MISC0110.NET KEYWORD DENSITY CHECKER

Total words: 6672 | 2-word phrases: 1636 | 3-word phrases: 2020 | 4-word phrases: 2176

PAGE INFO

Title Try to keep the title under 60 characters (65 characters)
Michael Schwarz @ CISPA Helmholtz Center for Information Security
Description Try to keep the meta description between 50 - 160 characters (0 characters)
Keywords Meta keywords are not recommended anymore (0 characters)
H1 No H1 tag on the page (0 characters)

ONE WORD PHRASES 840 Words

# Keyword H1 Title Des Volume Position Suggest Frequency Density
1michael809.52%
2schwarz799.40%
3 779.17%
4daniel677.98%
5gruss475.60%
6the445.24%
7usa313.69%
8security303.57%
9attacks273.21%
10media252.98%

TWO WORD PHRASES 1636 Words

# Keyword H1 Title Des Volume Position Suggest Frequency Density
1michael schwarz734.46%
2daniel gruss432.63%
3moritz lipp231.41%
4california usa201.22%
5stefan mangard160.98%
6the register160.98%
7usenix security150.92%
8usa august140.86%
9media the140.86%
10schwarz daniel110.67%
11clémentine maurice100.61%
12lukas gerlach100.61%
13daniel weber90.55%
14martin schwarzl90.55%
15claudio canella90.55%
16andreas kogler80.49%
17gruss michael80.49%
18san francisco80.49%
19francisco california80.49%
20usa may80.49%

THREE WORD PHRASES 2020 Words

# Keyword H1 Title Des Volume Position Suggest Frequency Density
1media the register110.54%
2michael schwarz daniel110.54%
3schwarz daniel gruss90.45%
4california usa may80.40%
5francisco california usa80.40%
6san francisco california80.40%
7gruss michael schwarz80.40%
8usenix security boston70.35%
9sp san francisco70.35%
10massachusetts usa august70.35%
11boston massachusetts usa70.35%
12security boston massachusetts70.35%
13daniel gruss michael70.35%
14diego california usa60.30%
15california usa february60.30%
16schwarz moritz lipp60.30%
17moritz lipp daniel60.30%
18ndss san diego60.30%
19usa august 101260.30%
20michael schwarz moritz60.30%
21san diego california60.30%
22moritz lipp michael50.25%
23august 1012 202250.25%
24the hacker news50.25%
25lipp michael schwarz50.25%
26graz university of40.20%
27california usa august40.20%
28jo van bulck40.20%
29daniel gruss moritz40.20%
30university of technology40.20%

FOUR WORD PHRASES 2176 Words

# Keyword H1 Title Des Volume Position Suggest Frequency Density
1michael schwarz daniel gruss90.41%
2san francisco california usa80.37%
3francisco california usa may80.37%
4boston massachusetts usa august70.32%
5sp san francisco california70.32%
6daniel gruss michael schwarz70.32%
7security boston massachusetts usa70.32%
8usenix security boston massachusetts70.32%
9ndss san diego california60.28%
10san diego california usa60.28%
11diego california usa february60.28%
12michael schwarz moritz lipp60.28%
13usa august 1012 202250.23%
14massachusetts usa august 101250.23%
15moritz lipp michael schwarz50.23%
16moritz lipp daniel gruss40.18%
17graz university of technology40.18%
18the hague the netherlands30.14%
19schwarz samuel weiser daniel30.14%
20michael schwarz samuel weiser30.14%
21netherlands september 2529 202330.14%
22the netherlands september 252930.14%
23hague the netherlands september30.14%
24copenhagen denmark september 263030.14%
25esorics the hague the30.14%
26fabian thomas lukas gerlach30.14%
27lipp michael schwarz daniel30.14%
28denmark september 2630 202230.14%
29clémentine maurice daniel gruss30.14%
30daniel gruss clémentine maurice30.14%
31samuel weiser daniel gruss30.14%
32esorics copenhagen denmark september30.14%
33schwarz moritz lipp daniel30.14%
34ccs london united kingdom30.14%
35daniel gruss moritz lipp30.14%
36thesis graz university of30.14%
37kingdom november 1115 201930.14%
38united kingdom november 111530.14%
39london united kingdom november30.14%
40prescher michael schwarz yuval20.09%

EXTERNAL LINKS

# URL Whois Check
1https://github.com/misc0110 Whoisgithub.com
2https://twitter.com/misc0110 Whoistwitter.com
3https://scholar.google.at/citations?user=2HPadJUAAAAJ&hl=en Whoisgoogle.at
4https://orcid.org/0000-0001-6744-3410 Whoisorcid.org
5https://cispa.saarland Whoiscispa.saarland
6https://roots.ec Whoisroots.ec
7https://github.com/cispa/IRQGuard Whoisgithub.com
8https://www.heise.de/news/CacheWarp-Loch-in-Hardware-Verschluesselung-von-AMD-CPUs-9528270.html Whoisheise.de
9https://www.computerbase.de/2023-11/cachewarp-neue-sicherheitsluecke-mit-heilmittel-in-cpus-von-amd/ Whoiscomputerbase.de
10https://www.bleepingcomputer.com/news/security/new-cachewarp-amd-cpu-attack-lets-hackers-gain-root-in-linux-vms/ Whoisbleepingcomputer.com
11https://thehackernews.com/2023/11/cachewarp-attack-new-vulnerability-in.html Whoisthehackernews.com
12https://www.darkreading.com/vulnerabilities-threats/cachewarp-amd-vm-bug-opens-door-to-privilege-escalation Whoisdarkreading.com
13https://www.securityweek.com/protected-virtual-machines-exposed-to-new-cachewarp-amd-cpu-attack/ Whoissecurityweek.com
14https://bnn.network/tech/cybersecurity/cachewarp-new-threat-to-amds-secure-encrypted-virtualization/ Whoisbnn.network
15https://www.theregister.com/2023/11/14/amd_trusted_execution/ Whoistheregister.com
16https://www.golem.de/news/cachewarp-cpu-schwachstelle-gefaehrdet-amd-basierte-serversysteme-2311-179430.html Whoisgolem.de
17https://www.businesstelegraph.co.uk/cachewarp-attack-new-vulnerability-in-amd-sev-exposes-the-hacker-news/ Whoisco.uk
18https://www.pcgameshardware.de/CPU-CPU-154106/News/Microcode-Updates-von-AMD-gegen-CacheWarp-1433856/ Whoispcgameshardware.de
19https://cybersecuritynews.com/cachewarp-a-new-flaw-in-amds-sev/ Whoiscybersecuritynews.com
20https://hothardware.com/news/amd-epyc-processors-found-vulnerable-to-cachewarp Whoishothardware.com
