Tweetovi

Blokirali ste korisnika/cu @danielmgmi

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @danielmgmi

  1. Prikvačeni tweet
    12. stu 2019.

    Another patch Tuesday surprise: Local/Remote timing side-channel attacks on Trusted Platform Modules (TPMs) A CC4+ Certified TPM hardware and Intel PTT (firmware-TPM) are affected.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    1. velj

    Often find myself going back to this outline when I have a mental block writing a paper abstract. Hopefully it's useful for others too. (feat. Me and John Wilkes from Google)

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    27. sij

    We sent this PoC to Intel on May 16, just hours after we got access to the patches. The paper from last year already describes the issue. Media already reported about it in November: Where's the news?

    Poništi
  4. proslijedio/la je Tweet
    18. sij

    It is fascinating to think about the fact that CPUs have for decades been designed partially by measuring existing code, and optimizing for it. And code by measuring CPUs. That implies that tiny compiler choices in the 80s have echoes in todays CPU hardware.

    Poništi
  5. 15. sij

    As somebody who works in tech and read lots of technical materials (papers, news, blogs, articles) every day. How many non-tech books (novel, fiction, history, art, etc.) do you read per year?

    Poništi
  6. 11. sij

    SGX-Step has been a handy tool in many of the works We've done and I'm planning to use it for upcoming future attacks on SGX. Great work! , This list will grow.

    Poništi
  7. proslijedio/la je Tweet

    TPM-Fail: TPM meets Timing and Lattice Attacks by , , , and . This attack leverages secret-dependent execution time in Trusted Platform Modules (TPMs) to extract keys. Are you sensing a theme?

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    8. sij
    Odgovor korisniku/ci

    It was a good talk, thanks!

    Poništi
  9. proslijedio/la je Tweet
    8. sij
    Poništi
  10. 6. sij

    Looking forward to give a talk about TPM-Fail this Wednesday(01/08/2020) at RWC 2020

    Poništi
  11. proslijedio/la je Tweet
    4. sij

    Zombieload: leaking memory out of Intel CPUs through exploiting fault handling, if you are having a flashback to meltdown it's similar but still exploitable

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    2. sij

    FPGA cards can be abused for faster and more reliable Rowhammer attacks * Academics detail new JackHammer attack * Twice as fast, 4 times more bit flips than Rowhammer * FPGAs are commonly used in cloud services, but don't have same security as CPUs

    Prikaži ovu nit
    Poništi
  13. 2. sij
    Poništi
  14. 2. sij
    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    30. pro 2019.

    In this paper, researchers have demonstrated JackHammer, a novel and efficient Rowhammer from the FPGA to the host’s main memory, showing to be 25% faster than a CPU rowhammer attack in a realistic fault attack on the WolfSSL RSA signing implementation.

    Poništi
  16. 2. sij

    An FPGA-originated rowhammer can hammer faster and flip more bits compared to the CPU rowhammer on the same platform.

    Prikaži ovu nit
    Poništi
  17. 2. sij

    We studied the potential side-channel threat of integrating FPGAs with the CPU memory subsystem in the ongoing collaboration with to make these platforms more secure. "JackHammer: Efficient Rowhammer on Heterogeneous FPGA-CPU Platforms"

    Prikaži ovu nit
    Poništi
  18. 26. pro 2019.
    Poništi
  19. 21. pro 2019.
    Poništi
  20. proslijedio/la je Tweet
    16. pro 2019.

    My PhD thesis "Software-based Side-Channel Attacks and Defenses in Restricted Environments" is finally available online: I really enjoyed my last 3 years working on it, also due to my great colleagues, especially , , and

    Poništi
  21. 18. pro 2019.

    Google can distinguish which of my travels in 2019 were for work (with suitcase)! Any idea how?

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·