Tweetovi

Blokirali ste korisnika/cu @LCojocar

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @LCojocar

  1. 3. tra 2019.
    Poništi
  2. proslijedio/la je Tweet
    18. velj 2019.

    Still a few days to apply for the assistant/associate prof position in security at (). Explicitly also open for promising _young_ researchers. Also in other areas of security. Do not feel shy about applying! Deadline: 22/02

    Poništi
  3. proslijedio/la je Tweet
    16. velj 2019.

    faulting bit on an ecc ram with a wire and a lighter.

    Poništi
  4. 17. pro 2018.
    Poništi
  5. proslijedio/la je Tweet
    Poništi
  6. 21. stu 2018.
    Poništi
  7. proslijedio/la je Tweet
    21. stu 2018.

    Our work demonstrating exploits on -enabled systems (along with its companion paper) is now officially public ! Check out our project page and the paper:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    30. lis 2018.

    We’ve released the first Security Overview for the Apple T2 Security Chip! Mac secure boot, storage encryption, and more, e.g.: “Mac portables with the T2 chip have a hardware disconnect that ensures the microphone is disabled when the lid is closed.”

    Poništi
  9. proslijedio/la je Tweet
    23. lis 2018.

    Have a look at Server Board Schematic and super complex Layout designed in . I will point out some interesting stuff. Watch the Part 1 here:

    Poništi
  10. proslijedio/la je Tweet
    11. lis 2018.

    Reverse engineering a simple CMOS chip

    Poništi
  11. 1. lis 2018.
    Poništi
  12. proslijedio/la je Tweet
    19. ruj 2018.

    2002: Sun Microsystems CSO Whitfield Diffie announced that Sun was donating its elliptical curve cryptography technology to the OpenSSL project.

    Poništi
  13. proslijedio/la je Tweet
    13. ruj 2018.

    : Show hardware hacking as approachable, rathet than as deep wizardry.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    15. kol 2018.

    My die photos of the 8087 floating point chip from 1980. Almost all floating point is based on this chip and today's desktop computers still run 8087 instructions. I reverse engineered the bias generator inside and explain how it works.

    Poništi
  15. proslijedio/la je Tweet
    7. kol 2018.

    Wanna hear or learn about , the orchestration framework for dynamic binary analysis ()? Talk to me at BH/DC, I'll have some goodies!

    Poništi
  16. proslijedio/la je Tweet
    25. srp 2018.

    "Screaming Channels" paper / is online Electromagnetic side channels from a CPU can leak to a radio transmitter. CPU and radio transmitters are often integrated (think WiFi, BlueTooth) We recover an AES key from 10 meters on a BT chip

    Prikaži ovu nit
    Poništi
  17. 29. lip 2018.

    "One man's trash is another man's treasure"

    Poništi
  18. proslijedio/la je Tweet
    22. sij 2018.

    Brand new Training "Side-Channel Attacks 101" by Lejla Batina & Kostas Papagiannopoulos will be part of BERLIN! Get to know more here:

    Poništi
  19. proslijedio/la je Tweet
    29. srp 2017.

    Useful terminology: Repeatability vs Replicability vs Reproducibility in research

    Poništi
  20. proslijedio/la je Tweet
    24. srp 2017.

    CHES is moving to journal publication model (Transactions on Cryptographic Hardware and Embedded Systems -- TCHES):

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·