Daniel Moghimi

@danielmgmi

Ph.D Candidate , Hacker, Reverse Engineer, Vuln Hunter

Vrijeme pridruživanja: studeni 2015.

Medijski sadržaj

  1. 6. sij

    Looking forward to give a talk about TPM-Fail this Wednesday(01/08/2020) at RWC 2020

  2. 2. sij
    Odgovor korisnicima

    When you don't have a logo but you get one for free :D

  3. 21. pro 2019.
  4. 18. pro 2019.

    Google can distinguish which of my travels in 2019 were for work (with suitcase)! Any idea how?

  5. 28. stu 2019.
  6. 12. stu 2019.

    CVSS Base Score: 6.8 Medium, although it can be exploited remotely, they said that the attack complexity is high!!!

    Prikaži ovu nit
  7. 12. stu 2019.

    Another patch Tuesday surprise: Local/Remote timing side-channel attacks on Trusted Platform Modules (TPMs) A CC4+ Certified TPM hardware and Intel PTT (firmware-TPM) are affected.

    Prikaži ovu nit
  8. 8. stu 2019.

    Good morning San Diego

  9. 27. ruj 2019.

    The video for my talk, "SPOILER: Speculative Load Hazards Boost Rowhammer and Cache Attacks", is public. Thanks,

  10. 19. ruj 2019.

    Doing the last pass over the paper before submitting the camera ready

  11. 6. ruj 2019.
    Odgovor korisnicima

    And I used to dogsit this baby but she is moving to California!

  12. 6. ruj 2019.
    Odgovor korisniku/ci

    He is neo who lives with my girlfriend's parents.

  13. 26. kol 2019.

    How do we mitigate uArch attacks at ISA level? Meltdown, Spectre, Foreshadow, Spoiler, TLBleed, and more...

  14. 15. kol 2019.

    It was a pleasure to kick off the side channel session with spoiler attack. The paper: JavaScript poc:

  15. 14. kol 2019.
  16. 19. lip 2019.

    That's why I never learned German.

  17. 9. sij 2019.

    Interesting presentation by on message franking. Facebook scheme let attackers to send abusive encrypted content without being reported due to robustness issue in GCM.

  18. 9. sij 2019.
  19. 5. pro 2018.

    Excellent presentation by on our recent work "MicroWalk: A Framework for Finding Side Channels in Binaries"

  20. 10. stu 2018.

    MemJam responsible disclosure is as follow including the CVE and patch for the cryptography library. The hardware vulnerability has totally been ignored by Intel.

    Prikaži ovu nit

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·