21https://gigazine.net/news/20231115-amd-vulnerability-sev-es-snp-vm/ Whoisgigazine.net
22http://cachewarpattack.com/ Whoiscachewarpattack.com
23https://github.com/cispa/CacheWarp Whoisgithub.com
24https://github.com/cispa/Switchpoline Whoisgithub.com
25https://github.com/cispa/Microarchitectural-Hash-Function-Recovery Whoisgithub.com
26https://www.youtube.com/watch?v=sHWj44C-ohA Whoisyoutube.com
27https://github.com/cispa/indirect-meltdown Whoisgithub.com
28https://github.com/cispa/regcheck Whoisgithub.com
29https://github.com/scy-phy/FetchBench Whoisgithub.com
30https://www.heise.de/news/Collide-Power-Seitenkanalangriffe-auf-alle-Prozessoren-9231995.html Whoisheise.de
31https://cispa.de/en/collideandpower Whoiscispa.de
32https://nachrichten.idw-online.de/2023/08/01/collide-power-neuer-seitenkanalangriff-betrifft-alle-prozessoren?groupcolor=1 Whoisidw-online.de
33https://www.theregister.com/2023/08/01/collide_power_cpu_attack/ Whoistheregister.com
34https://www.securityweek.com/nearly-all-modern-cpus-leak-data-to-new-collidepower-side-channel-attack/ Whoissecurityweek.com
35https://steiermark.orf.at/stories/3218398/ Whoisorf.at
36https://www.bleepingcomputer.com/news/security/new-collide-pluspower-side-channel-attack-impacts-almost-all-cpus/ Whoisbleepingcomputer.com
37https://www.hackster.io/news/collide-power-can-enhance-any-side-channel-signal-related-to-power-for-easier-exploitation-a7bc5f1f4f92 Whoishackster.io
38https://nakedsecurity.sophos.com/2023/08/03/performance-and-security-clash-yet-again-in-collidepower-attack/ Whoissophos.com
39http://collidepower.com/ Whoiscollidepower.com
40https://github.com/iaik/CollidePower Whoisgithub.com
41https://dramsec.ethz.ch/ Whoisethz.ch
42https://github.com/cispa/hammulator Whoisgithub.com
43https://www.youtube.com/watch?v=yA9-CnwJqMU Whoisyoutube.com
44https://github.com/cispa/Security-RISC Whoisgithub.com
45https://www.youtube.com/watch?v=3-c4C_L2PRQ Whoisyoutube.com
46https://arxiv.org/abs/2111.08404 Whoisarxiv.org
47https://github.com/IAIK/Memory-Compression-Attacks Whoisgithub.com
48https://www.youtube.com/watch?v=fb93jr8wy94 Whoisyoutube.com
49https://streamable.com/qxr9h4 Whoisstreamable.com
50https://twitter.com/wootsecurity/status/1661884143964422145 Whoistwitter.com
51https://github.com/pietroborrello/CustomProcessingUnit Whoisgithub.com
52https://github.com/CISPA/mwait Whoisgithub.com
53https://www.theregister.com/2022/08/09/intel_sunny_cove Whoistheregister.com
54https://arstechnica.com/information-technology/2022/08/architectural-bug-in-some-intel-cpus-is-more-bad-news-for-sgx-users/ Whoisarstechnica.com
55https://www.securityweek.com/aepic-leak-architectural-bug-intel-cpus-exposes-protected-data Whoissecurityweek.com
56https://www.heise.de/meinung/AEPIC-Leak-Die-Komplexitaetsschuldenfalle-7223403.html Whoisheise.de
57https://thehackernews.com/2022/08/pic-and-squip-vulnerabilities-found-in.html Whoisthehackernews.com
58https://securityaffairs.co/wordpress/134478/security/aepic-leak-architecturally-flaw.html Whoissecurityaffairs.co
59https://www.deutschlandfunk.de/wie-die-sicherheitsluecke-aepic-geheimnisse-offenlegt-int-michael-schwarz-dlf-82abaf1d-100.html Whoisdeutschlandfunk.de
60https://aepicleak.com Whoisaepicleak.com
61https://github.com/IAIK/AEPIC Whoisgithub.com
62https://www.usenix.org/system/files/sec22_slides-borrello.pdf Whoisusenix.org
63https://www.youtube.com/watch?v=aiAd969ayQc Whoisyoutube.com
64https://arxiv.org/abs/2207.05676 Whoisarxiv.org
65https://hyperdbg.org/ Whoishyperdbg.org
66https://github.com/HyperDbg/HyperDbg Whoisgithub.com
67https://developers.cloudflare.com/workers/learning/security-model/ Whoiscloudflare.com
68https://blog.cloudflare.com/spectreresearch-with-tu-graz/ Whoiscloudflare.com
69https://www.infoq.com/news/2021/10/dynamic-process-isolation/ Whoisinfoq.com
70https://esorics2022.compute.dtu.dk/program.html Whoisdtu.dk
71https://github.com/CISPA/browser-cpu-fingerprinting Whoisgithub.com
72https://esorics2022.compute.dtu.dk/program.html Whoisdtu.dk
73https://github.com/MIAOUS-group/port-contention-without-smt Whoisgithub.com
74https://github.com/CISPA/BranchDifferent Whoisgithub.com
75https://github.com/IAIK/msrevelio Whoisgithub.com
76https://www.youtube.com/watch?v=xvAASpfadws Whoisyoutube.com
77https://www.usenix.org/conference/usenixsecurity22/presentation/kogler-minefield Whoisusenix.org
78https://github.com/IAIK/minefield Whoisgithub.com
79https://www.usenix.org/system/files/sec22_slides-kogler_minefield.pdf Whoisusenix.org
80https://www.youtube.com/watch?v=5DIO7m3KU8g Whoisyoutube.com
81https://therecord.media/academics-find-meltdown-like-attacks-on-amd-cpus-previously-thought-to-be-unaffected/ Whoistherecord.media
82https://www.phoronix.com/scan.php?page=article&item=if-amd-kpti&num=1 Whoisphoronix.com
83https://www.securityweek.com/researchers-disclose-new-side-channel-attacks-affecting-all-amd-cpus Whoissecurityweek.com
84https://securityaffairs.co/wordpress/123401/hacking/side-channel-attack-amd-cpus.html Whoissecurityaffairs.co
85https://cyberintelmag.com/attacks-data-breaches/researchers-have-discovered-new-side-channel-attacks-that-affect-all-amd-cpus/ Whoiscyberintelmag.com
86https://www.aroged.com/2021/10/18/new-vulnerability-to-meltdown-attacks-found-in-amd-processors-developers-will-not-fix-it/ Whoisaroged.com
87https://gadgettendency.com/experts-presented-two-meltdown-like-attacks-on-amd-cpus-at-once/ Whoisgadgettendency.com
88https://www.usenix.org/conference/usenixsecurity22/presentation/lipp Whoisusenix.org
89https://github.com/amdprefetch/amd-prefetch-attacks Whoisgithub.com
