Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
Blokirali ste korisnika/cu @inf_0_
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @inf_0_
-
Keegan Ryan proslijedio/la je Tweet
Embargo ends -
#PlunderVolt is public: https://plundervolt.com/ It allows to induce faults into computations in SGX, breaking crypto and corrupting memory. https://www.youtube.com/watch?v=In3B9L5Jyo4 … Great collaboration with Kit Murdock,@sublevado,@halfdoof,@jovanbulck, Frank Piessens!!Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Keegan Ryan proslijedio/la je Tweet
We present
#plundervolt TL;DR First ever fault injection attack on Intel SGX enclaves. Abuses an undocumented software-based interface to undervolt the CPU. Extract full crypto keys and trigger memory safety violations in bug-free code. Read the paper at http://plundervolt.com pic.twitter.com/ozuCF4Vzhh
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Keegan Ryan proslijedio/la je Tweet
Join our ZombieLoad talk tomorrow at 9:00am at
@acm_ccs - loads of insights and new stuff even if you've already read the paper#ZombieLoad#ccs2019#ccs19 /cc@mlqxyz@danielmgmi@jovanbulck@gonzodaruler@blitzclone@lavadospic.twitter.com/xcS3CyvUfA
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Keegan Ryan proslijedio/la je Tweet
#ZombieLoad is back: With our new variant, the#ZombieLoad attack can be mounted on recent#MDS-resistant Intel CPUs! Checkout our updated paper on https://zombieloadattack.com to find out more! /cc@misc0110@danielmgmi@jovanbulck@blitzclone@gonzodaruler@lavadospic.twitter.com/x69pid7bx5
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Keegan Ryan proslijedio/la je Tweet
Another patch Tuesday surprise: Local/Remote timing side-channel attacks on Trusted Platform Modules (TPMs) A CC4+ Certified TPM hardware and Intel PTT (firmware-TPM) are affected.
@danielmgmi@berksunar@tomcrypt@nadiaheninger http://tpm.fail#sidechannel#TPMpic.twitter.com/0ezyhf22QT
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Keegan Ryan proslijedio/la je Tweet
Announcing RAMBleed, a new attack that exploits Rowhammer to leak secret data directly from DRAM. Works also on ECC memory. Joint work with Andrew Kwong, Daniel Genkin and
@lavados https://rambleed.comHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Keegan Ryan proslijedio/la je Tweet
TECHNICAL ADVISORY: Private Key Extraction from
#Qualcomm Hardware-backed Keystores. Read more: http://bit.ly/2Zvg8h2@inf_0_pic.twitter.com/cA8L4S1Mai
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
I used high-powered branch-predictor and memory side channels to extract private keys from Qualcomm's TrustZone keystore. Check it out: https://www.nccgroup.trust/us/our-research/private-key-extraction-qualcomm-keystore/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Keegan Ryan proslijedio/la je Tweet
"Spoiler", a new microarchitectural attack due to speculative execution is out: Exploits the buggy speculation inside the memory order buffer
#sidechannel https://arxiv.org/pdf/1903.00446.pdf … joint work by SaadIslam@danielmgmi@duckie110189 MoritzKrebbel@beeeerk_wpi@tomcrypt@berksunarPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Spectre on a TV: the results of my recent hardware mini project are now public! Read about it at https://www.nccgroup.trust/us/about-us/newsroom-and-events/blog/2018/december/spectre-on-a-television/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Fantastic work here! BTB side channels, lattices, and Bleichenbacher's attack. What more could you want?https://twitter.com/cryptodavidw/status/1068535680408657920 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Keegan Ryan proslijedio/la je Tweet
November DC206 Meeting at
@the_black_lodge : 11/18: Keegan Ryan, Microarchitectural Attacks on Trusted Execution Environments https://www.dc206.org/?p=275#Seattle#DC206@inf_0_,@defcongroupsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Keegan Ryan proslijedio/la je Tweet
CVE-2018-5407: new side-channel vulnerability on SMT/Hyper-Threading architectures. Check some info about our new
#sidechannel non-cache dependent. Paper coming soon.#portsmash#uarch#attack#infosec https://seclists.org/oss-sec/2018/q4/123 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Keegan Ryan proslijedio/la je Tweet
Following seven months of responsible disclosure, we are happy to announce that our Foreshadow attack is now public https://foreshadowattack.com . Work with
@MarinaMinkin@ofir1942@jovanbulck@raoul_strackx@bariskasikci@ThomasWenisch Mark Silberstein, Daniel Genkin, Frank Piessenspic.twitter.com/T8GkpURJs5
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Keegan Ryan proslijedio/la je Tweet
time but not data flow is unsafe; (c) coarse-grained access patterns leak more than was previously thought. But don't panic, while a cool attack,
#tlbleed is not the new#Spectre. Full details and paper out next week. cc@vu5ec@c_giuffrida@gober@herbertbos 2/2Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
What's better than a key extraction bug in a major crypto library? How about a key extraction bug in 11 major crypto libraries? My latest research: https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Keegan Ryan proslijedio/la je Tweet
Variant 4 and 3a have dropped, with the appropriate Intel Whitepaper updates. The RSRE one is the coolest one to me. https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html …https://twitter.com/projectzerobugs/status/998669996677984256 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Keegan Ryan proslijedio/la je Tweet
Final selection of Recon Talks has finally been announced https://recon.cx/2018/montreal/
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Keegan Ryan proslijedio/la je Tweet
Our cache+lattice attack on SGX EPID is now public https://tches.iacr.org/index.php/TCHES/article/view/879 …pic.twitter.com/zREwy7gGNG
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Great new side channel research on abusing the directional branch predictor. Looking forward to trying this out! http://www.cs.ucr.edu/~nael/pubs/asplos18.pdf …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

Into embedded systems, cryptography, and side channel attacks.
Pic edited from stream of my 34c3 talk (CC BY 3.0 DE)