1 | https://github.com/misc0110
| Whois | github.com |
2 | https://twitter.com/misc0110
| Whois | twitter.com |
3 | https://scholar.google.at/citations?user=2HPadJUAAAAJ&hl=en
| Whois | google.at |
4 | https://orcid.org/0000-0001-6744-3410
| Whois | orcid.org |
5 | https://cispa.saarland
| Whois | cispa.saarland |
6 | https://roots.ec
| Whois | roots.ec |
7 | https://github.com/cispa/IRQGuard
| Whois | github.com |
8 | https://www.heise.de/news/CacheWarp-Loch-in-Hardware-Verschluesselung-von-AMD-CPUs-9528270.html
| Whois | heise.de |
9 | https://www.computerbase.de/2023-11/cachewarp-neue-sicherheitsluecke-mit-heilmittel-in-cpus-von-amd/
| Whois | computerbase.de |
10 | https://www.bleepingcomputer.com/news/security/new-cachewarp-amd-cpu-attack-lets-hackers-gain-root-in-linux-vms/
| Whois | bleepingcomputer.com |
11 | https://thehackernews.com/2023/11/cachewarp-attack-new-vulnerability-in.html
| Whois | thehackernews.com |
12 | https://www.darkreading.com/vulnerabilities-threats/cachewarp-amd-vm-bug-opens-door-to-privilege-escalation
| Whois | darkreading.com |
13 | https://www.securityweek.com/protected-virtual-machines-exposed-to-new-cachewarp-amd-cpu-attack/
| Whois | securityweek.com |
14 | https://bnn.network/tech/cybersecurity/cachewarp-new-threat-to-amds-secure-encrypted-virtualization/
| Whois | bnn.network |
15 | https://www.theregister.com/2023/11/14/amd_trusted_execution/
| Whois | theregister.com |
16 | https://www.golem.de/news/cachewarp-cpu-schwachstelle-gefaehrdet-amd-basierte-serversysteme-2311-179430.html
| Whois | golem.de |
17 | https://www.businesstelegraph.co.uk/cachewarp-attack-new-vulnerability-in-amd-sev-exposes-the-hacker-news/
| Whois | co.uk |
18 | https://www.pcgameshardware.de/CPU-CPU-154106/News/Microcode-Updates-von-AMD-gegen-CacheWarp-1433856/
| Whois | pcgameshardware.de |
19 | https://cybersecuritynews.com/cachewarp-a-new-flaw-in-amds-sev/
| Whois | cybersecuritynews.com |
20 | https://hothardware.com/news/amd-epyc-processors-found-vulnerable-to-cachewarp
| Whois | hothardware.com |
21 | https://gigazine.net/news/20231115-amd-vulnerability-sev-es-snp-vm/
| Whois | gigazine.net |
22 | http://cachewarpattack.com/
| Whois | cachewarpattack.com |
23 | https://github.com/cispa/CacheWarp
| Whois | github.com |
24 | https://github.com/cispa/Switchpoline
| Whois | github.com |
25 | https://github.com/cispa/Microarchitectural-Hash-Function-Recovery
| Whois | github.com |
26 | https://www.youtube.com/watch?v=sHWj44C-ohA
| Whois | youtube.com |
27 | https://github.com/cispa/indirect-meltdown
| Whois | github.com |
28 | https://github.com/cispa/regcheck
| Whois | github.com |
29 | https://github.com/scy-phy/FetchBench
| Whois | github.com |
30 | https://www.heise.de/news/Collide-Power-Seitenkanalangriffe-auf-alle-Prozessoren-9231995.html
| Whois | heise.de |
31 | https://cispa.de/en/collideandpower
| Whois | cispa.de |
32 | https://nachrichten.idw-online.de/2023/08/01/collide-power-neuer-seitenkanalangriff-betrifft-alle-prozessoren?groupcolor=1
| Whois | idw-online.de |
33 | https://www.theregister.com/2023/08/01/collide_power_cpu_attack/
| Whois | theregister.com |
34 | https://www.securityweek.com/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack/
| Whois | securityweek.com |
35 | https://steiermark.orf.at/stories/3218398/
| Whois | orf.at |
36 | https://www.bleepingcomputer.com/news/security/new-collide-pluspower-side-channel-attack-impacts-almost-all-cpus/
| Whois | bleepingcomputer.com |
37 | https://www.hackster.io/news/collide-power-can-enhance-any-side-channel-signal-related-to-power-for-easier-exploitation-a7bc5f1f4f92
| Whois | hackster.io |
38 | https://nakedsecurity.sophos.com/2023/08/03/performance-and-security-clash-yet-again-in-collidepower-attack/
| Whois | sophos.com |
39 | http://collidepower.com/
| Whois | collidepower.com |
40 | https://github.com/iaik/CollidePower
| Whois | github.com |
41 | https://dramsec.ethz.ch/
| Whois | ethz.ch |
42 | https://github.com/cispa/hammulator
| Whois | github.com |
43 | https://www.youtube.com/watch?v=yA9-CnwJqMU
| Whois | youtube.com |
44 | https://github.com/cispa/Security-RISC
| Whois | github.com |
45 | https://www.youtube.com/watch?v=3-c4C_L2PRQ
| Whois | youtube.com |
46 | https://arxiv.org/abs/2111.08404
| Whois | arxiv.org |
47 | https://github.com/IAIK/Memory-Compression-Attacks
| Whois | github.com |
48 | https://www.youtube.com/watch?v=fb93jr8wy94
| Whois | youtube.com |
49 | https://streamable.com/qxr9h4
| Whois | streamable.com |
50 | https://twitter.com/wootsecurity/status/1661884143964422145
| Whois | twitter.com |
51 | https://github.com/pietroborrello/CustomProcessingUnit
| Whois | github.com |
52 | https://github.com/CISPA/mwait
| Whois | github.com |
53 | https://www.theregister.com/2022/08/09/intel_sunny_cove
| Whois | theregister.com |
54 | https://arstechnica.com/information-technology/2022/08/architectural-bug-in-some-intel-cpus-is-more-bad-news-for-sgx-users/
| Whois | arstechnica.com |
55 | https://www.securityweek.com/aepic-leak-architectural-bug-intel-cpus-exposes-protected-data
| Whois | securityweek.com |
56 | https://www.heise.de/meinung/AEPIC-Leak-Die-Komplexitaetsschuldenfalle-7223403.html
| Whois | heise.de |
57 | https://thehackernews.com/2022/08/pic-and-squip-vulnerabilities-found-in.html
| Whois | thehackernews.com |
58 | https://securityaffairs.co/wordpress/134478/security/aepic-leak-architecturally-flaw.html
| Whois | securityaffairs.co |
59 | https://www.deutschlandfunk.de/wie-die-sicherheitsluecke-aepic-geheimnisse-offenlegt-int-michael-schwarz-dlf-82abaf1d-100.html
| Whois | deutschlandfunk.de |
60 | https://aepicleak.com
| Whois | aepicleak.com |
61 | https://github.com/IAIK/AEPIC
| Whois | github.com |
