Berk Gulmezoglu

@beeeerk_wpi

Hardware security and AI researcher

Vrijeme pridruživanja: kolovoz 2011.

Tweetovi

Blokirali ste korisnika/cu @beeeerk_wpi

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @beeeerk_wpi

  1. proslijedio/la je Tweet
    2. velj

    The full set of my 2019 graduate-level computer architecture course lectures at ETH Zurich is online, along with all lecture videos, slides, and course materials: Course schedule: Youtube playlist: First…

    Poništi
  2. proslijedio/la je Tweet

    today in "fucky things your CPU might do to fuck up your crypto": Intel SA-00219 is a bug where an integrated GPU has access to the first two DWORDs in cache lines so apparently you have to 8-byte align and allocate 8 bytes extra for garbage before any cryptographic secrets

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    12. stu 2019.

    Another patch Tuesday surprise: Local/Remote timing side-channel attacks on Trusted Platform Modules (TPMs) A CC4+ Certified TPM hardware and Intel PTT (firmware-TPM) are affected.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    12. stu 2019.

    Yes is back with two surprises: 1. A new variant, acronymed "TAA" that works on MDS-resistant silicon (CCL) 2. The VERW software sequence mitigation is broken.

    Poništi
  5. 5. stu 2019.
    Poništi
  6. proslijedio/la je Tweet
    3. stu 2019.

    and I solved RIDL during for . Here's our solution. ... I still don't know exactly why it works though :-)

    Poništi
  7. proslijedio/la je Tweet
    28. lis 2019.

    WPI is growing the cybersecurity group (again) :). Assistant Prof position available

    Poništi
  8. 9. lis 2019.
    Poništi
  9. proslijedio/la je Tweet
    24. ruj 2019.

    The full set of my Spring 2019 undergraduate digital design & computer architecture course lectures at ETH Zurich is online with all videos, slides and course materials. Course website: Youtube:

    Poništi
  10. proslijedio/la je Tweet

    Twitters! and I have an opening for a PhD position at Eurecom/IRISA on the security of IoT devices in 5G networks! Detailed description: . Do apply and do spread the word!

    Poništi
  11. 10. ruj 2019.
    Poništi
  12. proslijedio/la je Tweet
    11. kol 2019.
    Poništi
  13. proslijedio/la je Tweet
    9. kol 2019.

    I am looking for a PhD student working with me on systems security and privacy-related topics starting this fall! Details: Application deadline: August 29, 2019

    Poništi
  14. proslijedio/la je Tweet

    💻 SWAPGS Attack [CVE-2019-1125] A new Spectre (v1) like side-channel affects all modern CPUs that leverage speculative execution. (pushed patches for this flaw secretly last month) and Red Hat have released advisories.

    Prikaži ovu nit
    Poništi
  15. 9. srp 2019.

    Our paper was presented by Andreas Zankl from Fraunhofer AISEC at

    Poništi
  16. proslijedio/la je Tweet
    27. svi 2019.

    Our paper "Spoiler: Speculative Load Hazards Boost Rowhammer and Cache Attacks" got accepted to . Congrats to MoritzKrebbel

    Poništi
  17. proslijedio/la je Tweet
    14. svi 2019.

    Read up about the new wave of transient execution attacks! Awesome research by :-)

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    4. velj 2019.

    The Preliminary Call for Papers for the 13th USENIX Workshop on Offensive Technologies is now live! Paper submissions for are due Wednesday, May 29.

    Poništi
  19. proslijedio/la je Tweet
    14. tra 2019.
    Poništi
  20. proslijedio/la je Tweet
    5. ožu 2019.

    "SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks" (Saad Islam et al., 2019) 📄 /via

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·