Rezultati pretraživanja
  1. 29. sij

    RIDL/Zombieload and L1DES/CacheOut are the latest vulnerabilities discovered in Intel CPU’s. Reports indicate is still working on fixes, but may have another ready soon

  2. 27. sij

    Another day, another embargo and addendum! “New” (not really!) variants of the day: L1D evictions (Fig 6, RIDL paper) or and vector registers or . See . As a bonus: a faster RIDL exploit that leaks a root hash in 4s:

  3. 12. stu 2019.

    In other news Rogue In-Flight Data Load won the 2nd place for Applied Research at 2019. I met many nice and interesting people at the poster presentation :).

  4. 12. stu 2019.

    Long embargos without transparency hurt endusers who remain unknowingly exposed to serious flaws. covers our saga with in her piece. remains a problem after 1+ year, 2 flawed patches and 2 embargos (+1 still ongoing).

  5. 12. stu 2019.

    deserves a lot of credit for this. She is better at finding variants than engineers. Also kudos to Jonas Theis, our master student who put together the fast /etc/shadow exploit as a term project!

  6. 12. stu 2019.
    Odgovor korisnicima

    We finally released some of our PoCs and test suite (after a long embargo): (credits to Jonas Theis for the updated /etc/shadow PoC)

  7. 24. svi 2019.

    Now online ’s great talk at about the attack: Rogue In-Flight Data Load. Cc

  8. 20. svi 2019.

    Many of you asked about the / disclosure process and independent finders. It has been confusing, also to us. We tried to piece this together. Check out the updated timeline on for all the details!

  9. 20. svi 2019.

    's presents , the vulnerability in Intel CPUs that allows unprivileged attackers to leak sensitive information across *any* security boundary. Even from javascript.

  10. 15. svi 2019.

    "hardware is the new software except it is much harder to fix" describing the / side-channel attack at AMSSEC

  11. 15. svi 2019.

    Very nice interactive diagram at Perhaps most telling is how many uncolored parts remain to be explored..

  12. 15. svi 2019.

    Como era de esperar, después de Meltdown, Spectre y L1TF, tenemos nuevos ataques explotando vulnerabilidades en la microarquitectura de los procesadores. Voy a explicar un poco en qué consisten

    Prikaži ovu nit
  13. Here's a longer technical deep dive explainer of (Microarchitectural Data Sampling):

  14. 14. svi 2019.

    Wanna know about and class of vulnerabilities? Come to the AMSec workshop in Amsterdam tomorrow and learn about how your Intel CPUs shout out your deepest secrets.

  15. 14. svi 2019.

    Very proud of my PhD student , who discovered , a new type of u-arch vulnerability in CPUs. Read the details here: . I'm excited we can finally talk about it, after a long embargo of 11M. Thanks to for allowing a merge.

  16. 14. svi 2019.

    Hi, everyone! and from will give an in-depth talk on the new hardware vulnerability at OFFZONE 2019.

  17. 14. svi 2019.

    Watch (or ) leak the root password by side-channeling the internal operations of the CPU!

    Prikaži ovu nit
  18. 4. ožu 2019.

    🚨 for 🚨 ignore tx-messages fro thepeosclaim and their link. are we on to this account? 👆 -me of these please 🙏🏻

  19. 27. velj 2019.

    We're getting pretty close to releasing !

  20. 19. velj 2019.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.