62 | https://www.usenix.org/system/files/sec22_slides-borrello.pdf
| Whois | usenix.org |
63 | https://www.youtube.com/watch?v=aiAd969ayQc
| Whois | youtube.com |
64 | https://arxiv.org/abs/2207.05676
| Whois | arxiv.org |
65 | https://hyperdbg.org/
| Whois | hyperdbg.org |
66 | https://github.com/HyperDbg/HyperDbg
| Whois | github.com |
67 | https://developers.cloudflare.com/workers/learning/security-model/
| Whois | cloudflare.com |
68 | https://blog.cloudflare.com/spectreresearch-with-tu-graz/
| Whois | cloudflare.com |
69 | https://www.infoq.com/news/2021/10/dynamic-process-isolation/
| Whois | infoq.com |
70 | https://esorics2022.compute.dtu.dk/program.html
| Whois | dtu.dk |
71 | https://github.com/CISPA/browser-cpu-fingerprinting
| Whois | github.com |
72 | https://esorics2022.compute.dtu.dk/program.html
| Whois | dtu.dk |
73 | https://github.com/MIAOUS-group/port-contention-without-smt
| Whois | github.com |
74 | https://github.com/CISPA/BranchDifferent
| Whois | github.com |
75 | https://github.com/IAIK/msrevelio
| Whois | github.com |
76 | https://www.youtube.com/watch?v=xvAASpfadws
| Whois | youtube.com |
77 | https://www.usenix.org/conference/usenixsecurity22/presentation/kogler-minefield
| Whois | usenix.org |
78 | https://github.com/IAIK/minefield
| Whois | github.com |
79 | https://www.usenix.org/system/files/sec22_slides-kogler_minefield.pdf
| Whois | usenix.org |
80 | https://www.youtube.com/watch?v=5DIO7m3KU8g
| Whois | youtube.com |
81 | https://therecord.media/academics-find-meltdown-like-attacks-on-amd-cpus-previously-thought-to-be-unaffected/
| Whois | therecord.media |
82 | https://www.phoronix.com/scan.php?page=article&item=if-amd-kpti&num=1
| Whois | phoronix.com |
83 | https://www.securityweek.com/researchers-disclose-new-side-channel-attacks-affecting-all-amd-cpus
| Whois | securityweek.com |
84 | https://securityaffairs.co/wordpress/123401/hacking/side-channel-attack-amd-cpus.html
| Whois | securityaffairs.co |
85 | https://cyberintelmag.com/attacks-data-breaches/researchers-have-discovered-new-side-channel-attacks-that-affect-all-amd-cpus/
| Whois | cyberintelmag.com |
86 | https://www.aroged.com/2021/10/18/new-vulnerability-to-meltdown-attacks-found-in-amd-processors-developers-will-not-fix-it/
| Whois | aroged.com |
87 | https://gadgettendency.com/experts-presented-two-meltdown-like-attacks-on-amd-cpus-at-once/
| Whois | gadgettendency.com |
88 | https://www.usenix.org/conference/usenixsecurity22/presentation/lipp
| Whois | usenix.org |
89 | https://github.com/amdprefetch/amd-prefetch-attacks
| Whois | github.com |
90 | https://www.youtube.com/watch?v=bTV-9-B26_w
| Whois | youtube.com |
91 | https://www.usenix.org/conference/usenixsecurity22/presentation/giner
| Whois | usenix.org |
92 | https://github.com/lvi-nullify/LVI-NULLify
| Whois | github.com |
93 | https://www.usenix.org/system/files/sec22_slides-giner.pdf
| Whois | usenix.org |
94 | https://www.youtube.com/watch?v=wwPrVRyAcag
| Whois | youtube.com |
95 | https://www.usenix.org/conference/usenixsecurity22/presentation/easdon
| Whois | usenix.org |
96 | https://github.com/libtea/frameworks
| Whois | github.com |
97 | https://www.usenix.org/system/files/sec22_slides-easdon.pdf
| Whois | usenix.org |
98 | https://www.youtube.com/watch?v=s5zG6fcglgc
| Whois | youtube.com |
99 | https://arxiv.org/abs/2012.02554
| Whois | arxiv.org |
100 | https://github.com/chestnut-sandbox/Chestnut
| Whois | github.com |
101 | https://www.usenix.org/conference/usenixsecurity21/presentation/weber
| Whois | usenix.org |
102 | https://github.com/cispa/osiris
| Whois | github.com |
103 | https://www.usenix.org/system/files/sec21_slides_weber.pdf
| Whois | usenix.org |
104 | https://www.usenix.org/conference/usenixsecurity21/presentation/weber
| Whois | usenix.org |
105 | https://www.theregister.com/2020/11/10/intel_sgx_side_channel/
| Whois | theregister.com |
106 | https://www.computerweekly.com/news/252491855/Intel-and-AMD-processors-affected-by-another-side-channel-exploit
| Whois | computerweekly.com |
107 | https://arstechnica.com/information-technology/2020/11/intel-sgx-defeated-yet-again-this-time-thanks-to-on-chip-power-meter/
| Whois | arstechnica.com |
108 | https://www.zdnet.com/article/new-platypus-attack-can-steal-data-from-intel-cpus/
| Whois | zdnet.com |
109 | https://cispa.de/en/news-and-events/news-archive/articles/2020/platypus
| Whois | cispa.de |
110 | https://platypusattack.com/
| Whois | platypusattack.com |
111 | https://www.youtube.com/watch?v=LXaroV2crWw
| Whois | youtube.com |
112 | https://www.youtube.com/watch?v=ygWEK1JvL_s
| Whois | youtube.com |
113 | https://arxiv.org/abs/2008.02307
| Whois | arxiv.org |
114 | https://www.theregister.com/2020/08/07/foreshadow_strikes_back_boffins_find/
| Whois | theregister.com |
115 | https://www.phoronix.com/scan.php?page=news_item&px=Reviving-Foreshadow-Bad
| Whois | phoronix.com |
116 | https://thehackernews.com/2020/08/foreshadow-processor-vulnerability.html
| Whois | thehackernews.com |
117 | https://youtube.com/watch?v=YEurJoKAZYM
| Whois | youtube.com |
118 | https://youtube.com/watch?v=iLDf8iL3CkQ
| Whois | youtube.com |
119 | https://ieeexplore.ieee.org/document/9107096
| Whois | ieee.org |
120 | https://github.com/IAIK/Donky
| Whois | github.com |
121 | https://www.usenix.org/system/files/sec20_slides_schrammel.pdf
| Whois | usenix.org |
122 | https://www.usenix.org/conference/usenixsecurity20/presentation/schrammel
| Whois | usenix.org |
123 | https://www.tomshardware.com/news/new-amd-side-channel-attacks-discovered-impacts-zen-architecture
| Whois | tomshardware.com |
124 | https://www.zdnet.com/article/amd-processors-from-2011-to-2019-vulnerable-to-two-new-attacks/
| Whois | zdnet.com |
