Anders Fogh
Anders Fogh
Principal Security Researcher, GDATA Advanced Analytics
Verified email at
Cited by
Cited by
Spectre attacks: Exploiting speculative execution
P Kocher, J Horn, A Fogh, D Genkin, D Gruss, W Haas, M Hamburg, ...
Communications of the ACM 63 (7), 93-101, 2020
Meltdown: Reading kernel memory from user space
M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, J Horn, S Mangard, ...
Communications of the ACM 63 (6), 46-56, 2020
Prefetch side-channel attacks: Bypassing SMAP and kernel ASLR
D Gruss, C Maurice, A Fogh, M Lipp, S Mangard
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
Conversion of data in particular for playing of audio and/or video information
V Breitfeld, A Fogh
US Patent App. 11/345,881, 2006
Automated detection, exploitation, and elimination of double-fetch bugs using modern cpu features
M Schwarz, D Gruss, M Lipp, C Maurice, T Schuster, A Fogh, S Mangard
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
Page cache attacks
D Gruss, E Kraft, T Tiwari, M Schwarz, A Trachtenberg, J Hennessey, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
These are not your grand Daddys cpu performance counters–cpu hardware performance counters for security
N Herath, A Fogh
Black Hat Briefings 47, 48, 2015
Negative result: Reading kernel memory from user mode
A Fogh
Retrieved from, 2017
Copy Protection For Audio, Video, and/or A/V Navigation Data
V Breitfeld, A Fogh, T Taschner
US Patent App. 11/618,395, 2007
Drama: How your dram becomes a security problem
M Schwarz, A Fogh
Black Hat Europe, 2016
Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process
A Fogh, D Gruss
Blackhat USA, 2016
PC Chairs
A Oprea, T Holz, A Aviv, D Balzarotti, G Barthe, L Bauer, K Bhargavan, ...
Christopher Kruegel, UC Santa Barbara
H Shacham, A Shelat, A Bates, A Doupé, A Perrig, AP Felt, A Kiayias, ...
The system can't perform the operation now. Try again later.
Articles 1–13