Tweetovi

Blokirali ste korisnika/cu @ThoreTiemann

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ThoreTiemann

  1. proslijedio/la je Tweet
    28. sij

    Bachelor- oder Masterarbeit beim ? Gerne, z.B. zu "IT-Sicherheitsaspekten von KI in Anwendungen" oder anderen eigenen Themen. Mehr dazu unter: .

    Poništi
  2. proslijedio/la je Tweet
    8. sij
    Poništi
  3. proslijedio/la je Tweet
    6. sij

    Rowhammer lives. This is not specific to of any flavor, or even x86.

    Poništi
  4. proslijedio/la je Tweet
    2. sij
    Odgovor korisnicima

    When you don't have a logo but you get one for free :D

    Poništi
  5. proslijedio/la je Tweet
    2. sij

    FPGA cards can be abused for faster and more reliable Rowhammer attacks * Academics detail new JackHammer attack * Twice as fast, 4 times more bit flips than Rowhammer * FPGAs are commonly used in cloud services, but don't have same security as CPUs

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    2. sij

    Interesting read. During one of my recent lectures we touched upon alternative ways of performing fault attacks (in general). For Rowhammer we briefly discussed a FPGA-based scenario. Nice to see this researched in practice.

    Poništi
  7. proslijedio/la je Tweet
    2. sij
    Poništi
  8. proslijedio/la je Tweet
    30. pro 2019.

    In this paper, researchers have demonstrated JackHammer, a novel and efficient Rowhammer from the FPGA to the host’s main memory, showing to be 25% faster than a CPU rowhammer attack in a realistic fault attack on the WolfSSL RSA signing implementation.

    Poništi
  9. proslijedio/la je Tweet
    30. pro 2019.

    Our attack "JackHammer" sounds even cooler if you pronounce it with a French accent :)

    Poništi
  10. proslijedio/la je Tweet
    29. pro 2019.

    An interesting paper that was just published in collab w/ Intel showing side-chan defense is critical for FPGAs & other accelerators. They demo 'JackHammer', novel hardware attacks between the mem I/F of the FPGA & host CPU. It's faster & more reliable.

    Poništi
  11. proslijedio/la je Tweet

    You want to play some before 2019 ends? got you covered! -> (powered by ) ->

    Poništi
  12. proslijedio/la je Tweet
    20. pro 2019.

    2019 has ended! Congrats to for winning 1st place :) Thank you, everyone, for playing and we wish to see you next year 😄

    Poništi
  13. proslijedio/la je Tweet
    17. pro 2019.

    Forschende der arbeiten zu­sammen mit WissenschaftlerInnen und am Projekt PQC4MED. Es soll effiziente und sichere Verfahren entwickeln, die auch vor Quantencomputern resistent sind und so medizinische Geräte schützen.

    Poništi
  14. proslijedio/la je Tweet
    14. pro 2019.
    Poništi
  15. proslijedio/la je Tweet
    13. pro 2019.

    we are getting ready to play the

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·