-
Me presenting the first comprehensive and compatible software protection against
#rowhammer attacks at#osdi18. Check out the paper at https://vusec.net/papers/zebram@vu5ecpic.twitter.com/kJyRJqd2Pj
-
After a long disclosure process, we go public with
#Throwhammer: remotely triggering#Rowhammer bit flips over fast networks! Check out our upcoming USENIX ATC paper@vu5ec: https://www.vusec.net/download/?t=papers/throwhammer_atc18.pdf … -
First js pwning for breakfast, now Rowhammer for lunch. Attacking ARM Trustzone
#eshard#rowhammer#GreHack17pic.twitter.com/FMWfqo0syZ
-
Even works if state-of-the-art
#rowhammer defenses are in place. pic.twitter.com/Bm3894I08p
-
Here is
@LCojocar explaining that contrary to what many people thought, *ECC memory is not enough to stop#rowhammer attacks* at@IEEESSP conference.@vu5ecpic.twitter.com/rHNvKtrB45
-
Credit where credit's due:
@LCojocar has been poking server boards with syringe needles to reverse engineer their ECC. And discovering side channels for single bit flip detection, allowing for reliable#Rowhammer exploitation on#ECC memory. More info: https://www.vusec.net/projects/eccploit … -
Stop!
#Hammertime! Andrei Tatar (@vu5ec) presenting the Hammertime toolkit for the study of#rowhammer-based vulnerabilities.#RAID18#bestpaperaward https://doi.org/10.1007/978-3-030-00470-5_3 … https://github.com/vusec/hammertime …pic.twitter.com/Xa4xKhduB7
-
Our paper on "Attacking Deterministic Signature Schemes using Fault Attacks" is now on ePrint. https://eprint.iacr.org/2017/1014
#rowhammer#eddsaPrikaži ovu nit -
Andrei Tatar presenting ThrowHammer, our remote
#Rowhammer attack (as well as ALIS, a new defense) at@usenix ATC.@vu5ec@c_giuffrida@kavehrazavipic.twitter.com/ddqEgXVjl5
-
When you dig deep enough in the research, you always see the same thing: a known-unknown which is somehow reliable enough to produce cutting edge technology (extract from the seminal paper on
#Rowhammer) pic.twitter.com/0JxOi611xM
-
Now at
#sp19 HW security session:@LCojocar talking Exploiting Correcting Codes: On the effectiveness of ECC Memory Against#rowhammer Attacks@IEEESSP@vu5ecpic.twitter.com/nxOXi1sW3W
Prikaži ovu nit -
Researchers find another technique—called Nethammer—to exploit the DRAM
#Rowhammer bug that can be carried out remotely through network requests https://thehackernews.com/2018/05/remote-rowhammer-attack.html … Most countermeasures do not prevent this attack. pic.twitter.com/cRhL5jDZG9
-
Onur
@_onurmutlu_ discussed root causes and solutions to#RowHammer at his talk last week on "RowHammer and Beyond" at the ECE Seminar@nyutandon, slides: https://bit.ly/2VCYGIq . Also check out our new paper: https://arxiv.org/pdf/1904.09724.pdf …pic.twitter.com/kL53esns30
-
On popular request, we released the source code for our
#drammer app: https://github.com/vusec/drammer-app …. This is the GUI for easy execution of the native binary to test your Android device for bit flips.#opensource#rowhammer -
Our crazy design at
#SOSP17 to protect KSM against sidechannels and#rowhammer!Try it: https://github.com/vusec/vusion info: http://www.vusec.net/projects/VUsion -
One of our bright students reverse engineered cache hierarchy of a commonly-used integrated GPU, used it to trigger rowhammer flips in the browser on phones (very first time) and built a reliable browser exploit using those flips!
#rowhammer#glitchattack#SP18@IEEESSP@vu5echttps://twitter.com/pit_frg/status/991984272021032961 … -
#nethammer ?#rowhammer via network. Paper and research from the meltdown/spectre guys @mqlxyz@lavados@misc0110 from#TUGraz. Lots of fun to come. https://arxiv.org/abs/1805.04956 -
Researchers found a new variation of the
#Rowhammer attack technique they have dubbed RAMpage: http://bit.ly/2IDBuz4 -
@kavehrazavi talking about#rowhammer attacks and defenses at@cysep1 cc.@vu5ecpic.twitter.com/UlGjihhonW
-
Our
#ECCploit work demonstrating#Rowhammer exploits on#ECC-enabled systems (along with its companion#SP19 paper) is now officially public@LCojocar@kavehrazavi@c_giuffrida@herbertbos! Check out our project page and the paper:https://www.vusec.net/projects/eccploit …Prikaži ovu nit
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.