Patrick Jattke

Patrick Jattke
Patrick Jattke
PhD Student

Patrick Jattke is a doctoral student in the Computer Security Group at D-ITET, ETH Zurich. He has written his master's thesis about Fully Homomorphic Encryption at ETH Zurich. Patrick holds a IT Systems Engineering (M.Sc.) degree from Hasso Plattner Institute at University of Potsdam, Germany and a Computer Science degree (B.Sc.) from Technical University of Darmstadt, Germany. Apart from that, he has gained practical experience during his apprenticeship as IT specialist and as working student in industry and research.

Scientific Publications

Published
ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms
33rd USENIX Security Symposium (USENIX Security 2024)
Published
BLASTER: Characterizing the Blast Radius of Rowhammer
3rd Workshop on DRAM Security (DRAMSec) co-located with ISCA 2023
Published
REGA: Scalable Rowhammer Mitigation with Refresh-Generating Activations
2023 IEEE Symposium on Security and Privacy (SP)
Published
ProTRR: Principled yet Optimal In-DRAM Target Row Refresh
2022 IEEE Symposium on Security and Privacy (SP)
Pages 735-753
Published
Blacksmith: Scalable Rowhammering in the Frequency Domain
2022 IEEE Symposium on Security and Privacy (SP)
Pages 716-734

Research projects as Researcher

Title
Principal Investigators

Scalable Hardware Reverse Engineering for Improving Security

Summary

Recent past has shown that similar to software, commodity hardware suffers from various security problems. Fixing hardware, however, takes much longer than fixing software. Consequently, it is desirable to find many issues quickly rather than one issue at a time. This is currently not possible since commodity hardware is closed and reverse engineering takes significantly long before we get to security analysis. The aim of this project is to explore novel techniques for scalable hardware reverse engineering to lower the bar for the much-needed independent security analysis of commodity hardware.

Scalable Hardware Reverse Engineering for Improving Security

Recent past has shown that similar to software, commodity hardware suffers from various security problems. Fixing hardware, however, takes much longer than fixing software. Consequently, it is desirable to find many issues quickly rather than one issue at a time. This is currently not possible since commodity hardware is closed and reverse engineering takes significantly long before we get to security analysis. The aim of this project is to explore novel techniques for scalable hardware reverse engineering to lower the bar for the much-needed independent security analysis of commodity hardware.

155
0cc659a9-4e52-4990-b8c8-79f9dfdb3e25