Tweetovi

Blokirali ste korisnika/cu @hanyrax

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @hanyrax

  1. Prikvačeni tweet
    28. srp 2019.
    Poništi
  2. proslijedio/la je Tweet
    27. sij

    Another day, another embargo and addendum! “New” (not really!) variants of the day: L1D evictions (Fig 6, RIDL paper) or and vector registers or . See . As a bonus: a faster RIDL exploit that leaks a root hash in 4s:

    Poništi
  3. proslijedio/la je Tweet
    22. sij

    We've found a bug in CSME on-die ROM!💥 Intel says it's already targeted by CVE-2019-0090 (). Security Fuses can be extracted! 🔥 Mehlow and Cannon Point chipsets are affected. Stay tuned!

    Poništi
  4. proslijedio/la je Tweet
    14. sij

    Our NDSS paper, ABSynthe is now online: ABSynthe takes a target program and a microarchitecture and automatically synthesizes new side channels. With cool leakage maps!

    Poništi
  5. proslijedio/la je Tweet
    9. sij

    Made a "quick" writeup on the and the in the kernel. I thought it might be useful to share. Suggestions are very welcome :)

    Poništi
  6. 8. sij

    New sticker for the new office!🔥

    Poništi
  7. proslijedio/la je Tweet
    30. pro 2019.

    In this paper, researchers have demonstrated JackHammer, a novel and efficient Rowhammer from the FPGA to the host’s main memory, showing to be 25% faster than a CPU rowhammer attack in a realistic fault attack on the WolfSSL RSA signing implementation.

    Poništi
  8. proslijedio/la je Tweet
    27. pro 2019.

    Apple’s latest filing in the Corellium case is HORRIFYING. It effectively will set a precedent which makes unsanctioned research of Apple products *ILLEGAL*. This “security focused” company is sending a clear message here: look into our shit and we will ruin your life.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    27. pro 2019.

    The AMD Secure Processor is a CPU in your CPU you do not control. It’s a Trusted Execution Environment to protect VMs from host access or copyrighted work from distribution. At I will present our PSP hacking and how we regained control over it.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    27. pro 2019.

    As part of EDK II Minimum Platform initiative Intel started publishing their UEFI Silicon Packages for a few platforms in edk2-paltforms repository (). They are heavily stripped down of course but some interesting information is remaining

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    25. pro 2019.

    We made a website which shows a genealogy of fuzzers: Basically, this is a fork from the one we have in the survey, but which we can keep up-to-date and where anyone can contribute at:

    Poništi
  12. proslijedio/la je Tweet
    18. pro 2019.

    I have retroactively fixed everybody's complaint about movie hacking/reverse engineering not being realistic.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    7. pro 2019.

    Speed solves everything

    Poništi
  14. proslijedio/la je Tweet
    4. pro 2019.
    Poništi
  15. proslijedio/la je Tweet
    Poništi
  16. proslijedio/la je Tweet

    My man is blind. THIS is the Twitter content I’m here for...💪😍🔥😏🔥💪

    Poništi
  17. proslijedio/la je Tweet
    27. stu 2019.

    The evolution of the truck is here. Guaranteed shatterproof 😬

    Poništi
  18. proslijedio/la je Tweet
    23. stu 2019.

    This very pictorial scheme proves a link between IOSF Side Band segments of CPU complex and PCH in modern platforms (Cannon Lake, Ice Lake). So, the question is whether now Intel CSME has an access to MEE of Intel SGX which is certainly connected to IOSF SB

    Poništi
  19. proslijedio/la je Tweet
    20. stu 2019.

    Start with 82 and go backwards to 1 8281807978777675747372717069686 7666564636261605958575655545352 5150494847464544434241403938373 6353433323130292827262524232221 2019181716151413121110987654321 ...this number is prime!

    Poništi
  20. proslijedio/la je Tweet
    16. stu 2019.

    I managed to open source my Android app for reading, writing and executing shellcode in RF430 NFC tags this morning. (Backdoor password for the RF430TAL152H is redacted, but everything else is there.) cc

    Poništi
  21. proslijedio/la je Tweet
    15. stu 2019.

    Paged Out! #2 Thanks to all the authors and the institute! Enjoy!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·