Clémentine Maurice

@BloodyTangerine

Researcher at CNRS/IRISA. Weird nerd. Feminist. Mad hippie. .js and attacks on microarchitecture.

Vrijeme pridruživanja: ožujak 2010.

Tweetovi

Blokirali ste korisnika/cu @BloodyTangerine

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @BloodyTangerine

  1. Prikvačeni tweet

    In other good news, I am super happy to announce that my 2 projects have been accepted! What a week! I'll make more formal announcements, but I'll be hiring PhD students and postdocs, so ping me if you'd like to work with me.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    prije 20 sati

    It's possible to hack a machine with DMA attacks - you need to be able to hot-plug PCI or firewire device. IOMMU was said to be a decent solution to the problem. But nope. It turns out IOMMU can be still broken because... computers are hard.

    Poništi
  3. proslijedio/la je Tweet
    3. velj

    Pre-announcement: will be looking for a new colleague soon. Specifically, we will be interested in an assistant (or *perhaps* associate) professor in security. If you are interested, DM , or Info about :

    Poništi
  4. proslijedio/la je Tweet
    30. sij

    1/11: It’s the start of the Australian academic year, time for another stoush about free communication with the so-called ‘defence’ forces of my own country. (And a cheerful reminder that my views are my own and not the official position of the University of Melbourne.)

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    29. sij

    "Quelle confiance peut-on placer dans les plateformes matérielles qui exécutent nos applications?" La masterclass de et , c'est dans 30min au

    Poništi
  6. proslijedio/la je Tweet
    28. sij

    We will give a master class with on the security of software/hardware interfaces tomorrow at 6pm . We are waiting for you!

    Poništi
  7. proslijedio/la je Tweet
    15. sij

    DIMVA 2010 was where I published the first paper during my PhD. I really enjoyed attending it and I met many great people there (such as ) for the first time. I highly recommend submitting your work there!

    Poništi
  8. proslijedio/la je Tweet
    15. sij

    The paper submission deadline for is in one month! Great conference at a great location (Lisbon). Check the

    Poništi
  9. proslijedio/la je Tweet
    15. sij

    Dernière ligne droite pour les soumissions, ouvertes jusqu'au 2 février. Le CFP: et les conseils:

    Poništi
  10. proslijedio/la je Tweet
    14. sij

    Our NDSS paper, ABSynthe is now online: ABSynthe takes a target program and a microarchitecture and automatically synthesizes new side channels. With cool leakage maps!

    Poništi
  11. proslijedio/la je Tweet
    10. sij

    NDSS is pleased to announce the preliminary list of accepted papers for NDSS 2020. . Join us 23-26 February in sunny San Diego for all the details.

    Poništi
  12. proslijedio/la je Tweet
    10. sij

    SGX-Step v1.4.0 released with support for x86 ring-0 interrupt handlers and call gates! Allows to build a mini-OS for side-channel research, including easily executing selected functions from a user-space program in privileged ring-0 :-)

    Prikaži ovu nit
    Poništi
  13. 6. sij

    will take place in Lisbon, Portugal! Send us your best work, you have plenty of time before the deadline on February 16!

    Poništi
  14. proslijedio/la je Tweet
    6. sij

    The DIMVA 2020 Call for Papers is out. Submission deadline: 16/02/2020. Get the :

    Poništi
  15. proslijedio/la je Tweet
    2. sij

    We studied the potential side-channel threat of integrating FPGAs with the CPU memory subsystem in the ongoing collaboration with to make these platforms more secure. "JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms"

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    25. pro 2019.

    We made a website which shows a genealogy of fuzzers: Basically, this is a fork from the one we have in the survey, but which we can keep up-to-date and where anyone can contribute at:

    Poništi
  17. proslijedio/la je Tweet
    25. pro 2019.

    The 2nd Israeli Conference on Hardware and Side-Channel Attacks will be held in Barkan Hall, Ben-Gurion University, on 24-26/May/2020. It will be a blast! Save the date!

    Poništi
  18. proslijedio/la je Tweet
    23. pro 2019.

    We use automata learning techniques and program synthesis to automatically infer cache replacement policies from real hardware. CacheQuery: Learning Replacement Policies from Hardware Caches

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    21. pro 2019.

    After extensive community feedback, Oakland is moving to quarterly submission deadlines . The submission dates for S&P 2021 are now available at: . Honored to co-chair the conference with .

    Poništi
  20. proslijedio/la je Tweet
    19. pro 2019.

    Academic Twitter is for bragging, right? Well, our paper, "SpecFuzz: Bringing Spectre-type vulnerabilities to the surface" has been accepted to 2020! In the paper, we show how you can detect with one simple trick

    Poništi
  21. proslijedio/la je Tweet

    Eye-opening to see what a search warrant for a Google Account actually covers: all your location data, photos, searches, contacts, emails...

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·