Tweetovi

Blokirali ste korisnika/cu @heartever

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @heartever

  1. proslijedio/la je Tweet
    28. sij
    Odgovor korisnicima

    No, it was the same for ZombieLoad, this is also described in the paper from November

    Poništi
  2. proslijedio/la je Tweet
    14. sij

    Our NDSS paper, ABSynthe is now online: ABSynthe takes a target program and a microarchitecture and automatically synthesizes new side channels. With cool leakage maps!

    Poništi
  3. proslijedio/la je Tweet
    21. pro 2019.

    After extensive community feedback, Oakland is moving to quarterly submission deadlines . The submission dates for S&P 2021 are now available at: . Honored to co-chair the conference with .

    Poništi
  4. 1. pro 2019.

    Very interesting. We come across the issue of defining TCB properly recently.

    Poništi
  5. proslijedio/la je Tweet
    13. stu 2019.

    nanoBench: A Low-Overhead Tool for Running Microbenchmarks on x86 Systems nanoBench Cache Analyzer: Results: Andreas Abel (), Jan Reineke

    Poništi
  6. proslijedio/la je Tweet

    Black-clad rioters in Hong Kong set a resident who disagree with them on fire. The victim has been sent to the hospital.

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  7. proslijedio/la je Tweet
    8. stu 2019.

    Exploiting Race Conditions Using the Scheduler by from P0 Detailed explanation of 3 exploits and associated techniques involving scheduler, preemption, stale TLB, fuse, userfaultfd and more to make hard to trigger races deterministic. 2/3

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    7. stu 2019.

    AMD quietly announces some form of integrity protection for SEV: SEV-SNP (Secure Nested Paging).

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    3. stu 2019.

    I couldn't find a working RIDL exploit on the internet so I made it a challenge at the . 5/10 teams solved it in under 24h. I heard at least will publish an exploit soon, stay tuned ;)

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    14. lis 2019.

    CfP FOSDEM'20 Hardware-aided Trusted Computing DevRoom a new, TEE-related, DevRoom at .

    Poništi
  11. proslijedio/la je Tweet
    27. ruj 2019.

    official 10th Generation Intel® Core™ Processor Instruction Throughput and Latency list

    Poništi
  12. proslijedio/la je Tweet
    27. ruj 2019.

    released the 42nd edition of the x86/x64 Software Optimization Manual with client and server cores

    Poništi
  13. 19. kol 2019.

    Amazing tools and writing to understand cpu internals

    Poništi
  14. proslijedio/la je Tweet
    5. kol 2019.

    Major update of Vector Class Library C++17, AVX512F/BW/DQ/VL/VBMI/VBMI2, Apache 2.0, Add-ons

    Poništi
  15. proslijedio/la je Tweet

    Left: MIT computer scientist Katie Bouman w/stacks of hard drives of black hole image data. Right: MIT computer scientist Margaret Hamilton w/the code she wrote that helped put a man on the moon. (image credit )

    Poništi
  16. proslijedio/la je Tweet
    28. ožu 2019.

    PoC||GTFO 0x19 is out! It's a PDF, a ZIP, and an HTML page: If you drop it on itself in a browser, it can give you a PDF viewer, a video and a PNG explaining the whole file structure. All these files have the same MD5.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    24. ožu 2019.

    Wow! China Airport face recognition systems to help you check your flight status and find the way to your gate. Note I did not input anything, it accurately identified my full flight information from my face!

    Poništi
  18. proslijedio/la je Tweet

    i just learned from that the cryptographers who wrote the "How To Explain Zero-Knowledge Protocols to Your Children" paper listed all their kids as coauthors and it's really adorable

    Poništi
  19. 7. ožu 2019.

    Hiding the cache state is not enough to defeat Spectre.

    Poništi
  20. proslijedio/la je Tweet
    3. ožu 2019.

    "Spoiler", a new microarchitectural attack due to speculative execution is out: Exploits the buggy speculation inside the memory order buffer joint work by SaadIslam MoritzKrebbel

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·