90https://www.youtube.com/watch?v=bTV-9-B26_w Whoisyoutube.com
91https://www.usenix.org/conference/usenixsecurity22/presentation/giner Whoisusenix.org
92https://github.com/lvi-nullify/LVI-NULLify Whoisgithub.com
93https://www.usenix.org/system/files/sec22_slides-giner.pdf Whoisusenix.org
94https://www.youtube.com/watch?v=wwPrVRyAcag Whoisyoutube.com
95https://www.usenix.org/conference/usenixsecurity22/presentation/easdon Whoisusenix.org
96https://github.com/libtea/frameworks Whoisgithub.com
97https://www.usenix.org/system/files/sec22_slides-easdon.pdf Whoisusenix.org
98https://www.youtube.com/watch?v=s5zG6fcglgc Whoisyoutube.com
99https://arxiv.org/abs/2012.02554 Whoisarxiv.org
100https://github.com/chestnut-sandbox/Chestnut Whoisgithub.com
101https://www.usenix.org/conference/usenixsecurity21/presentation/weber Whoisusenix.org
102https://github.com/cispa/osiris Whoisgithub.com
103https://www.usenix.org/system/files/sec21_slides_weber.pdf Whoisusenix.org
104https://www.usenix.org/conference/usenixsecurity21/presentation/weber Whoisusenix.org
105https://www.theregister.com/2020/11/10/intel_sgx_side_channel/ Whoistheregister.com
106https://www.computerweekly.com/news/252491855/Intel-and-AMD-processors-affected-by-another-side-channel-exploit Whoiscomputerweekly.com
107https://arstechnica.com/information-technology/2020/11/intel-sgx-defeated-yet-again-this-time-thanks-to-on-chip-power-meter/ Whoisarstechnica.com
108https://www.zdnet.com/article/new-platypus-attack-can-steal-data-from-intel-cpus/ Whoiszdnet.com
109https://cispa.de/en/news-and-events/news-archive/articles/2020/platypus Whoiscispa.de
110https://platypusattack.com/ Whoisplatypusattack.com
111https://www.youtube.com/watch?v=LXaroV2crWw Whoisyoutube.com
112https://www.youtube.com/watch?v=ygWEK1JvL_s Whoisyoutube.com
113https://arxiv.org/abs/2008.02307 Whoisarxiv.org
114https://www.theregister.com/2020/08/07/foreshadow_strikes_back_boffins_find/ Whoistheregister.com
115https://www.phoronix.com/scan.php?page=news_item&px=Reviving-Foreshadow-Bad Whoisphoronix.com
116https://thehackernews.com/2020/08/foreshadow-processor-vulnerability.html Whoisthehackernews.com
117https://youtube.com/watch?v=YEurJoKAZYM Whoisyoutube.com
118https://youtube.com/watch?v=iLDf8iL3CkQ Whoisyoutube.com
119https://ieeexplore.ieee.org/document/9107096 Whoisieee.org
120https://github.com/IAIK/Donky Whoisgithub.com
121https://www.usenix.org/system/files/sec20_slides_schrammel.pdf Whoisusenix.org
122https://www.usenix.org/conference/usenixsecurity20/presentation/schrammel Whoisusenix.org
123https://www.tomshardware.com/news/new-amd-side-channel-attacks-discovered-impacts-zen-architecture Whoistomshardware.com
124https://www.zdnet.com/article/amd-processors-from-2011-to-2019-vulnerable-to-two-new-attacks/ Whoiszdnet.com
125https://www.engadget.com/2020/03/08/amd-cpu-take-a-way-data-leak-security-flaw/ Whoisengadget.com
126https://www.techradar.com/news/amd-processors-going-back-to-2011-suffer-from-worrying-security-holes Whoistechradar.com
127https://www.techspot.com/news/84309-amd-cpus-vulnerable-severe-new-side-channel-attack.html Whoistechspot.com
128https://github.com/IAIK/FLARE Whoisgithub.com
129https://arxiv.org/abs/1805.04956 Whoisarxiv.org
130https://thehackernews.com/2018/05/remoterowhammer-attack.html Whoisthehackernews.com
131https://www.theregister.co.uk/2018/05/17/nethammer_second_remoterowhammer_exploit/ Whoisco.uk
132https://www.heise.de/security/meldung/Nethammer-Throwhammer-Rowhammer-uebers-Netzwerk-4052066.html Whoisheise.de
133https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi-medusa Whoisusenix.org
134https://github.com/vernamlab/medusa Whoisgithub.com
135https://www.usenix.org/system/files/sec20_slides_moghimi-medusa.pdf Whoisusenix.org
136https://www.usenix.org/conference/usenixsecurity20/presentation/moghimi-medusa Whoisusenix.org
137https://spectreattack.com Whoisspectreattack.com
138https://cacm.acm.org/magazines/2020/7/245682-spectre-attacks/fulltext Whoisacm.org
139https://en.wikipedia.org/wiki/Spectre_(security_vulnerability) Whoiswikipedia.org
140https://meltdownattack.com Whoismeltdownattack.com
141https://cacm.acm.org/magazines/2020/6/245161-meltdown/fulltext Whoisacm.org
142https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability) Whoiswikipedia.org
143https://github.com/IAIK/meltdown Whoisgithub.com
144https://www.theregister.co.uk/2020/03/10/lvi_intel_cpu_attack/ Whoisco.uk
145https://www.tomshardware.com/uk/news/load-value-injection-vulnerability-found-in-intel-chips Whoistomshardware.com
146https://www.zdnet.com/article/intel-cpus-vulnerable-to-new-lvi-attacks/ Whoiszdnet.com
147https://www.heise.de/security/meldung/Weitere-CPU-Sicherheitsluecke-Load-Value-Injection-LVI-4680250.html Whoisheise.de
148https://www.securityweek.com/load-value-injection-intel-cpus-vulnerablereverse-meltdown-attack Whoissecurityweek.com
149https://lviattack.eu/ Whoislviattack.eu
150https://en.wikipedia.org/wiki/Load_value_injection Whoiswikipedia.org
151https://github.com/jovanbulck/sgx-step/tree/master/app/lvi Whoisgithub.com
152https://www.youtube.com/watch?v=99kVz-YGi6Y Whoisyoutube.com
153https://www.youtube.com/watch?v=goy8XRXFlh4 Whoisyoutube.com
154https://www.youtube.com/watch?v=NCVHSlmLgO8 Whoisyoutube.com
155https://arxiv.org/abs/1905.09100 Whoisarxiv.org
156https://www.ndss-symposium.org/ndss-paper/context-a-generic-approach-for-mitigating-spectre/ Whoisndss-symposium.org
157https://github.com/IAIK/contextlight Whoisgithub.com
158https://www.youtube.com/watch?v=lVeK1C_AHhc Whoisyoutube.com
159https://arxiv.org/abs/1702.08719 Whoisarxiv.org
