Rezultati pretraživanja
  1. 10. lis 2018.

    Me presenting the first comprehensive and compatible software protection against attacks at . Check out the paper at

  2. 10. svi 2018.

    After a long disclosure process, we go public with : remotely triggering bit flips over fast networks! Check out our upcoming USENIX ATC paper :

  3. 17. stu 2017.

    First js pwning for breakfast, now Rowhammer for lunch. Attacking ARM Trustzone 👌

  4. 3. lis 2017.
    Odgovor korisniku/ci

    Even works if state-of-the-art defenses are in place.

  5. 20. svi 2019.

    Here is explaining that contrary to what many people thought, *ECC memory is not enough to stop attacks* at conference.

  6. 21. stu 2018.

    Credit where credit's due: has been poking server boards with syringe needles to reverse engineer their ECC. And discovering side channels for single bit flip detection, allowing for reliable exploitation on memory. More info:

  7. 10. ruj 2018.
    Andrei Tatar - #RAID18
  8. 17. lis 2017.

    Our paper on "Attacking Deterministic Signature Schemes using Fault Attacks" is now on ePrint.

    Prikaži ovu nit
  9. 11. srp 2018.

    Andrei Tatar presenting ThrowHammer, our remote attack (as well as ALIS, a new defense) at ATC.

  10. When you dig deep enough in the research, you always see the same thing: a known-unknown which is somehow reliable enough to produce cutting edge technology (extract from the seminal paper on )

  11. 20. svi 2019.

    Now at HW security session: talking Exploiting Correcting Codes: On the effectiveness of ECC Memory Against Attacks

    Prikaži ovu nit
  12. Researchers find another technique—called Nethammer—to exploit the DRAM bug that can be carried out remotely through network requests Most countermeasures do not prevent this attack.

  13. Onur discussed root causes and solutions to at his talk last week on "RowHammer and Beyond" at the ECE Seminar , slides: . Also check out our new paper:

  14. 21. sij 2019.

    On popular request, we released the source code for our app: . This is the GUI for easy execution of the native binary to test your Android device for bit flips.

  15. 30. lis 2017.

    Our crazy design at to protect KSM against sidechannels and !Try it: info:

  16. 3. svi 2018.

    One of our bright students reverse engineered cache hierarchy of a commonly-used integrated GPU, used it to trigger rowhammer flips in the browser on phones (very first time) and built a reliable browser exploit using those flips!

  17. 16. svi 2018.

    ? via network. Paper and research from the meltdown/spectre guys @mqlxyz from . Lots of fun to come.

  18. 6. srp 2018.

    Researchers found a new variation of the attack technique they have dubbed RAMpage:

  19. 10. lip 2019.

    talking about attacks and defenses at cc.

  20. 21. stu 2018.

    Our work demonstrating exploits on -enabled systems (along with its companion paper) is now officially public ! Check out our project page and the paper:

    Prikaži ovu nit

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.