125 | https://www.engadget.com/2020/03/08/amd-cpu-take-a-way-data-leak-security-flaw/
| Whois | engadget.com |
126 | https://www.techradar.com/news/amd-processors-going-back-to-2011-suffer-from-worrying-security-holes
| Whois | techradar.com |
127 | https://www.techspot.com/news/84309-amd-cpus-vulnerable-severe-new-side-channel-attack.html
| Whois | techspot.com |
128 | https://github.com/IAIK/FLARE
| Whois | github.com |
129 | https://arxiv.org/abs/1805.04956
| Whois | arxiv.org |
130 | https://thehackernews.com/2018/05/remoterowhammer-attack.html
| Whois | thehackernews.com |
131 | https://www.theregister.co.uk/2018/05/17/nethammer_second_remoterowhammer_exploit/
| Whois | co.uk |
132 | https://www.heise.de/security/meldung/Nethammer-Throwhammer-Rowhammer-uebers-Netzwerk-4052066.html
| Whois | heise.de |
133 | https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi-medusa
| Whois | usenix.org |
134 | https://github.com/vernamlab/medusa
| Whois | github.com |
135 | https://www.usenix.org/system/files/sec20_slides_moghimi-medusa.pdf
| Whois | usenix.org |
136 | https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi-medusa
| Whois | usenix.org |
137 | https://spectreattack.com
| Whois | spectreattack.com |
138 | https://cacm.acm.org/magazines/2020/7/245682-spectre-attacks/fulltext
| Whois | acm.org |
139 | https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)
| Whois | wikipedia.org |
140 | https://meltdownattack.com
| Whois | meltdownattack.com |
141 | https://cacm.acm.org/magazines/2020/6/245161-meltdown/fulltext
| Whois | acm.org |
142 | https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)
| Whois | wikipedia.org |
143 | https://github.com/IAIK/meltdown
| Whois | github.com |
144 | https://www.theregister.co.uk/2020/03/10/lvi_intel_cpu_attack/
| Whois | co.uk |
145 | https://www.tomshardware.com/uk/news/load-value-injection-vulnerability-found-in-intel-chips
| Whois | tomshardware.com |
146 | https://www.zdnet.com/article/intel-cpus-vulnerable-to-new-lvi-attacks/
| Whois | zdnet.com |
147 | https://www.heise.de/security/meldung/Weitere-CPU-Sicherheitsluecke-Load-Value-Injection-LVI-4680250.html
| Whois | heise.de |
148 | https://www.securityweek.com/load-value-injection-intel-cpus-vulnerablereverse-meltdown-attack
| Whois | securityweek.com |
149 | https://lviattack.eu/
| Whois | lviattack.eu |
150 | https://en.wikipedia.org/wiki/Load_value_injection
| Whois | wikipedia.org |
151 | https://github.com/jovanbulck/sgx-step/tree/master/app/lvi
| Whois | github.com |
152 | https://www.youtube.com/watch?v=99kVz-YGi6Y
| Whois | youtube.com |
153 | https://www.youtube.com/watch?v=goy8XRXFlh4
| Whois | youtube.com |
154 | https://www.youtube.com/watch?v=NCVHSlmLgO8
| Whois | youtube.com |
155 | https://arxiv.org/abs/1905.09100
| Whois | arxiv.org |
156 | https://www.ndss-symposium.org/ndss-paper/context-a-generic-approach-for-mitigating-spectre/
| Whois | ndss-symposium.org |
157 | https://github.com/IAIK/contextlight
| Whois | github.com |
158 | https://www.youtube.com/watch?v=lVeK1C_AHhc
| Whois | youtube.com |
159 | https://arxiv.org/abs/1702.08719
| Whois | arxiv.org |
160 | https://www.theregister.co.uk/2017/03/07/eggheads_slip_a_note_under_intels_door_sgx_can_leak_crypto_keys/
| Whois | co.uk |
161 | https://www.schneier.com/blog/archives/2017/03/using_intels_sg.html
| Whois | schneier.com |
162 | http://www.securitynewspaper.com/2017/03/13/super-malware-steals-encryption-keys-intel-sgx-enclaves/
| Whois | securitynewspaper.com |
163 | https://securityintelligence.com/news/sgx-malware-extracts-rsa-key-in-five-minutes/
| Whois | securityintelligence.com |
164 | http://www.digitaltrends.com/computing/researchers-intel-sgx-vulnerabilities/
| Whois | digitaltrends.com |
165 | https://www.bleepingcomputer.com/news/hardware/-super-malware-steals-encryption-keys-from-intel-sgx-enclaves/
| Whois | bleepingcomputer.com |
166 | http://www.securityweek.com/researchers-use-intel-sgx-conceal-malware-extract-private-keys
| Whois | securityweek.com |
167 | https://doi.org/10.1186/s42400-019-0042-y
| Whois | doi.org |
168 | https://en.wikipedia.org/wiki/Software_Guard_Extensions#Prime+Probe_attack
| Whois | wikipedia.org |
169 | https://arxiv.org/abs//1905.05726
| Whois | arxiv.org |
170 | https://www.bbc.com/news/technology-48278400
| Whois | bbc.com |
171 | https://www.theverge.com/2019/5/14/18623708/zombieload-attack-intel-processors-speculative-execution
| Whois | theverge.com |
172 | http://fortune.com/2019/05/15/zombieload-flaw-lets-hackers-crack-almost-every-intel-chip-back-to-2011-why-is-it-being-downplayed/
| Whois | fortune.com |
173 | https://www.zdnet.com/article/intel-cpus-impacted-by-new-zombieload-side-channel-attack/
| Whois | zdnet.com |
174 | https://www.heise.de/newsticker/meldung/Neue-Sicherheitsluecken-in-Intel-Prozessoren-ZombieLoad-4421217.html
| Whois | heise.de |
175 | https://zombieloadattack.com
| Whois | zombieloadattack.com |
176 | https://zombieloadattack.com
| Whois | zombieloadattack.com |
177 | https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling
| Whois | wikipedia.org |
178 | https://github.com/IAIK/ZombieLoad
| Whois | github.com |
179 | https://www.youtube.com/watch?v=wQvgyChrk_g
| Whois | youtube.com |
180 | https://arxiv.org/abs/1905.12701
| Whois | arxiv.org |
181 | https://www.trendmicro.com/vinfo/nz/security/news/vulnerabilities-and-exploits/side-channel-attacks-ridl-fallout-and-zombieload-affects-millions-of-vulnerable-intel-processors
| Whois | trendmicro.com |
182 | https://www.bleepingcomputer.com/news/security/new-ridl-and-fallout-attacks-impact-all-modern-intel-cpus/
| Whois | bleepingcomputer.com |
183 | https://www.wired.com/story/intel-mds-attack-speculative-execution-buffer/
| Whois | wired.com |
184 | https://mdsattacks.com