160https://www.theregister.co.uk/2017/03/07/eggheads_slip_a_note_under_intels_door_sgx_can_leak_crypto_keys/ Whoisco.uk
161https://www.schneier.com/blog/archives/2017/03/using_intels_sg.html Whoisschneier.com
162http://www.securitynewspaper.com/2017/03/13/super-malware-steals-encryption-keys-intel-sgx-enclaves/ Whoissecuritynewspaper.com
163https://securityintelligence.com/news/sgx-malware-extracts-rsa-key-in-five-minutes/ Whoissecurityintelligence.com
164http://www.digitaltrends.com/computing/researchers-intel-sgx-vulnerabilities/ Whoisdigitaltrends.com
165https://www.bleepingcomputer.com/news/hardware/-super-malware-steals-encryption-keys-from-intel-sgx-enclaves/ Whoisbleepingcomputer.com
166http://www.securityweek.com/researchers-use-intel-sgx-conceal-malware-extract-private-keys Whoissecurityweek.com
167https://doi.org/10.1186/s42400-019-0042-y Whoisdoi.org
168https://en.wikipedia.org/wiki/Software_Guard_Extensions#Prime+Probe_attack Whoiswikipedia.org
169https://arxiv.org/abs//1905.05726 Whoisarxiv.org
170https://www.bbc.com/news/technology-48278400 Whoisbbc.com
171https://www.theverge.com/2019/5/14/18623708/zombieload-attack-intel-processors-speculative-execution Whoistheverge.com
172http://fortune.com/2019/05/15/zombieload-flaw-lets-hackers-crack-almost-every-intel-chip-back-to-2011-why-is-it-being-downplayed/ Whoisfortune.com
173https://www.zdnet.com/article/intel-cpus-impacted-by-new-zombieload-side-channel-attack/ Whoiszdnet.com
174https://www.heise.de/newsticker/meldung/Neue-Sicherheitsluecken-in-Intel-Prozessoren-ZombieLoad-4421217.html Whoisheise.de
175https://zombieloadattack.com Whoiszombieloadattack.com
176https://zombieloadattack.com Whoiszombieloadattack.com
177https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling Whoiswikipedia.org
178https://github.com/IAIK/ZombieLoad Whoisgithub.com
179https://www.youtube.com/watch?v=wQvgyChrk_g Whoisyoutube.com
180https://arxiv.org/abs/1905.12701 Whoisarxiv.org
181https://www.trendmicro.com/vinfo/nz/security/news/vulnerabilities-and-exploits/side-channel-attacks-ridl-fallout-and-zombieload-affects-millions-of-vulnerable-intel-processors Whoistrendmicro.com
182https://www.bleepingcomputer.com/news/security/new-ridl-and-fallout-attacks-impact-all-modern-intel-cpus/ Whoisbleepingcomputer.com
183https://www.wired.com/story/intel-mds-attack-speculative-execution-buffer/ Whoiswired.com
184https://mdsattacks.com Whoismdsattacks.com
185https://mdsattacks.com Whoismdsattacks.com
186https://en.wikipedia.org/wiki/Microarchitectural_Data_Sampling Whoiswikipedia.org
187https://arxiv.org/abs/1807.10535 Whoisarxiv.org
188https://www.theregister.co.uk/2018/07/26/netspectre_network_leak/ Whoisco.uk
189https://gbhackers.com/netspectre/ Whoisgbhackers.com
190https://www.securityweek.com/remote-spectre-attack-allows-data-theft-over-network Whoissecurityweek.com
191https://www.heise.de/security/meldung/NetSpectre-liest-RAM-via-Netzwerk-aus-4121831.html Whoisheise.de
192https://www.bleepingcomputer.com/news/security/new-netspectre-attack-can-steal-cpu-secrets-via-network-connections/ Whoisbleepingcomputer.com
193https://www.darkreading.com/attacks-breaches/new-spectre-variant-hits-the-network/d/d-id/1332431 Whoisdarkreading.com
194https://esorics2019.uni.lu/sessions/side-channels/ Whoisuni.lu
195https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)#History Whoiswikipedia.org
196https://www.raid-2019.org/accepted.html Whoisraid-2019.org
197https://arxiv.org/abs//1905.05725 Whoisarxiv.org
198https://www.theregister.co.uk/2019/05/14/intel_sidechannel_vulnerability/ Whoisco.uk
199https://arstechnica.com/gadgets/2019/05/new-speculative-execution-bug-leaks-data-from-intel-chips-internal-buffers/ Whoisarstechnica.com
200https://www.tugraz.at/en/tu-graz/services/news-stories/tu-graz-news/singleview/article/nach-meltdown-und-spectre-tu-graz-forscher-entdecken-neue-sicherheitsluecken0/ Whoistugraz.at
201https://cpu.fail Whoiscpu.fail
202https://arxiv.org/abs/1811.05441 Whoisarxiv.org
203https://www.theinquirer.net/inquirer/news/3066468/seven-more-spectre-and-meltdown-attacks-have-been-discovered-sigh Whoistheinquirer.net
204https://thehackernews.com/2018/11/meltdown-spectre-vulnerabilities.html Whoisthehackernews.com
205https://www.securitynow.com/author.asp?section_id=649&doc_id=747624 Whoissecuritynow.com
206https://www.zdnet.com/articleresearchers-discover-seven-new-meltdown-and-spectre-attacks/ Whoiszdnet.com
207https://www.heise.de/newsticker/meldung/Prozessor-Sicherheit-Sieben-neue-Varianten-von-Spectre-Luecken-4220854.html Whoisheise.de
208http://transient.fail/ Whoistransient.fail
209https://www.usenix.org/conference/usenixsecurity19/presentation/canella Whoisusenix.org
210https://github.com/IAIK/transientfail Whoisgithub.com
211https://www.usenix.org/sites/default/files/conference/protected-files/sec19_slides_canella.pdf Whoisusenix.org
212https://www.youtube.com/watch?v=ibqC4nbs23Y Whoisyoutube.com
213https://www.usenix.org/conference/usenixsecurity19/presentation/werner Whoisusenix.org
214https://www.usenix.org/sites/default/files/conference/protected-files/sec19_slides_werner.pdf Whoisusenix.org
215https://www.youtube.com/watch?v=cbOqDKdCwvY Whoisyoutube.com
216https://arxiv.org/abs/1901.01161 Whoisarxiv.org
217https://www.darkreading.com/vulnerabilities-and-threats/new-software-side-channel-attack-raises-risk-for-captured-crypto/d/d-id/1333635 Whoisdarkreading.com
218https://www.securityweek.com/new-side-channel-attack-targets-os-page-cache Whoissecurityweek.com
219https://www.bleepingcomputer.com/news/security/new-side-channel-attack-steals-data-from-windows-linux-page-cache/ Whoisbleepingcomputer.com
