Follow
Jann Horn
Jann Horn
Google Project Zero
Verified email at google.com
Title
Cited by
Cited by
Year
Spectre attacks: Exploiting speculative execution
P Kocher, J Horn, A Fogh, D Genkin, D Gruss, W Haas, M Hamburg, ...
Communications of the ACM 63 (7), 93-101, 2020
28292020
Meltdown: Reading kernel memory from user space
M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, J Horn, S Mangard, ...
Communications of the ACM 63 (6), 46-56, 2020
17302020
speculative execution, variant 4: speculative store bypass
J Horn
982018
Reading privileged memory with a side-channel
J Horn
Project Zero 39, 2018
742018
Speculative execution, variant 4: Speculative store bypass, 2018
J Horn
URl: https://bugs. chromium. org/p/project-zero/issues/detail, 2018
192018
Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. Spectre Attacks: Exploiting Speculative Execution
P Kocher, J Horn, A Fogh, D Genkin
40th IEEE Symposium on Security and Privacy (S&P’19), 2019
92019
Project Zero: Reading privileged memory with a side-channel
J Horn
Jan, 2018
92018
Issue 1528: speculative execution, variant 4: speculative store bypass
J Horn
72018
Jann Horn an d Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Mike Hamburg. Meltdown: Reading kernel memory from user space
M Lipp, M Schwarz, D Gruss, T Prescher, W Haas, A Fogh
27th USENIX Security Symposium (USENIX Security 18), 2018
42018
Speculative Store Bypass
J Horn
May, 2018
42018
A cache invalidation bug in Linux memory management
J Horn
URL https://googleprojectzero. blogspot. com/2018/09/a-cache-invalidation …, 2018
42018
CVE-2014-7911: Android< 5. 0 Privilege Escalation using ObjectInput Stream
J Horn
URL: http://seclists. org/fulldisclosure/2014/Nov/51, 2014
42014
Speculative Execution
J Horn
Variant 4, 43-45, 0
4
Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, and Yuval Yarom. 2019. Spectre Attacks: Exploiting Speculative Execution
P Kocher, J Horn, A Fogh, D Genkin
40th IEEE Symposium on Security and Privacy (S&P’19), 0
4
Mitigations are attack surface, too
J Horn
32021
Linux Email list: CONFIG_DEBUG_INFO_BTF and CONFIG_GCC_PLUGIN_RANDSTRUCT
J Horn
32020
omas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, and Michael Hamburg. Meltdown: Reading Kernel Memory from User Space
M Lipp, M Schwarz, D Gruss
USENIX Security Symposium, 27, 2018
32018
Meltdown: Reading Kernel Memory from User Space
J Horn, W Haas, T Prescher, D Gruss, M Lipp, S Mangard, M Schwarz
27th Security Symposium Security 18, 2018
32018
Cve-2014-7911: Privilege escalation using objectinputstream
J Horn
32014
Project zero
J Horn
Dosegljivo: https://googleprojectzero. blogspot. com/2018/01/reading …, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20