| Whois | mdsattacks.com |
185 | https://mdsattacks.com
| Whois | mdsattacks.com |
186 | https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling
| Whois | wikipedia.org |
187 | https://arxiv.org/abs/1807.10535
| Whois | arxiv.org |
188 | https://www.theregister.co.uk/2018/07/26/netspectre_network_leak/
| Whois | co.uk |
189 | https://gbhackers.com/netspectre/
| Whois | gbhackers.com |
190 | https://www.securityweek.com/remote-spectre-attack-allows-data-theft-over-network
| Whois | securityweek.com |
191 | https://www.heise.de/security/meldung/NetSpectre-liest-RAM-via-Netzwerk-aus-4121831.html
| Whois | heise.de |
192 | https://www.bleepingcomputer.com/news/security/new-netspectre-attack-can-steal-cpu-secrets-via-network-connections/
| Whois | bleepingcomputer.com |
193 | https://www.darkreading.com/attacks-breaches/new-spectre-variant-hits-the-network/d/d-id/1332431
| Whois | darkreading.com |
194 | https://esorics2019.uni.lu/sessions/side-channels/
| Whois | uni.lu |
195 | https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)#History
| Whois | wikipedia.org |
196 | https://www.raid-2019.org/accepted.html
| Whois | raid-2019.org |
197 | https://arxiv.org/abs//1905.05725
| Whois | arxiv.org |
198 | https://www.theregister.co.uk/2019/05/14/intel_sidechannel_vulnerability/
| Whois | co.uk |
199 | https://arstechnica.com/gadgets/2019/05/new-speculative-execution-bug-leaks-data-from-intel-chips-internal-buffers/
| Whois | arstechnica.com |
200 | https://www.tugraz.at/en/tu-graz/services/news-stories/tu-graz-news/singleview/article/nach-meltdown-und-spectre-tu-graz-forscher-entdecken-neue-sicherheitsluecken0/
| Whois | tugraz.at |
201 | https://cpu.fail
| Whois | cpu.fail |
202 | https://arxiv.org/abs/1811.05441
| Whois | arxiv.org |
203 | https://www.theinquirer.net/inquirer/news/3066468/seven-more-spectre-and-meltdown-attacks-have-been-discovered-sigh
| Whois | theinquirer.net |
204 | https://thehackernews.com/2018/11/meltdown-spectre-vulnerabilities.html
| Whois | thehackernews.com |
205 | https://www.securitynow.com/author.asp?section_id=649&doc_id=747624
| Whois | securitynow.com |
206 | https://www.zdnet.com/articleresearchers-discover-seven-new-meltdown-and-spectre-attacks/
| Whois | zdnet.com |
207 | https://www.heise.de/newsticker/meldung/Prozessor-Sicherheit-Sieben-neue-Varianten-von-Spectre-Luecken-4220854.html
| Whois | heise.de |
208 | http://transient.fail/
| Whois | transient.fail |
209 | https://www.usenix.org/conference/usenixsecurity19/presentation/canella
| Whois | usenix.org |
210 | https://github.com/IAIK/transientfail
| Whois | github.com |
211 | https://www.usenix.org/sites/default/files/conference/protected-files/sec19_slides_canella.pdf
| Whois | usenix.org |
212 | https://www.youtube.com/watch?v=ibqC4nbs23Y
| Whois | youtube.com |
213 | https://www.usenix.org/conference/usenixsecurity19/presentation/werner
| Whois | usenix.org |
214 | https://www.usenix.org/sites/default/files/conference/protected-files/sec19_slides_werner.pdf
| Whois | usenix.org |
215 | https://www.youtube.com/watch?v=cbOqDKdCwvY
| Whois | youtube.com |
216 | https://arxiv.org/abs/1901.01161
| Whois | arxiv.org |
217 | https://www.darkreading.com/vulnerabilities-and-threats/new-software-side-channel-attack-raises-risk-for-captured-crypto/d/d-id/1333635
| Whois | darkreading.com |
218 | https://www.securityweek.com/new-side-channel-attack-targets-os-page-cache
| Whois | securityweek.com |
219 | https://www.bleepingcomputer.com/news/security/new-side-channel-attack-steals-data-from-windows-linux-page-cache/
| Whois | bleepingcomputer.com |
220 | https://www.theregister.co.uk/2019/01/05/boffins_beat_page_cache/
| Whois | co.uk |
221 | https://www.scmagazine.com/home/security-news/researchers-discover-hardware-agnostic-side-channel-attack-that-exploits-os-page-cache/
| Whois | scmagazine.com |
222 | https://www.securitynow.com/author.asp?section_id=649&doc_id=748678
| Whois | securitynow.com |
223 | https://en.wikipedia.org/wiki/Page_cache#Side-channel_attacks
| Whois | wikipedia.org |
224 | https://arxiv.org/abs/1902.03256
| Whois | arxiv.org |
225 | https://www.theregister.co.uk/2019/02/12/intel_sgx_hacked/
| Whois | co.uk |
226 | https://www.zdnet.com/articleresearchers-hide-malware-in-intel-sgx-enclaves/
| Whois | zdnet.com |
227 | https://www.trendmicro.com/vinfo/se/security/news/virtualization-and-cloud/proof-of-concept-shows-how-malware-can-hide-from-av-solutions-via-intel-s-sgx-enclaves
| Whois | trendmicro.com |
228 | https://thehackernews.com/2019/02/intel-sgx-malware-hacking.html
| Whois | thehackernews.com |
229 | https://www.techradar.com/news/researchers-exploit-intel-sgx-to-hide-malware
| Whois | techradar.com |
230 | https://arstechnica.com/gadgets/2019/02/researchers-use-intel-sgx-to-put-malware-beyond-thereach-of-antivirus-software/
| Whois | arstechnica.com |
231 | https://www.dimva2019.org/program/
| Whois | dimva2019.org |
232 | https://github.com/IAIK/sgxrop
| Whois | github.com |
233 | https://arxiv.org/abs/1801.01203
| Whois | arxiv.org |
234 | https://spectreattack.com/
| Whois | spectreattack.com |
235 | https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)
| Whois | wikipedia.org |
236 | http://www.ieee-security.org/TC/SP2019/SP19-Slides-pdfs/Paul_Kocher_01_-_Spectre_Attacks-IEEE-SecurityPrivacy_v05.pdf
| Whois | ieee-security.org |
237 | https://www.youtube.com/watch?v=zOvBHxMjNls
| Whois | youtube.com |
238 | https://www.theregister.co.uk/2019/06/11/javascript_fingerprinting/
| Whois | co.uk |
239 | https://www.zdnet.com/article/javascript-template-attacks-expose-new-browser-fingerprinting-vectors/
| Whois | zdnet.com |
240 | https://ethhack.com/2019/06/javascript-template-attacks-expose-new-browser-fingerprinting-vectors/