220https://www.theregister.co.uk/2019/01/05/boffins_beat_page_cache/ Whoisco.uk
221https://www.scmagazine.com/home/security-news/researchers-discover-hardware-agnostic-side-channel-attack-that-exploits-os-page-cache/ Whoisscmagazine.com
222https://www.securitynow.com/author.asp?section_id=649&doc_id=748678 Whoissecuritynow.com
223https://en.wikipedia.org/wiki/Page_cache#Side-channel_attacks Whoiswikipedia.org
224https://arxiv.org/abs/1902.03256 Whoisarxiv.org
225https://www.theregister.co.uk/2019/02/12/intel_sgx_hacked/ Whoisco.uk
226https://www.zdnet.com/articleresearchers-hide-malware-in-intel-sgx-enclaves/ Whoiszdnet.com
227https://www.trendmicro.com/vinfo/se/security/news/virtualization-and-cloud/proof-of-concept-shows-how-malware-can-hide-from-av-solutions-via-intel-s-sgx-enclaves Whoistrendmicro.com
228https://thehackernews.com/2019/02/intel-sgx-malware-hacking.html Whoisthehackernews.com
229https://www.techradar.com/news/researchers-exploit-intel-sgx-to-hide-malware Whoistechradar.com
230https://arstechnica.com/gadgets/2019/02/researchers-use-intel-sgx-to-put-malware-beyond-thereach-of-antivirus-software/ Whoisarstechnica.com
231https://www.dimva2019.org/program/ Whoisdimva2019.org
232https://github.com/IAIK/sgxrop Whoisgithub.com
233https://arxiv.org/abs/1801.01203 Whoisarxiv.org
234https://spectreattack.com/ Whoisspectreattack.com
235https://en.wikipedia.org/wiki/Spectre_(security_vulnerability) Whoiswikipedia.org
236http://www.ieee-security.org/TC/SP2019/SP19-Slides-pdfs/Paul_Kocher_01_-_Spectre_Attacks-IEEE-SecurityPrivacy_v05.pdf Whoisieee-security.org
237https://www.youtube.com/watch?v=zOvBHxMjNls Whoisyoutube.com
238https://www.theregister.co.uk/2019/06/11/javascript_fingerprinting/ Whoisco.uk
239https://www.zdnet.com/article/javascript-template-attacks-expose-new-browser-fingerprinting-vectors/ Whoiszdnet.com
240https://ethhack.com/2019/06/javascript-template-attacks-expose-new-browser-fingerprinting-vectors/ Whoisethhack.com
241https://portswigger.net/daily-swig/tell-tale-fingerprint-leak-in-browser-privacy-tools-exposed Whoisportswigger.net
242https://www.ndss-symposium.org/ndss-paper/javascript-template-attacks-automatically-inferring-host-information-for-targeted-exploits/ Whoisndss-symposium.org
243https://github.com/IAIK/jstemplate Whoisgithub.com
244https://www.youtube.com/watch?v=14VdTShqqa8 Whoisyoutube.com
245https://arxiv.org/abs/1801.01207 Whoisarxiv.org
246https://meltdownattack.com/ Whoismeltdownattack.com
247https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability) Whoiswikipedia.org
248https://github.com/IAIK/meltdown Whoisgithub.com
249https://www.youtube.com/watch?v=WgAshgc9u6c Whoisyoutube.com
250https://arxiv.org/pdf/1711.01254 Whoisarxiv.org
251https://github.com/IAIK/libdropit Whoisgithub.com
252https://www.bleepingcomputer.com/news/security/new-rowhammer-attack-bypasses-previously-proposed-countermeasures/ Whoisbleepingcomputer.com
253https://www.securitynow.com/author.asp?section_id=649&doc_id=737170 Whoissecuritynow.com
254https://www.tugraz.at/en/tu-graz/services/news-stories/planet-research/singleview/article/wenn-rowhammer-nur-noch-einmal-klopft/ Whoistugraz.at
255https://www.theregister.co.uk/2017/10/05/rohwammer_defences_defeated_by_opcode_flipping/ Whoisco.uk
256https://github.com/IAIK/flipfloyd Whoisgithub.com
257https://www.youtube.com/watch?v=_JPhsqJzV5I Whoisyoutube.com
258https://www.bleepingcomputer.com/news/security/chrome-extension-protects-against-javascript-based-cpu-side-channel-attacks/ Whoisbleepingcomputer.com
259https://www.techgig.com/tech-news/how-to-protect-javascript-based-cpu-side-channel-attacks-on-chrome-166633 Whoistechgig.com
260https://medium.com/@dieswaytoofast/defending-against-javascript-sidechannels-94df5b9e1e90 Whoismedium.com
261https://github.com/IAIK/ChromeZero Whoisgithub.com
262https://www.youtube.com/watch?v=6SqIFs0_uBU Whoisyoutube.com
263https://github.com/IAIK/keydrown Whoisgithub.com
264https://www.youtube.com/watch?v=limElEZNdS8 Whoisyoutube.com
265https://github.com/interruptjs/interruptjs Whoisgithub.com
266https://en.wikipedia.org/wiki/Kernel_page-table_isolation Whoiswikipedia.org
267https://github.com/IAIK/KAISER Whoisgithub.com
268https://arxiv.org/pdf/1702.08719 Whoisarxiv.org
269https://www.theregister.co.uk/2017/03/07/eggheads_slip_a_note_under_intels_door_sgx_can_leak_crypto_keys/ Whoisco.uk
270https://www.schneier.com/blog/archives/2017/03/using_intels_sg.html Whoisschneier.com
271http://www.securitynewspaper.com/2017/03/13/super-malware-steals-encryption-keys-intel-sgx-enclaves/ Whoissecuritynewspaper.com
272https://securityintelligence.com/news/sgx-malware-extracts-rsa-key-in-five-minutes/ Whoissecurityintelligence.com
273http://www.digitaltrends.com/computing/researchers-intel-sgx-vulnerabilities/ Whoisdigitaltrends.com
274https://www.bleepingcomputer.com/news/hardware/-super-malware-steals-encryption-keys-from-intel-sgx-enclaves/ Whoisbleepingcomputer.com
275http://www.securityweek.com/researchers-use-intel-sgx-conceal-malware-extract-private-keys Whoissecurityweek.com
276https://en.wikipedia.org/wiki/Software_Guard_Extensions#Prime+Probe_attack Whoiswikipedia.org
277https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ Whoismozilla.org
278https://www.theregister.co.uk/2017/03/31/researchers_steal_data_from_shared_cache_of_two_cloud_vms/ Whoisco.uk
279https://www.internetsociety.org/doc/hello-other-side-ssh-over-robust-cache-covert-channels-cloud Whoisinternetsociety.org
280https://www.youtube.com/watch?v=E91qcwDPk8U Whoisyoutube.com
