Intel STORM

@IntelSTORMTeam

Intel STrategic Offensive Research & Mitigations (STORM) Team

Vrijeme pridruživanja: studeni 2018.

Tweetovi

Blokirali ste korisnika/cu @IntelSTORMTeam

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @IntelSTORMTeam

  1. 17. pro 2019.

    As a wrap-up of our pending releases before departure we've just released the kCFI project for the Linux Kernel () and the Randpoline support for LLVM (), both by

    Poništi
  2. proslijedio/la je Tweet
    13. pro 2019.

    Today was my last day going to the office at Intel (I will still be available for my team til the end of the month). Soon I will talk about the next steps! Sad to leave the amazing behind, but excited with the new challenges ahead.

    Poništi
  3. proslijedio/la je Tweet
    11. pro 2019.

    One unnoticed vulnerability found by Intel STORM team: Intel IGD (integarted graphic card) can read two first dwords (unencrypted of course) of cache lines belonging to Intel SGX Enclave

    Poništi
  4. 13. stu 2019.

    We've just updated our presentations repo () to include the slides for the three talks of our team members and at

    Poništi
  5. proslijedio/la je Tweet
    24. lis 2019.

    Finally arrived in Sao Paulo for and I brought a few goodies

    Poništi
  6. 22. lis 2019.

    We've just released two new papers "A New Type of Branch Instruction with Configurable Speculation Behavior" and "A Recursive Counter for Linked-List Return Stack Buffer" (non-security related). Read it here:

    Poništi
  7. 18. lis 2019.

    Lots of researchers from team will be next week! We have and giving talks. is the editor of the H2HC magazine. is one of the organizers. is going just for the fun!

    Poništi
  8. 17. lis 2019.

    We've updated the paper "A New Memory Type Against Speculative Side-Channel Attacks" by to incorporate feedback received on other work and improve the references! Thanks to

    Poništi
  9. 10. lis 2019.

    Marion will be presenting 'The Glitch in the Matrix' or in her own words talking about 'Stealth compiler hacks'!

    Poništi
  10. 8. lis 2019.
    Poništi
  11. 26. ruj 2019.

    We've just released a new paper "New Memory Type Against Speculative Side-Channel Attacks". Read it here:

    Poništi
  12. 17. ruj 2019.

    We've just released the code for the WinDBG Plugin by our team member Artem Shishkin () presented at ()

    Poništi
  13. 13. ruj 2019.

    Our team member Matias Soler () will be talking about his interesting analysis of GPS Trackers (with surprising findings!) at () and ()

    Poništi
  14. 23. kol 2019.

    New paper - "Randpoline: A Software Mitigation for Branch Target Injection" Thanks for the help in reviewing and amazing discussions

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·