| Whois | ethhack.com |
241 | https://portswigger.net/daily-swig/tell-tale-fingerprint-leak-in-browser-privacy-tools-exposed
| Whois | portswigger.net |
242 | https://www.ndss-symposium.org/ndss-paper/javascript-template-attacks-automatically-inferring-host-information-for-targeted-exploits/
| Whois | ndss-symposium.org |
243 | https://github.com/IAIK/jstemplate
| Whois | github.com |
244 | https://www.youtube.com/watch?v=14VdTShqqa8
| Whois | youtube.com |
245 | https://arxiv.org/abs/1801.01207
| Whois | arxiv.org |
246 | https://meltdownattack.com/
| Whois | meltdownattack.com |
247 | https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)
| Whois | wikipedia.org |
248 | https://github.com/IAIK/meltdown
| Whois | github.com |
249 | https://www.youtube.com/watch?v=WgAshgc9u6c
| Whois | youtube.com |
250 | https://arxiv.org/pdf/1711.01254
| Whois | arxiv.org |
251 | https://github.com/IAIK/libdropit
| Whois | github.com |
252 | https://www.bleepingcomputer.com/news/security/new-rowhammer-attack-bypasses-previously-proposed-countermeasures/
| Whois | bleepingcomputer.com |
253 | https://www.securitynow.com/author.asp?section_id=649&doc_id=737170
| Whois | securitynow.com |
254 | https://www.tugraz.at/en/tu-graz/services/news-stories/planet-research/singleview/article/wenn-rowhammer-nur-noch-einmal-klopft/
| Whois | tugraz.at |
255 | https://www.theregister.co.uk/2017/10/05/rohwammer_defences_defeated_by_opcode_flipping/
| Whois | co.uk |
256 | https://github.com/IAIK/flipfloyd
| Whois | github.com |
257 | https://www.youtube.com/watch?v=_JPhsqJzV5I
| Whois | youtube.com |
258 | https://www.bleepingcomputer.com/news/security/chrome-extension-protects-against-javascript-based-cpu-side-channel-attacks/
| Whois | bleepingcomputer.com |
259 | https://www.techgig.com/tech-news/how-to-protect-javascript-based-cpu-side-channel-attacks-on-chrome-166633
| Whois | techgig.com |
260 | https://medium.com/@dieswaytoofast/defending-against-javascript-sidechannels-94df5b9e1e90
| Whois | medium.com |
261 | https://github.com/IAIK/ChromeZero
| Whois | github.com |
262 | https://www.youtube.com/watch?v=6SqIFs0_uBU
| Whois | youtube.com |
263 | https://github.com/IAIK/keydrown
| Whois | github.com |
264 | https://www.youtube.com/watch?v=limElEZNdS8
| Whois | youtube.com |
265 | https://github.com/interruptjs/interruptjs
| Whois | github.com |
266 | https://en.wikipedia.org/wiki/Kernel_page-table_isolation
| Whois | wikipedia.org |
267 | https://github.com/IAIK/KAISER
| Whois | github.com |
268 | https://arxiv.org/pdf/1702.08719
| Whois | arxiv.org |
269 | https://www.theregister.co.uk/2017/03/07/eggheads_slip_a_note_under_intels_door_sgx_can_leak_crypto_keys/
| Whois | co.uk |
270 | https://www.schneier.com/blog/archives/2017/03/using_intels_sg.html
| Whois | schneier.com |
271 | http://www.securitynewspaper.com/2017/03/13/super-malware-steals-encryption-keys-intel-sgx-enclaves/
| Whois | securitynewspaper.com |
272 | https://securityintelligence.com/news/sgx-malware-extracts-rsa-key-in-five-minutes/
| Whois | securityintelligence.com |
273 | http://www.digitaltrends.com/computing/researchers-intel-sgx-vulnerabilities/
| Whois | digitaltrends.com |
274 | https://www.bleepingcomputer.com/news/hardware/-super-malware-steals-encryption-keys-from-intel-sgx-enclaves/
| Whois | bleepingcomputer.com |
275 | http://www.securityweek.com/researchers-use-intel-sgx-conceal-malware-extract-private-keys
| Whois | securityweek.com |
276 | https://en.wikipedia.org/wiki/Software_Guard_Extensions#Prime+Probe_attack
| Whois | wikipedia.org |
277 | https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
| Whois | mozilla.org |
278 | https://www.theregister.co.uk/2017/03/31/researchers_steal_data_from_shared_cache_of_two_cloud_vms/
| Whois | co.uk |
279 | https://www.internetsociety.org/doc/hello-other-side-ssh-over-robust-cache-covert-channels-cloud
| Whois | internetsociety.org |
280 | https://www.youtube.com/watch?v=E91qcwDPk8U
| Whois | youtube.com |
281 | https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/pessl
| Whois | usenix.org |
282 | https://github.com/IAIK/drama
| Whois | github.com |
283 | https://www.usenix.org/sites/default/files/conference/protected-files/security16_slides_pessl.pdf
| Whois | usenix.org |
284 | https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/pessl
| Whois | usenix.org |
285 | https://www.asianhost.org/2023/program.htm
| Whois | asianhost.org |
286 | https://cispa.de/summer-school
| Whois | cispa.de |
287 | https://www.ruhrsec.de/2023/
| Whois | ruhrsec.de |
288 | https://www.instagram.com/p/CpQED4FIY-i/
| Whois | instagram.com |
289 | https://www.unserding.de/unserding/news/die-infos/cyberunterricht_otto_hahn_gymnasium_100.html
| Whois | unserding.de |
290 | https://www.forschung-it-sicherheit-kommunikationssysteme.de/service/aktuelles/informationstour-it-sicherheitsforschung
| Whois | forschung-it-sicherheit-kommunikationssysteme.de |
291 | https://www.it-defense.de/it-defense-2023/programm/vortraege#c1764
| Whois | it-defense.de |
292 | https://www.ip-paris.fr/en/international-winter-school-microarchitectural-security-2022
| Whois | ip-paris.fr |
293 | https://cispa.de/en/airbus-cispa-day
| Whois | cispa.de |
294 | https://www.explore-science.info/mannheim/buehne/695-vortrag-freitag
| Whois | explore-science.info |
295 | https://uni-saarland.lineupr.com/infotag2022/item/143
| Whois | lineupr.com |
296 | https://hardwear.io/webinar/CPU-fuzzing.php
| Whois | hardwear.io |
297 | https://www.youtube.com/watch?v=dctyq0npB5s
| Whois | youtube.com |
298 | https://roadshow.cybersicherheit.saarland/
| Whois | cybersicherheit.saarland |
299 | https://www.youtube.com/watch?v=8_pXAOzLta4&t=17919s
| Whois | youtube.com |