281https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/pessl Whoisusenix.org
282https://github.com/IAIK/drama Whoisgithub.com
283https://www.usenix.org/sites/default/files/conference/protected-files/security16_slides_pessl.pdf Whoisusenix.org
284https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/pessl Whoisusenix.org
285https://www.asianhost.org/2023/program.htm Whoisasianhost.org
286https://cispa.de/summer-school Whoiscispa.de
287https://www.ruhrsec.de/2023/ Whoisruhrsec.de
288https://www.instagram.com/p/CpQED4FIY-i/ Whoisinstagram.com
289https://www.unserding.de/unserding/news/die-infos/cyberunterricht_otto_hahn_gymnasium_100.html Whoisunserding.de
290https://www.forschung-it-sicherheit-kommunikationssysteme.de/service/aktuelles/informationstour-it-sicherheitsforschung Whoisforschung-it-sicherheit-kommunikationssysteme.de
291https://www.it-defense.de/it-defense-2023/programm/vortraege#c1764 Whoisit-defense.de
292https://www.ip-paris.fr/en/international-winter-school-microarchitectural-security-2022 Whoisip-paris.fr
293https://cispa.de/en/airbus-cispa-day Whoiscispa.de
294https://www.explore-science.info/mannheim/buehne/695-vortrag-freitag Whoisexplore-science.info
295https://uni-saarland.lineupr.com/infotag2022/item/143 Whoislineupr.com
296https://hardwear.io/webinar/CPU-fuzzing.php Whoishardwear.io
297https://www.youtube.com/watch?v=dctyq0npB5s Whoisyoutube.com
298https://roadshow.cybersicherheit.saarland/ Whoiscybersicherheit.saarland
299https://www.youtube.com/watch?v=8_pXAOzLta4&t=17919s Whoisyoutube.com
300https://roadshow.cybersicherheit.saarland/ Whoiscybersicherheit.saarland
301https://digitaltag.eu/pubquiz-rund-um-informatik-und-cybersicherheit Whoisdigitaltag.eu
302https://www.darkreading.com/theedge/black-hat-asia-speakers-share-secrets-about-sandboxes-smart-doors-and-security/b/d-id/1340867 Whoisdarkreading.com
303https://blackhat.com/asia-21/briefings/schedule/#enter-sandbox-21792 Whoisblackhat.com
304https://fahrplan.events.ccc.derc3/2020/Fahrplan/events/11365.html Whoisccc.derc3
305https://media.ccc.de/v/rc3-11365-lvi_hijacking_transient_execution_through_microarchitectural_load_value_injection Whoisccc.de
306https://fahrplan.events.ccc.derc3/2020/Fahrplan/events/11404.html Whoisccc.derc3
307https://www.youtube.com/watch?v=scP-D-Idlc8 Whoisyoutube.com
308https://www.blackhat.com/asia-20/briefings/schedule/#store-to-leak-forwarding-there-and-back-again-18610 Whoisblackhat.com
309https://www.youtube.com/watch?v=Yc1AXkCu2AA Whoisyoutube.com
310https://www.blackhat.com/asia-20/briefings/schedule/#zombieload-leaking-data-on-intel-cpus-18605 Whoisblackhat.com
311https://www.youtube.com/watch?v=4CSDzHyx1bA Whoisyoutube.com
312https://www.blackhat.com/asia-20/briefings/schedule/index.html#page-cache-attacks-microarchitectural-attacks-on-flawless-hardware-18564 Whoisblackhat.com
313https://www.youtube.com/watch?v=iseCdk9L940 Whoisyoutube.com
314https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/10754.html Whoisccc.de
315https://github.com/IAIK/ZombieLoad Whoisgithub.com
316https://media.ccc.de/v/36c3-10754-zombieload_attack Whoisccc.de
317https://silm-workshop.inria.fr/program/ Whoisinria.fr
318http://vernam.wpi.edu/upcoming-seminar-michael-schwarz-and-moritz-lipp/ Whoiswpi.edu
319https://seminar.bundesheer.at/pdfs/ProgKonferenz.pdf Whoisbundesheer.at
320https://seminar.bundesheer.at/pdfs/ProgKonferenz.pdf Whoisbundesheer.at
321https://www.youtube.com/watch?v=J4XDjspk1Fo Whoisyoutube.com
322https://www.securityweek.at/industry/program/ Whoissecurityweek.at
323https://www.securityweek.at/school/program/ Whoissecurityweek.at
324https://tube.tugraz.at/paella/ui/browse.html?episode=604c1d74-18bd-4846-9d08-4c8bfb3acea6 Whoistugraz.at
325https://acsd2019.ai.wu.ac.at/ Whoisac.at
326https://www.ruhrsec.de/2019/index.html#program Whoisruhrsec.de
327https://www.youtube.com/watch?v=t9qOTIFO7Uw Whoisyoutube.com
328https://pretalx.linuxtage.at/glt19/talk/TRTJ8P/ Whoislinuxtage.at
329https://www.youtube.com/watch?v=aBso25IDRss Whoisyoutube.com
330https://www.blackhat.com/asia-19/briefings/schedule/index.html#netspectre-a-truly-remote-spectre-variant-13757 Whoisblackhat.com
331https://twitter.com/marv0x90/status/1111797421481156611 Whoistwitter.com
332https://fahrplan.events.ccc.de/congress/2018/Fahrplan/events/9893.html Whoisccc.de
333https://media.ccc.de/v/35c3-9893-a_christmas_carol_-_the_spectres_of_the_past_present_and_future Whoisccc.de
334https://www.youtube.com/watch?v=_Hn5MpfP54U Whoisyoutube.com
335https://www.securityweek.at/industry/?page_id=19 Whoissecurityweek.at
336http://gamedevdays.com/schedule/spectre/ Whoisgamedevdays.com
337https://www.youtube.com/watch?v=taC-CJlsPMk Whoisyoutube.com
338https://www.blackhat.com/us-18/briefings/schedule/index.html#another-flip-in-therow-10409 Whoisblackhat.com
339https://www.youtube.com/watch?v=Go0LNNAaFkU Whoisyoutube.com
340https://www.youtube.com/watch?v=j-39WVXWqqQ Whoisyoutube.com
341https://www.reuters.com/article/us-cyber-conference-samsung-elec/samsung-galaxy-s7-smartphones-vulnerable-to-hacking-researchers-idUSKBN1KT0NL Whoisreuters.com
342https://www.cnbc.com/2018/08/08/reuters-america-update-2-samsung-galaxy-s7-smartphones-vulnerable-to-hacking-researchers.html Whoiscnbc.com
343https://www.blackhat.com/us-18/briefings/schedule/index.html#meltdown-basics-details-consequences-10691 Whoisblackhat.com
344https://www.youtube.com/watch?v=UTSJf05pw-0 Whoisyoutube.com
345http://alumni.tugraz.at/unsere_aktivitaeten/fuer_studierende/foerderpreis/ Whoistugraz.at
