Julian Stecklina
Julian Stecklina
Engineer at Cyberus Technology
Verified email at os.inf.tu-dresden.de - Homepage
Title
Cited by
Cited by
Year
ZombieLoad: Cross-privilege-boundary data sampling
M Schwarz, M Lipp, D Moghimi, J Van Bulck, J Stecklina, T Prescher, ...
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
2292019
System and method of threat detection under hypervisor control
A Kabra, J Stecklina, H Rathor, U Steinberg
US Patent 10,033,759, 2018
922018
Lazyfp: Leaking fpu register state using microarchitectural side-channels
J Stecklina, T Prescher
arXiv preprint arXiv:1806.07480, 2018
782018
A short overview on modern parallel SAT-solvers
S Holldobler, N Manthey, J Stecklina, P Steinke
Advanced Computer Science and Information System (ICACSIS), 2011 …, 2011
372011
Shrinking the Hypervisor One Subsystem at a Time
J Stecklina
10th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution …, 2014
12*2014
Modern parallel SAT-solvers
S Hölldobler, N Manthey, VH Nguyen, P Steinke, J Stecklina
TR 2011–6, 2011
102011
Fiasco. OC on the SCC
M Partheymüller, J Stecklina, B Döbel
4th Many-core Applications Research Community (MARC) Symposium 79, 2011
82011
Towards faster reasoners by using transparent huge pages
JK Fichte, N Manthey, J Stecklina, A Schidler
International Conference on Principles and Practice of Constraint …, 2020
72020
ZombieLoad: Cross-Privilege-Boundary Data Sampling (2019)
M Schwarz, M Lipp, D Moghimi, JV Bulck, J Stecklina, T Prescher, ...
arXiv preprint arXiv:1905.05726, 2019
62019
Remote debugging via firewire
J Stecklina
Master's thesis, TU Dresden, 2009
42009
Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber Identity
L Neumann, T Halman, P Rotek, A Boettcher, J Stecklina, M Sojka, ...
ISSE 2012 Securing Electronic Business Processes, 195-206, 2012
22012
Cross-Privilege-Boundary Data Sampling
M Schwarz, M Lipp, D Moghimi, J Van Bulck, J Stecklina, T Prescher, ...
2019
Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber Identity
A Boettcher, J Stecklina, M Sojka
ISSE 2012 Securing Electronic Business Processes: Highlights of the …, 2012
2012
Predicate-C: an efficient and generic runtime system for predicate dispatch
F Gräter, S Götz, J Stecklina
Proceedings of the 6th Workshop on Implementation, Compilation, Optimization …, 2011
2011
Rapid I/O: Improving the Efficiency of I/O Virtualization
B Kauer, U Steinberg, J Stecklina
2010
A Userspace Packet Switch for Virtual Machines
J Stecklina
The system can't perform the operation now. Try again later.
Articles 1–16