse engineering affects the majority of companies in the mechanical and plant engineering sector and imposes significa...

Review:

This talk introduces GlueZilla, a novel system designed to combat industrial-scale reverse engineering, particularly focusing on the replication of ha...

View Full Research
Luccas Ruben J. Constantin-Sukul, Rasmus Ø. Gammelgaard, Alexander N. Henriksen, Diego Aranha
Key recovery on static Kyber based on transient execution attacks
Informatics

Transient execution attacks on modern processors continue to threaten security by stealing sensitive data from other processes running on t...

Review:

This paper presents a highly significant contribution to the field of cybersecurity, specifically at the intersection of microarchitectural vulnerabil...

View Full Research
Tomer Laor, Yossi Oren
Poster: LockedApart: Faster GPU Fingerprinting Through the Compute API
Cyber

WebGL offers website direct access to the GPU, allowing beautiful graphics. The direct hardware access offered by WebGL was also shown to...

Review:

This submission presents a timely and relevant investigation into the security implications of the newly introduced WebGPU API, specifically concernin...

View Full Research
Stefan Gloor, Patrick Jattke, Kaveh Razavi
REFault: A Fault Injection Platform for Rowhammer Research on DDR5 Memory
Informatics

DDR5 is showing increased resistance to Rowhammer attacks compared to previous generations. The minimum hammer count (HCmin) is a metric to...

Review:

This paper presents REFault, a novel and timely fault injection platform designed to address a critical gap in Rowhammer research on DDR5 memory. The...

View Full Research
Martin Heckel, Florian Adamsky
Flipper: Rowhammer on Steroids
Cyber

The density of memory cells in modern DRAM is so high that frequently accessing a memory row can flip bits in nearby rows. That effect is c...

Review:

This paper, titled "Flipper: Rowhammer on Steroids," presents a compelling advancement in Rowhammer research by introducing Flipper, an amplification...

View Full Research
Tristan Hornetz, Michael Schwarz
PortPrint: Identifying Inaccessible Code with Port Contention
Cyber

In many real-world scenarios, being able to infer specific software versions or variations of cryptographic libraries is critical to mounti...

Review:

This paper, titled "PortPrint: Identifying Inaccessible Code with Port Contention," addresses a critical challenge in security research: inferring spe...

View Full Research
Leon Trampert, Michael Schwarz
Hidden in Plain Sight: Scriptless Microarchitectural Attacks via TrueType Font Hinting
Cyber

Microarchitectural attacks threaten system security and privacy, especially if they can be mounted without native code execution. Recent re...

Review:

This paper introduces a significant new vector for microarchitectural attacks, expanding the landscape of "scriptless" side-channel vulnerabilities. B...

View Full Research