346https://mdfb.at/event/fehlerfreie-software-und-trotzdem-unsicher-eine-einfuehrung-in-die-mikroarchitekturangriffe-anhand-von-meltdown-spectre-und-rowhammer-dipl-ing-dr-techn-bsc-daniel-gruss/ Whoismdfb.at
347https://qct-qualcomm.secure.force.com/QCTConference/GenericSitePage?eventname=2018Security&page=Summit+Schedule Whoisforce.com
348https://glt18-programm.linuxtage.at/events/330.html Whoislinuxtage.at
349https://www.youtube.com/watch?v=P68eKG67uGg Whoisyoutube.com
350https://www.darkreading.com/vulnerabilities---threats/intel-sgx-can-be-used-to-hide-execute-malware/d/d-id/1331211 Whoisdarkreading.com
351https://www.blackhat.com/asia-18/briefings/schedule/index.html#when-good-turns-evil-using-intel-sgx-to-stealthily-steal-bitcoins-9918 Whoisblackhat.com
352https://www.youtube.com/watch?v=CfgcuVHpEKY Whoisyoutube.com
353https://www.youtube.com/watch?v=cVZ2o_Hy_MU Whoisyoutube.com
354http://www.bluehatil.com/abstracts.html?abs=18#18 Whoisbluehatil.com
355https://www.youtube.com/watch?v=_4O0zMW-Zu4 Whoisyoutube.com
356https://custom.cvent.com/D86F87A7D0CF4A38AF576A145D9753E5/files/38d4d997dedb42b08c2678faa62c1c9a.pdf Whoiscvent.com
357https://breaking-bitcoin.com/ Whoisbreaking-bitcoin.com
358https://www.youtube.com/watch?v=ARZJPVeI1kE Whoisyoutube.com
359https://www.theregister.co.uk/2017/03/31/researchers_steal_data_from_shared_cache_of_two_cloud_vms/ Whoisco.uk
360https://www.blackhat.com/asia-17/briefings/schedule/index.html#hello-from-the-other-side-ssh-over-robust-cache-covert-channels-in-the-cloud-5376 Whoisblackhat.com
361https://github.com/IAIK/CJAG Whoisgithub.com
362https://www.youtube.com/watch?v=6bCdFmehMSY Whoisyoutube.com
363https://www.youtube.com/watch?v=yPZmiRi_c-o Whoisyoutube.com
364https://www.theregister.co.uk/2017/03/31/researchers_steal_data_from_shared_cache_of_two_cloud_vms/ Whoisco.uk
365https://www.blackhat.com/eu-16/briefings.html#drama-how-your-dram-becomes-a-security-problem Whoisblackhat.com
366https://github.com/IAIK/drama Whoisgithub.com
367https://www.youtube.com/watch?v=lSU6YzjIIiQ Whoisyoutube.com
368https://www.blackhat.com/docs/eu-16/materials/eu-16-Schwarz-How-Your-DRAM-Becomes-A-Security-Problem-wp.pdf Whoisblackhat.com
369https://www.youtube.com/watch?v=6WFWtHI4l5M Whoisyoutube.com
370https://www.ip-paris.fr/en/international-winter-school-microarchitectural-security-2022 Whoisip-paris.fr
371https://github.com/cispa/micsec-training Whoisgithub.com
372https://esorics2021.athene-center.de/tutorial-07-28.php Whoisathene-center.de
373https://github.com/misc0110/esorics_tutorial21 Whoisgithub.com
374https://www.youtube.com/watch?v=xteiXOpEjXs Whoisyoutube.com
375https://www.securityweek.at/school/program/#runtime Whoissecurityweek.at
376https://www.securityweek.at/school/program/#sidechannel Whoissecurityweek.at
377https://www.ruhrsec.de/2019/index.html#talks Whoisruhrsec.de
378https://www.securityweek.at/school/program/#t_runtime_lab Whoissecurityweek.at
379https://springschool.iaik.tugraz.at/program/ Whoistugraz.at
380https://research.google/programs-and-events/research-scholar-program/recipients/ Whoisresearch.google
381https://twitter.com/CISPA/status/1689709468941172736 Whoistwitter.com
382https://cs.fs.uni-saarland.de/en/2022/10/27/busy-beaver-award-ss22/ Whoisuni-saarland.de
383https://cispa.de/en/busy-beaver-award Whoiscispa.de
384https://aepicleak.com/ Whoisaepicleak.com
385https://twitter.com/CsawEurope/status/1459202435851988995 Whoistwitter.com
386https://saarland-informatics-campus.de/en/piece-of-news/computer-science-students-council-gives-out-busy-beaver-award/ Whoissaarland-informatics-campus.de
387https://www.saarbruecker-zeitung.de/saarland/hochschule/zwei-cispa-forscher-haben-fuer-ihre-lehre-den-busy-beaver-award-erhalten_aid-57445467 Whoissaarbruecker-zeitung.de
388https://www.bmbwf.gv.at/Ministerium/Staatspreise-und-Auszeichnungen/Staatspreise.html Whoisgv.at
389https://www.ots.at/presseaussendung/OTS_20201210_OTS0163/40-dissertationen-mit-dem-award-of-excellence-gekuert Whoisots.at
390https://www.nsa.gov/News-Features-Stories/Article-View/Article/2426828/winner-of-nsas-8th-annual-best-scientific-cybersecurity-research-paper-competit/ Whoisnsa.gov
391https://twitter.com/NSACyber/status/1333497331484856320 Whoistwitter.com
392https://cispa.de/de/news-and-events/news-archive/articles/2020/nsa-award-schwarz Whoiscispa.de
393https://www.tugraz.at/studium/lehre-an-der-tu-graz/preis-fuer-exzellente-lehre/ Whoistugraz.at
394http://www.eurosys.org/awards/needham-award Whoiseurosys.org
395https://twitter.com/EuroSys_conf/status/1255871671736700929 Whoistwitter.com
396https://cps-vo.org/group/sos/papercompetition Whoiscps-vo.org
397https://flyingcircuit.com/ Whoisflyingcircuit.com
398https://csaw.engineering.nyu.edu/intl-locations/csaw-europe Whoisnyu.edu
399https://meltdownattack.com/ Whoismeltdownattack.com
400https://meltdownattack.com/ Whoismeltdownattack.com
401http://history.tugraz.at/alumni/auszeichnungen/foerderpreistraeger/ Whoistugraz.at
402https://www.youtube.com/watch?v=d_TmocWyEDY Whoisyoutube.com
403https://kcposch.wordpress.com/2016/12/05/the-magnificent-seven-at-iaik/ Whoiswordpress.com
404https://www.just.edu.jo/~qmyaseen/ddsw2021/ddsw2021.html Whoisedu.jo
405https://signalprocessingsociety.org/publications-resources/ieee-transactions-information-forensics-and-security Whoissignalprocessingsociety.org
406http://www.just.edu.jo/~qmyaseen/ddsw2020/ddsw2020.html Whoisedu.jo
407https://nvd.nist.gov/vuln/detail/CVE-2024-24510 Whoisnist.gov
408https://nvd.nist.gov/vuln/detail/CVE-2023-20592 Whoisnist.gov
409https://nvd.nist.gov/vuln/detail/CVE-2023-20583 Whoisnist.gov
410https://nvd.nist.gov/vuln/detail/CVE-2022-21233 Whoisnist.gov