300 | https://roadshow.cybersicherheit.saarland/
| Whois | cybersicherheit.saarland |
301 | https://digitaltag.eu/pubquiz-rund-um-informatik-und-cybersicherheit
| Whois | digitaltag.eu |
302 | https://www.darkreading.com/theedge/black-hat-asia-speakers-share-secrets-about-sandboxes-smart-doors-and-security/b/d-id/1340867
| Whois | darkreading.com |
303 | https://blackhat.com/asia-21/briefings/schedule/#enter-sandbox-21792
| Whois | blackhat.com |
304 | https://fahrplan.events.ccc.derc3/2020/Fahrplan/events/11365.html
| Whois | ccc.derc3 |
305 | https://media.ccc.de/v/rc3-11365-lvi_hijacking_transient_execution_through_microarchitectural_load_value_injection
| Whois | ccc.de |
306 | https://fahrplan.events.ccc.derc3/2020/Fahrplan/events/11404.html
| Whois | ccc.derc3 |
307 | https://www.youtube.com/watch?v=scP-D-Idlc8
| Whois | youtube.com |
308 | https://www.blackhat.com/asia-20/briefings/schedule/#store-to-leak-forwarding-there-and-back-again-18610
| Whois | blackhat.com |
309 | https://www.youtube.com/watch?v=Yc1AXkCu2AA
| Whois | youtube.com |
310 | https://www.blackhat.com/asia-20/briefings/schedule/#zombieload-leaking-data-on-intel-cpus-18605
| Whois | blackhat.com |
311 | https://www.youtube.com/watch?v=4CSDzHyx1bA
| Whois | youtube.com |
312 | https://www.blackhat.com/asia-20/briefings/schedule/index.html#page-cache-attacks-microarchitectural-attacks-on-flawless-hardware-18564
| Whois | blackhat.com |
313 | https://www.youtube.com/watch?v=iseCdk9L940
| Whois | youtube.com |
314 | https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/10754.html
| Whois | ccc.de |
315 | https://github.com/IAIK/ZombieLoad
| Whois | github.com |
316 | https://media.ccc.de/v/36c3-10754-zombieload_attack
| Whois | ccc.de |
317 | https://silm-workshop.inria.fr/program/
| Whois | inria.fr |
318 | http://vernam.wpi.edu/upcoming-seminar-michael-schwarz-and-moritz-lipp/
| Whois | wpi.edu |
319 | https://seminar.bundesheer.at/pdfs/ProgKonferenz.pdf
| Whois | bundesheer.at |
320 | https://seminar.bundesheer.at/pdfs/ProgKonferenz.pdf
| Whois | bundesheer.at |
321 | https://www.youtube.com/watch?v=J4XDjspk1Fo
| Whois | youtube.com |
322 | https://www.securityweek.at/industry/program/
| Whois | securityweek.at |
323 | https://www.securityweek.at/school/program/
| Whois | securityweek.at |
324 | https://tube.tugraz.at/paella/ui/browse.html?episode=604c1d74-18bd-4846-9d08-4c8bfb3acea6
| Whois | tugraz.at |
325 | https://acsd2019.ai.wu.ac.at/
| Whois | ac.at |
326 | https://www.ruhrsec.de/2019/index.html#program
| Whois | ruhrsec.de |
327 | https://www.youtube.com/watch?v=t9qOTIFO7Uw
| Whois | youtube.com |
328 | https://pretalx.linuxtage.at/glt19/talk/TRTJ8P/
| Whois | linuxtage.at |
329 | https://www.youtube.com/watch?v=aBso25IDRss
| Whois | youtube.com |
330 | https://www.blackhat.com/asia-19/briefings/schedule/index.html#netspectre-a-truly-remote-spectre-variant-13757
| Whois | blackhat.com |
331 | https://twitter.com/marv0x90/status/1111797421481156611
| Whois | twitter.com |
332 | https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9893.html
| Whois | ccc.de |
333 | https://media.ccc.de/v/35c3-9893-a_christmas_carol_-_the_spectres_of_the_past_present_and_future
| Whois | ccc.de |
334 | https://www.youtube.com/watch?v=_Hn5MpfP54U
| Whois | youtube.com |
335 | https://www.securityweek.at/industry/?page_id=19
| Whois | securityweek.at |
336 | http://gamedevdays.com/schedule/spectre/
| Whois | gamedevdays.com |
337 | https://www.youtube.com/watch?v=taC-CJlsPMk
| Whois | youtube.com |
338 | https://www.blackhat.com/us-18/briefings/schedule/index.html#another-flip-in-therow-10409
| Whois | blackhat.com |
339 | https://www.youtube.com/watch?v=Go0LNNAaFkU
| Whois | youtube.com |
340 | https://www.youtube.com/watch?v=j-39WVXWqqQ
| Whois | youtube.com |
341 | https://www.reuters.com/article/us-cyber-conference-samsung-elec/samsung-galaxy-s7-smartphones-vulnerable-to-hacking-researchers-idUSKBN1KT0NL
| Whois | reuters.com |
342 | https://www.cnbc.com/2018/08/08/reuters-america-update-2-samsung-galaxy-s7-smartphones-vulnerable-to-hacking-researchers.html
| Whois | cnbc.com |
343 | https://www.blackhat.com/us-18/briefings/schedule/index.html#meltdown-basics-details-consequences-10691
| Whois | blackhat.com |
344 | https://www.youtube.com/watch?v=UTSJf05pw-0
| Whois | youtube.com |
345 | http://alumni.tugraz.at/unsere_aktivitaeten/fuer_studierende/foerderpreis/
| Whois | tugraz.at |
346 | https://mdfb.at/event/fehlerfreie-software-und-trotzdem-unsicher-eine-einfuehrung-in-die-mikroarchitekturangriffe-anhand-von-meltdown-spectre-und-rowhammer-dipl-ing-dr-techn-bsc-daniel-gruss/
| Whois | mdfb.at |
347 | https://qct-qualcomm.secure.force.com/QCTConference/GenericSitePage?eventname=2018Security&page=Summit+Schedule
| Whois | force.com |
348 | https://glt18-programm.linuxtage.at/events/330.html
| Whois | linuxtage.at |
349 | https://www.youtube.com/watch?v=P68eKG67uGg
| Whois | youtube.com |
350 | https://www.darkreading.com/vulnerabilities---threats/intel-sgx-can-be-used-to-hide-execute-malware/d/d-id/1331211
| Whois | darkreading.com |
351 | https://www.blackhat.com/asia-18/briefings/schedule/index.html#when-good-turns-evil-using-intel-sgx-to-stealthily-steal-bitcoins-9918
| Whois | blackhat.com |
352 | https://www.youtube.com/watch?v=CfgcuVHpEKY
| Whois | youtube.com |
353 | https://www.youtube.com/watch?v=cVZ2o_Hy_MU
| Whois | youtube.com |
354 | http://www.bluehatil.com/abstracts.html?abs=18#18
| Whois | bluehatil.com |
355 | https://www.youtube.com/watch?v=_4O0zMW-Zu4
| Whois | youtube.com |
356 | https://custom.cvent.com/D86F87A7D0CF4A38AF576A145D9753E5/files/38d4d997dedb42b08c2678faa62c1c9a.pdf
| Whois | cvent.com |
357 | https://breaking-bitcoin.com/
| Whois | breaking-bitcoin.com |
