Tweetovi

Blokirali ste korisnika/cu @_cwerling

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_cwerling

  1. 28. pro 2019.
    Prikaži ovu nit
    Poništi
  2. 27. pro 2019.

    The AMD Secure Processor is a CPU in your CPU you do not control. It’s a Trusted Execution Environment to protect VMs from host access or copyrighted work from distribution. At I will present our PSP hacking and how we regained control over it.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    29. stu 2019.

    We found multiple attacks on RCS, ranging from remote text message intercept to local MitM. Vulnerabilities lie in misconfigured deployments and the official Android messaging app. We present our attacks and how to fix them and .

    Poništi
  4. 11. stu 2019.

    Happy to be here in London at the together with Robert Buhren. Our paper [0] proposes attacks against AMD SEV attempting to protect cloud computing in face of an untrusted cloud provider. [0]

    Poništi
  5. proslijedio/la je Tweet
    2. ruj 2019.

    Does AMD have something similar to the IFD for configuring flash speed and read commands? The PSP boots fine from the spispy emulator with normal 0x03 reads at 20MHz SCLK, although the x86 switches to fast 0x0B reads in PeiCore and reboots soon afterwards.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    2. ruj 2019.

    R. Buhren et al., “Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation” […analyzes the firmware components… on the current AMD Epyc Naples CPU series. We demonstrate that it is possible to extract critical CPU-specific keys…]

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    24. kol 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·