Rezultati pretraživanja
  1. 20. velj 2019.

    Software timer incrementing a counter out-performs rdtsc instruction. talk by

    Prikaži ovu nit
  2. 7. svi 2018.

    More papers for fans out there who liked our "Grand Pwning Unit"! "Malicious Management Unit" and "Translation Leak-aside Buffer" use your MMU and TLB in novel ways to bypass existing side channel defenses. Keep tuned!

  3. 2. stu 2018.

    CVE-2018-5407: new side-channel vulnerability on SMT/Hyper-Threading architectures. Check some info about our new non-cache dependent. Paper coming soon.

    Prikaži ovu nit
  4. 17. stu 2018.

    Current status: just finished this RF amplified probe to discover new entry for side channel based attack with

  5. 19. ožu 2018.

    Thomas and Victor are thrilled to announce the new website of NinjaLab:

  6. 3. ožu 2019.

    "Spoiler", a new microarchitectural attack due to speculative execution is out: Exploits the buggy speculation inside the memory order buffer joint work by SaadIslam MoritzKrebbel

    Prikaži ovu nit
  7. 26. ruj 2019.

    Following the official release announcement of eShard's open source library at CHES 2019, we are pleased to share a blog post presenting the Scared library. The post is available on eShard blog and Medium

    Prikaži ovu nit
  8. 27. ožu 2019.
  9. 28. ožu 2019.

    Content and Status Types detector to bypass 𝚇-𝙲𝚘𝚗𝚝𝚎𝚗𝚝-𝚃𝚢𝚙𝚎-𝙾𝚙𝚝𝚒𝚘𝚗𝚜: 𝚗𝚘𝚜𝚗𝚒𝚏𝚏 header in

    Prikaži ovu nit
  10. 4. sij 2018.
  11. 12. stu 2019.

    Another patch Tuesday surprise: Local/Remote timing side-channel attacks on Trusted Platform Modules (TPMs) A CC4+ Certified TPM hardware and Intel PTT (firmware-TPM) are affected.

    Prikaži ovu nit
  12. 10. stu 2018.

    MemJam (Extended Version), Hyper-threaded, intra-cache line on major Intel got published on International Journal of Parallel Programming: More data, attack on constant-time 3DES, mitigation section and full responsible disclosure added.

    Prikaži ovu nit
  13. 10. tra 2015.

    Extracting the Private Key from a TREZOR (with a $70 oscilloscope)

  14. 9. sij 2019.
  15. Remember, if you're working on security research, don't use your real name in a domain registration, or it'll be trivial for me to watch you with tools like: 😘

  16. 12. velj 2018.
  17. 15. lis 2019.

    Panda2019 is coming soon! will present the latest progress in Deep Learning SCA. Visit us to see how the latest version of esDynamic software and training can empower your experts, and make your testing and analyses at the right level.

  18. 25. lis 2018.

    The return of CHALICE, collecting every drop of information leaked through the CPU cache for more comprehensive set of attacks than ever, including the one used for . To appear in ACM Transactions on Embedded Computing Systems (TECS)

  19. 21. pro 2019.
  20. 7. velj 2018.

    Proud to be a speaker this year 😄 Conference about + Quickie about got accepted! 🙌 A busy week in perspective w/ ! #2days2confs#3talks

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.