Rezultati pretraživanja
  1. 29. sij

    RIDL/Zombieload and L1DES/CacheOut are the latest vulnerabilities discovered in Intel CPU’s. Reports indicate is still working on fixes, but may have another ready soon

  2. 27. sij
    Odgovor korisnicima

    One paper on is enough. (And enough drama to last a lifetime.)

  3. 27. sij
    Odgovor korisniku/ci

    For what it's worth, we do not consider this new vulnerabilities at all. More

  4. 27. sij
  5. 27. sij

    Another day, another embargo and addendum! “New” (not really!) variants of the day: L1D evictions (Fig 6, RIDL paper) or and vector registers or . See . As a bonus: a faster RIDL exploit that leaks a root hash in 4s:

  6. 12. stu 2019.

    In other news Rogue In-Flight Data Load won the 2nd place for Applied Research at 2019. I met many nice and interesting people at the poster presentation :).

  7. 12. stu 2019.

    Long embargos without transparency hurt endusers who remain unknowingly exposed to serious flaws. covers our saga with in her piece. remains a problem after 1+ year, 2 flawed patches and 2 embargos (+1 still ongoing).

  8. 12. stu 2019.

    deserves a lot of credit for this. She is better at finding variants than engineers. Also kudos to Jonas Theis, our master student who put together the fast /etc/shadow exploit as a term project!

  9. 12. stu 2019.

    Today, last-minute embargo on parts of ends. The "new" is just a variant we reported in Sep 2018, and it leaks your root hashes fast! Latest Intel patches remain broken. See for addendum and exploits.

    Prikaži ovu nit
  10. 12. stu 2019.
    Odgovor korisnicima

    We finally released some of our PoCs and test suite (after a long embargo): (credits to Jonas Theis for the updated /etc/shadow PoC)

  11. 24. svi 2019.

    Now online ’s great talk at about the attack: Rogue In-Flight Data Load. Cc

  12. 20. svi 2019.

    Many of you asked about the / disclosure process and independent finders. It has been confusing, also to us. We tried to piece this together. Check out the updated timeline on for all the details!

  13. 20. svi 2019.

    's presents , the vulnerability in Intel CPUs that allows unprivileged attackers to leak sensitive information across *any* security boundary. Even from javascript.

  14. 15. svi 2019.

    "hardware is the new software except it is much harder to fix" describing the / side-channel attack at AMSSEC

  15. 15. svi 2019.

    Very nice interactive diagram at Perhaps most telling is how many uncolored parts remain to be explored..

  16. 15. svi 2019.

    Como era de esperar, después de Meltdown, Spectre y L1TF, tenemos nuevos ataques explotando vulnerabilidades en la microarquitectura de los procesadores. Voy a explicar un poco en qué consisten

    Prikaži ovu nit
  17. Here's a longer technical deep dive explainer of (Microarchitectural Data Sampling):

  18. 14. svi 2019.

    Wanna know about and class of vulnerabilities? Come to the AMSec workshop in Amsterdam tomorrow and learn about how your Intel CPUs shout out your deepest secrets.

  19. 14. svi 2019.

    Very proud of my PhD student , who discovered , a new type of u-arch vulnerability in CPUs. Read the details here: . I'm excited we can finally talk about it, after a long embargo of 11M. Thanks to for allowing a merge.

  20. 14. svi 2019.

    Hi, everyone! and from will give an in-depth talk on the new hardware vulnerability at OFFZONE 2019.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.