358 | https://www.youtube.com/watch?v=ARZJPVeI1kE
| Whois | youtube.com |
359 | https://www.theregister.co.uk/2017/03/31/researchers_steal_data_from_shared_cache_of_two_cloud_vms/
| Whois | co.uk |
360 | https://www.blackhat.com/asia-17/briefings/schedule/index.html#hello-from-the-other-side-ssh-over-robust-cache-covert-channels-in-the-cloud-5376
| Whois | blackhat.com |
361 | https://github.com/IAIK/CJAG
| Whois | github.com |
362 | https://www.youtube.com/watch?v=6bCdFmehMSY
| Whois | youtube.com |
363 | https://www.youtube.com/watch?v=yPZmiRi_c-o
| Whois | youtube.com |
364 | https://www.theregister.co.uk/2017/03/31/researchers_steal_data_from_shared_cache_of_two_cloud_vms/
| Whois | co.uk |
365 | https://www.blackhat.com/eu-16/briefings.html#drama-how-your-dram-becomes-a-security-problem
| Whois | blackhat.com |
366 | https://github.com/IAIK/drama
| Whois | github.com |
367 | https://www.youtube.com/watch?v=lSU6YzjIIiQ
| Whois | youtube.com |
368 | https://www.blackhat.com/docs/eu-16/materials/eu-16-Schwarz-How-Your-DRAM-Becomes-A-Security-Problem-wp.pdf
| Whois | blackhat.com |
369 | https://www.youtube.com/watch?v=6WFWtHI4l5M
| Whois | youtube.com |
370 | https://www.ip-paris.fr/en/international-winter-school-microarchitectural-security-2022
| Whois | ip-paris.fr |
371 | https://github.com/cispa/micsec-training
| Whois | github.com |
372 | https://esorics2021.athene-center.de/tutorial-07-28.php
| Whois | athene-center.de |
373 | https://github.com/misc0110/esorics_tutorial21
| Whois | github.com |
374 | https://www.youtube.com/watch?v=xteiXOpEjXs
| Whois | youtube.com |
375 | https://www.securityweek.at/school/program/#runtime
| Whois | securityweek.at |
376 | https://www.securityweek.at/school/program/#sidechannel
| Whois | securityweek.at |
377 | https://www.ruhrsec.de/2019/index.html#talks
| Whois | ruhrsec.de |
378 | https://www.securityweek.at/school/program/#t_runtime_lab
| Whois | securityweek.at |
379 | https://springschool.iaik.tugraz.at/program/
| Whois | tugraz.at |
380 | https://research.google/programs-and-events/research-scholar-program/recipients/
| Whois | research.google |
381 | https://twitter.com/CISPA/status/1689709468941172736
| Whois | twitter.com |
382 | https://cs.fs.uni-saarland.de/en/2022/10/27/busy-beaver-award-ss22/
| Whois | uni-saarland.de |
383 | https://cispa.de/en/busy-beaver-award
| Whois | cispa.de |
384 | https://aepicleak.com/
| Whois | aepicleak.com |
385 | https://twitter.com/CsawEurope/status/1459202435851988995
| Whois | twitter.com |
386 | https://saarland-informatics-campus.de/en/piece-of-news/computer-science-students-council-gives-out-busy-beaver-award/
| Whois | saarland-informatics-campus.de |
387 | https://www.saarbruecker-zeitung.de/saarland/hochschule/zwei-cispa-forscher-haben-fuer-ihre-lehre-den-busy-beaver-award-erhalten_aid-57445467
| Whois | saarbruecker-zeitung.de |
388 | https://www.bmbwf.gv.at/Ministerium/Staatspreise-und-Auszeichnungen/Staatspreise.html
| Whois | gv.at |
389 | https://www.ots.at/presseaussendung/OTS_20201210_OTS0163/40-dissertationen-mit-dem-award-of-excellence-gekuert
| Whois | ots.at |
390 | https://www.nsa.gov/News-Features-Stories/Article-View/Article/2426828/winner-of-nsas-8th-annual-best-scientific-cybersecurity-research-paper-competit/
| Whois | nsa.gov |
391 | https://twitter.com/NSACyber/status/1333497331484856320
| Whois | twitter.com |
392 | https://cispa.de/de/news-and-events/news-archive/articles/2020/nsa-award-schwarz
| Whois | cispa.de |
393 | https://www.tugraz.at/studium/lehre-an-der-tu-graz/preis-fuer-exzellente-lehre/
| Whois | tugraz.at |
394 | http://www.eurosys.org/awards/needham-award
| Whois | eurosys.org |
395 | https://twitter.com/EuroSys_conf/status/1255871671736700929
| Whois | twitter.com |
396 | https://cps-vo.org/group/sos/papercompetition
| Whois | cps-vo.org |
397 | https://flyingcircuit.com/
| Whois | flyingcircuit.com |
398 | https://csaw.engineering.nyu.edu/intl-locations/csaw-europe
| Whois | nyu.edu |
399 | https://meltdownattack.com/
| Whois | meltdownattack.com |
400 | https://meltdownattack.com/
| Whois | meltdownattack.com |
401 | http://history.tugraz.at/alumni/auszeichnungen/foerderpreistraeger/
| Whois | tugraz.at |
402 | https://www.youtube.com/watch?v=d_TmocWyEDY
| Whois | youtube.com |
403 | https://kcposch.wordpress.com/2016/12/05/the-magnificent-seven-at-iaik/
| Whois | wordpress.com |
404 | https://www.just.edu.jo/~qmyaseen/ddsw2021/ddsw2021.html
| Whois | edu.jo |
405 | https://signalprocessingsociety.org/publications-resources/ieee-transactions-information-forensics-and-security
| Whois | signalprocessingsociety.org |
406 | http://www.just.edu.jo/~qmyaseen/ddsw2020/ddsw2020.html
| Whois | edu.jo |
407 | https://nvd.nist.gov/vuln/detail/CVE-2024-24510
| Whois | nist.gov |
408 | https://nvd.nist.gov/vuln/detail/CVE-2023-20592
| Whois | nist.gov |
409 | https://nvd.nist.gov/vuln/detail/CVE-2023-20583
| Whois | nist.gov |
410 | https://nvd.nist.gov/vuln/detail/CVE-2022-21233
| Whois | nist.gov |
411 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0925
| Whois | mitre.org |
412 | https://nvd.nist.gov/vuln/detail/CVE-2021-26318
| Whois | nist.gov |
413 | https://nvd.nist.gov/vuln/detail/CVE-2020-8695
| Whois | nist.gov |
414 | https://nvd.nist.gov/vuln/detail/CVE-2020-8694
| Whois | nist.gov |
415 | https://nvd.nist.gov/vuln/detail/CVE-2020-0551
| Whois | nist.gov |
416 | https://nvd.nist.gov/vuln/detail/CVE-2020-0549
| Whois | nist.gov |
417 | https://nvd.nist.gov/vuln/detail/CVE-2019-11135
| Whois | nist.gov |
418 | https://nvd.nist.gov/vuln/detail/CVE-2019-11091
| Whois | nist.gov |
419 | https://nvd.nist.gov/vuln/detail/CVE-2019-5489
| Whois | nist.gov |
420 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130
