Follow
Catherine Easdon
Catherine Easdon
Dynatrace Research
Verified email at dynatrace.com
Title
Cited by
Cited by
Year
PLATYPUS: Software-based power side-channel attacks on x86
M Lipp, A Kogler, D Oswald, M Schwarz, C Easdon, C Canella, D Gruss
2021 IEEE Symposium on Security and Privacy (SP), 355-371, 2021
1702021
Rapid prototyping for microarchitectural attacks
C Easdon, M Schwarz, M Schwarzl, D Gruss
31st USENIX Security Symposium (USENIX Security 22), 3861-3877, 2022
252022
Undocumented CPU behavior: Analyzing undocumented opcodes on Intel x86-64
C Easdon
Talk. June, 2018
52018
CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode
P Borrello, C Easdon, M Schwarzl, R Czerny, M Schwarz
2023 IEEE Security and Privacy Workshops (SPW), 285-297, 2023
32023
Undocumented CPU Behaviour on x86 and RISC-V Microarchitectures: A Security Perspective
C Easdon
University of Bristol, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–5