Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @danielmgmi
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @danielmgmi
-
Prikvačeni tweet
Another patch Tuesday surprise: Local/Remote timing side-channel attacks on Trusted Platform Modules (TPMs) A CC4+ Certified TPM hardware and Intel PTT (firmware-TPM) are affected.
@danielmgmi@berksunar@tomcrypt@nadiaheninger http://tpm.fail#sidechannel#TPMpic.twitter.com/0ezyhf22QT
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Moghimi proslijedio/la je Tweet
Often find myself going back to this outline when I have a mental block writing a paper abstract. Hopefully it's useful for others too. (feat. Me and John Wilkes from Google) https://shelbyt.github.io/abstracts.html
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Moghimi proslijedio/la je Tweet
We sent this
#zombieload PoC to Intel on May 16, just hours after we got access to the patches. The#zombieload paper from last year already describes the issue. Media already reported about it in November: https://www.zdnet.com/article/intels-cascade-lake-cpus-impacted-by-new-zombieload-v2-attack/ … Where's the news?#MDS#L1DEShttps://twitter.com/mlqxyz/status/1221855508765794305 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Moghimi proslijedio/la je Tweet
It is fascinating to think about the fact that CPUs have for decades been designed partially by measuring existing code, and optimizing for it. And code by measuring CPUs. That implies that tiny compiler choices in the 80s have echoes in todays CPU hardware.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
As somebody who works in tech and read lots of technical materials (papers, news, blogs, articles) every day. How many non-tech books (novel, fiction, history, art, etc.) do you read per year?
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
SGX-Step has been a handy tool in many of the works We've done and I'm planning to use it for upcoming future attacks on SGX. Great work!
@jovanbulck, This list will grow.https://twitter.com/jovanbulck/status/1215656958591631361 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Moghimi proslijedio/la je Tweet
TPM-Fail: TPM meets Timing and Lattice Attacks by
@danielmgmi,@berksunar,@tomcrypt, and@nadiaheninger. This attack leverages secret-dependent execution time in Trusted Platform Modules (TPMs) to extract keys. Are you sensing a theme? https://tpm.fail/#realworldcryptoPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Moghimi proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Daniel Moghimi proslijedio/la je Tweet
@danielmgmi just gave an excellent presentation of http://TPM.fail#realworldcryptopic.twitter.com/I0xgRLqvDX
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Looking forward to give a talk about TPM-Fail this Wednesday(01/08/2020) at RWC 2020 https://rwc.iacr.org/2020/program.html … http://tpm.fail
#sidechannels#trustedcomputing#untrustedcomputingpic.twitter.com/dTDq9F9qW2
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Moghimi proslijedio/la je Tweet
Zombieload: leaking memory out of Intel CPUs through exploiting fault handling, if you are having a flashback to meltdown it's similar but still exploitablehttps://media.ccc.de/v/36c3-10754-zombieload_attack …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Daniel Moghimi proslijedio/la je Tweet
FPGA cards can be abused for faster and more reliable Rowhammer attacks * Academics detail new JackHammer attack * Twice as fast, 4 times more bit flips than Rowhammer * FPGAs are commonly used in cloud services, but don't have same security as CPUs https://www.zdnet.com/article/fpga-cards-can-be-abused-for-faster-and-more-reliable-rowhammer-attacks/ …pic.twitter.com/uquRsT0CqD
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Happy new year
#sidechannel#fpga. Here it is the JackHammer!! authored by Zane Weissmann,@ThoreTiemann,@danielmgmi,@defparam,@tomcrypt,@berksunarhttps://twitter.com/david_schor/status/1211473745371705345 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Daniel Moghimi proslijedio/la je Tweet
In this paper, researchers have demonstrated JackHammer, a novel and efficient Rowhammer from the FPGA to the host’s main memory, showing to be 25% faster than a CPU rowhammer attack in a realistic fault attack on the WolfSSL RSA signing implementation. https://arxiv.org/pdf/1912.11523.pdf …pic.twitter.com/xte7xVlYAa
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
An FPGA-originated rowhammer can hammer faster and flip more bits compared to the CPU rowhammer on the same platform.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
We studied the potential side-channel threat of integrating FPGAs with the CPU memory subsystem in the ongoing collaboration with
@IntelSecurity to make these platforms more secure. "JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms" https://arxiv.org/pdf/1912.11523.pdf …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Merry XMass!! The source code is out: https://github.com/vernamlab/TPM-FAIL …https://twitter.com/danielmgmi/status/1194322902037889024 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Daniel Moghimi proslijedio/la je Tweet
My PhD thesis "Software-based Side-Channel Attacks and Defenses in Restricted Environments" is finally available online: https://misc0110.net/web/files/phd_thesis.pdf … I really enjoyed my last 3 years working on it, also due to my great colleagues, especially
@lavados,@mlqxyz, and@BloodyTangerinepic.twitter.com/po1M8T85Zy
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Google can distinguish which of my travels in 2019 were for work (with suitcase)! Any idea how?
#privacy#excusemegoogle#givemeabreakpic.twitter.com/ReUEWIc1i2
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.