| Whois | mitre.org |
421 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126
| Whois | mitre.org |
422 | https://nvd.nist.gov/vuln/detail/CVE-2017-5754
| Whois | nist.gov |
423 | https://nvd.nist.gov/vuln/detail/CVE-2017-5753
| Whois | nist.gov |
424 | https://nvd.nist.gov/vuln/detail/CVE-2017-5715
| Whois | nist.gov |
425 | https://github.com/misc0110/clipcount
| Whois | github.com |
426 | https://github.com/misc0110/clipcount
| Whois | github.com |
427 | https://github.com/misc0110/Remote-Presenter
| Whois | github.com |
428 | https://github.com/misc0110/Remote-Presenter
| Whois | github.com |
429 | https://github.com/misc0110/wormhole-context-menu
| Whois | github.com |
430 | https://github.com/misc0110/wormhole-context-menu
| Whois | github.com |
431 | https://github.com/misc0110/easychair-bidding-helper
| Whois | github.com |
432 | https://github.com/misc0110/easychair-bidding-helper
| Whois | github.com |
433 | https://github.com/misc0110/hotcrp-bidding-helper
| Whois | github.com |
434 | https://github.com/misc0110/hotcrp-bidding-helper
| Whois | github.com |
435 | https://github.com/misc0110/paper-linter
| Whois | github.com |
436 | https://github.com/misc0110/paper-linter
| Whois | github.com |
437 | https://github.com/misc0110/r0e
| Whois | github.com |
438 | https://github.com/misc0110/r0e
| Whois | github.com |
439 | https://github.com/misc0110/TravelMap
| Whois | github.com |
440 | https://github.com/misc0110/TravelMap
| Whois | github.com |
441 | https://github.com/misc0110/SSHLock
| Whois | github.com |
442 | https://github.com/misc0110/SSHLock
| Whois | github.com |
443 | https://github.com/misc0110/boot-into
| Whois | github.com |
444 | https://github.com/misc0110/boot-into
| Whois | github.com |
445 | https://github.com/misc0110/BibTool
| Whois | github.com |
446 | https://github.com/misc0110/BibTool
| Whois | github.com |
447 | https://github.com/misc0110/FaultjectionSimulator
| Whois | github.com |
448 | https://github.com/misc0110/FaultjectionSimulator
| Whois | github.com |
449 | https://github.com/misc0110/labrunner
| Whois | github.com |
450 | https://github.com/misc0110/labrunner
| Whois | github.com |
451 | https://github.com/misc0110/pdf-webslides
| Whois | github.com |
452 | https://github.com/misc0110/pdf-webslides
| Whois | github.com |
453 | https://github.com/misc0110/polyglot-jpg-pdf
| Whois | github.com |
454 | https://github.com/misc0110/polyglot-jpg-pdf
| Whois | github.com |
455 | https://transient.fail
| Whois | transient.fail |
456 | https://github.com/IAIK/transientfail
| Whois | github.com |
457 | https://transient.fail
| Whois | transient.fail |
458 | https://github.com/misc0110/livehist
| Whois | github.com |
459 | https://github.com/misc0110/livehist
| Whois | github.com |
460 | https://github.com/misc0110/beamer-preview
| Whois | github.com |
461 | https://github.com/misc0110/beamer-preview
| Whois | github.com |
462 | https://github.com/misc0110/PTEditor
| Whois | github.com |
463 | https://github.com/misc0110/PTEditor
| Whois | github.com |
464 | https://github.com/misc0110/colorful-printf
| Whois | github.com |
465 | https://github.com/misc0110/colorful-printf
| Whois | github.com |
466 | https://github.com/misc0110/asciicast2vector
| Whois | github.com |
467 | https://github.com/misc0110/asciicast2vector
| Whois | github.com |
468 | https://github.com/misc0110/LiveTikZ
| Whois | github.com |
469 | https://github.com/misc0110/LiveTikZ
| Whois | github.com |
470 | https://github.com/misc0110/ProcDetails
| Whois | github.com |
471 | https://github.com/misc0110/ProcDetails
| Whois | github.com |
472 | https://github.com/misc0110/libattopng
| Whois | github.com |
473 | https://github.com/misc0110/libattopng
| Whois | github.com |
474 | https://github.com/misc0110/dash-button
| Whois | github.com |
475 | https://github.com/misc0110/dash-button
| Whois | github.com |
476 | https://github.com/misc0110/faint
| Whois | github.com |
477 | https://github.com/misc0110/faint
| Whois | github.com |
478 | https://github.com/misc0110/configurable-DES
| Whois | github.com |
479 | https://github.com/misc0110/configurable-DES
| Whois | github.com |
480 | https://github.com/misc0110/JBPPDrawfulQuestionEditor
| Whois | github.com |
481 | https://github.com/misc0110/JBPPDrawfulQuestionEditor
| Whois | github.com |
482 | https://github.com/misc0110/UniversalHeaderDecoder
| Whois | github.com |
483 | https://github.com/misc0110/UniversalHeaderDecoder
| Whois | github.com |
484 | https://github.com/misc0110/BF-js
| Whois | github.com |
485 | https://github.com/misc0110/BF-js
| Whois | github.com |
486 | https://www.student.tugraz.at/michael.schwarz/newsreader/
| Whois | tugraz.at |
487 | https://www.student.tugraz.at/michael.schwarz/newsreader/
| Whois | tugraz.at |
488 | https://play.google.com/store/apps/details?id=com.misc.tunewsreader
| Whois | google.com |
489 | https://github.com/misc0110/raspberry-webradio
| Whois | github.com |
490 | http://www.mikrocontroller.net/articles/Raspberry-Webradio
| Whois | mikrocontroller.net |
491 | https://github.com/misc0110/raspberry-webradio
| Whois | github.com |
492 | https://www.student.tugraz.at/michael.schwarz/cexpl/
| Whois | tugraz.at |
493 | https://www.student.tugraz.at/michael.schwarz/cexpl/
| Whois | tugraz.at |
494 | https://play.google.com/store/apps/details?id=com.misc.avrfuse
| Whois | google.com |
495 | https://play.google.com/store/apps/details?id=com.misc.avrfuse
| Whois | google.com |
496 | https://play.google.com/store/apps/details?id=com.team4win.tugroom
| Whois | google.com |
497 | https://github.com/misc0110/tugraz-raumsuche
| Whois | github.com |
498 | https://play.google.com/store/apps/details?id=com.team4win.tugroom
| Whois | google.com |