411https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0925 Whoismitre.org
412https://nvd.nist.gov/vuln/detail/CVE-2021-26318 Whoisnist.gov
413https://nvd.nist.gov/vuln/detail/CVE-2020-8695 Whoisnist.gov
414https://nvd.nist.gov/vuln/detail/CVE-2020-8694 Whoisnist.gov
415https://nvd.nist.gov/vuln/detail/CVE-2020-0551 Whoisnist.gov
416https://nvd.nist.gov/vuln/detail/CVE-2020-0549 Whoisnist.gov
417https://nvd.nist.gov/vuln/detail/CVE-2019-11135 Whoisnist.gov
418https://nvd.nist.gov/vuln/detail/CVE-2019-11091 Whoisnist.gov
419https://nvd.nist.gov/vuln/detail/CVE-2019-5489 Whoisnist.gov
420https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130 Whoismitre.org
421https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126 Whoismitre.org
422https://nvd.nist.gov/vuln/detail/CVE-2017-5754 Whoisnist.gov
423https://nvd.nist.gov/vuln/detail/CVE-2017-5753 Whoisnist.gov
424https://nvd.nist.gov/vuln/detail/CVE-2017-5715 Whoisnist.gov
425https://github.com/misc0110/clipcount Whoisgithub.com
426https://github.com/misc0110/clipcount Whoisgithub.com
427https://github.com/misc0110/Remote-Presenter Whoisgithub.com
428https://github.com/misc0110/Remote-Presenter Whoisgithub.com
429https://github.com/misc0110/wormhole-context-menu Whoisgithub.com
430https://github.com/misc0110/wormhole-context-menu Whoisgithub.com
431https://github.com/misc0110/easychair-bidding-helper Whoisgithub.com
432https://github.com/misc0110/easychair-bidding-helper Whoisgithub.com
433https://github.com/misc0110/hotcrp-bidding-helper Whoisgithub.com
434https://github.com/misc0110/hotcrp-bidding-helper Whoisgithub.com
435https://github.com/misc0110/paper-linter Whoisgithub.com
436https://github.com/misc0110/paper-linter Whoisgithub.com
437https://github.com/misc0110/r0e Whoisgithub.com
438https://github.com/misc0110/r0e Whoisgithub.com
439https://github.com/misc0110/TravelMap Whoisgithub.com
440https://github.com/misc0110/TravelMap Whoisgithub.com
441https://github.com/misc0110/SSHLock Whoisgithub.com
442https://github.com/misc0110/SSHLock Whoisgithub.com
443https://github.com/misc0110/boot-into Whoisgithub.com
444https://github.com/misc0110/boot-into Whoisgithub.com
445https://github.com/misc0110/BibTool Whoisgithub.com
446https://github.com/misc0110/BibTool Whoisgithub.com
447https://github.com/misc0110/FaultjectionSimulator Whoisgithub.com
448https://github.com/misc0110/FaultjectionSimulator Whoisgithub.com
449https://github.com/misc0110/labrunner Whoisgithub.com
450https://github.com/misc0110/labrunner Whoisgithub.com
451https://github.com/misc0110/pdf-webslides Whoisgithub.com
452https://github.com/misc0110/pdf-webslides Whoisgithub.com
453https://github.com/misc0110/polyglot-jpg-pdf Whoisgithub.com
454https://github.com/misc0110/polyglot-jpg-pdf Whoisgithub.com
455https://transient.fail Whoistransient.fail
456https://github.com/IAIK/transientfail Whoisgithub.com
457https://transient.fail Whoistransient.fail
458https://github.com/misc0110/livehist Whoisgithub.com
459https://github.com/misc0110/livehist Whoisgithub.com
460https://github.com/misc0110/beamer-preview Whoisgithub.com
461https://github.com/misc0110/beamer-preview Whoisgithub.com
462https://github.com/misc0110/PTEditor Whoisgithub.com
463https://github.com/misc0110/PTEditor Whoisgithub.com
464https://github.com/misc0110/colorful-printf Whoisgithub.com
465https://github.com/misc0110/colorful-printf Whoisgithub.com
466https://github.com/misc0110/asciicast2vector Whoisgithub.com
467https://github.com/misc0110/asciicast2vector Whoisgithub.com
468https://github.com/misc0110/LiveTikZ Whoisgithub.com
469https://github.com/misc0110/LiveTikZ Whoisgithub.com
470https://github.com/misc0110/ProcDetails Whoisgithub.com
471https://github.com/misc0110/ProcDetails Whoisgithub.com
472https://github.com/misc0110/libattopng Whoisgithub.com
473https://github.com/misc0110/libattopng Whoisgithub.com
474https://github.com/misc0110/dash-button Whoisgithub.com
475https://github.com/misc0110/dash-button Whoisgithub.com
476https://github.com/misc0110/faint Whoisgithub.com
477https://github.com/misc0110/faint Whoisgithub.com
478https://github.com/misc0110/configurable-DES Whoisgithub.com
479https://github.com/misc0110/configurable-DES Whoisgithub.com
480https://github.com/misc0110/JBPPDrawfulQuestionEditor Whoisgithub.com
481https://github.com/misc0110/JBPPDrawfulQuestionEditor Whoisgithub.com
482https://github.com/misc0110/UniversalHeaderDecoder Whoisgithub.com
483https://github.com/misc0110/UniversalHeaderDecoder Whoisgithub.com
484https://github.com/misc0110/BF-js Whoisgithub.com
485https://github.com/misc0110/BF-js Whoisgithub.com
486https://www.student.tugraz.at/michael.schwarz/newsreader/ Whoistugraz.at
487https://www.student.tugraz.at/michael.schwarz/newsreader/ Whoistugraz.at
488https://play.google.com/store/apps/details?id=com.misc.tunewsreader Whoisgoogle.com
489https://github.com/misc0110/raspberry-webradio Whoisgithub.com
490http://www.mikrocontroller.net/articles/Raspberry-Webradio Whoismikrocontroller.net
491https://github.com/misc0110/raspberry-webradio Whoisgithub.com
492https://www.student.tugraz.at/michael.schwarz/cexpl/ Whoistugraz.at
493https://www.student.tugraz.at/michael.schwarz/cexpl/ Whoistugraz.at
494https://play.google.com/store/apps/details?id=com.misc.avrfuse Whoisgoogle.com
495https://play.google.com/store/apps/details?id=com.misc.avrfuse Whoisgoogle.com
496https://play.google.com/store/apps/details?id=com.team4win.tugroom Whoisgoogle.com
497https://github.com/misc0110/tugraz-raumsuche Whoisgithub.com
498https://play.google.com/store/apps/details?id=com.team4win.tugroom Whoisgoogle.com