Keegan Ryan

@inf_0_

I like breaking things. 🔑🔫 Into embedded systems, cryptography, and side channel attacks. Pic edited from stream of my 34c3 talk (CC BY 3.0 DE)

Vrijeme pridruživanja: kolovoz 2016.

Tweetovi

Blokirali ste korisnika/cu @inf_0_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @inf_0_

  1. proslijedio/la je Tweet
    10. pro 2019.

    Embargo ends - is public: It allows to induce faults into computations in SGX, breaking crypto and corrupting memory. Great collaboration with Kit Murdock, , , , Frank Piessens!!

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    10. pro 2019.

    We present TL;DR First ever fault injection attack on Intel SGX enclaves. Abuses an undocumented software-based interface to undervolt the CPU. Extract full crypto keys and trigger memory safety violations in bug-free code. Read the paper at

    , , i još njih 3
    Poništi
  3. proslijedio/la je Tweet
    12. stu 2019.

    Join our ZombieLoad talk tomorrow at 9:00am at - loads of insights and new stuff even if you've already read the paper /cc

    Poništi
  4. proslijedio/la je Tweet
    12. stu 2019.

    is back: With our new variant, the attack can be mounted on recent -resistant Intel CPUs! Checkout our updated paper on to find out more! /cc

    Poništi
  5. proslijedio/la je Tweet
    12. stu 2019.

    Another patch Tuesday surprise: Local/Remote timing side-channel attacks on Trusted Platform Modules (TPMs) A CC4+ Certified TPM hardware and Intel PTT (firmware-TPM) are affected.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    11. lip 2019.

    Announcing RAMBleed, a new attack that exploits Rowhammer to leak secret data directly from DRAM. Works also on ECC memory. Joint work with Andrew Kwong, Daniel Genkin and

    Poništi
  7. proslijedio/la je Tweet

    TECHNICAL ADVISORY: Private Key Extraction from Hardware-backed Keystores. Read more:

    Poništi
  8. 23. tra 2019.

    I used high-powered branch-predictor and memory side channels to extract private keys from Qualcomm's TrustZone keystore. Check it out:

    Poništi
  9. proslijedio/la je Tweet
    3. ožu 2019.

    "Spoiler", a new microarchitectural attack due to speculative execution is out: Exploits the buggy speculation inside the memory order buffer joint work by SaadIslam MoritzKrebbel

    Prikaži ovu nit
    Poništi
  10. 4. pro 2018.

    Spectre on a TV: the results of my recent hardware mini project are now public! Read about it at

    Poništi
  11. 30. stu 2018.

    Fantastic work here! BTB side channels, lattices, and Bleichenbacher's attack. What more could you want?

    Poništi
  12. proslijedio/la je Tweet
    2. stu 2018.

    November DC206 Meeting at : 11/18: Keegan Ryan, Microarchitectural Attacks on Trusted Execution Environments ,

    Poništi
  13. proslijedio/la je Tweet
    2. stu 2018.

    CVE-2018-5407: new side-channel vulnerability on SMT/Hyper-Threading architectures. Check some info about our new non-cache dependent. Paper coming soon.

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    14. kol 2018.

    Following seven months of responsible disclosure, we are happy to announce that our Foreshadow attack is now public . Work with Mark Silberstein, Daniel Genkin, Frank Piessens

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    22. lip 2018.

    time but not data flow is unsafe; (c) coarse-grained access patterns leak more than was previously thought. But don't panic, while a cool attack, is not the new . Full details and paper out next week. cc 2/2

    Prikaži ovu nit
    Poništi
  16. 13. lip 2018.

    What's better than a key extraction bug in a major crypto library? How about a key extraction bug in 11 major crypto libraries? My latest research:

    Poništi
  17. proslijedio/la je Tweet
    21. svi 2018.

    Variant 4 and 3a have dropped, with the appropriate Intel Whitepaper updates. The RSRE one is the coolest one to me.

    Poništi
  18. proslijedio/la je Tweet
    15. svi 2018.

    Final selection of Recon Talks has finally been announced

    Poništi
  19. proslijedio/la je Tweet
    9. svi 2018.
    Poništi
  20. 28. ožu 2018.

    Great new side channel research on abusing the directional branch predictor. Looking forward to trying this out!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·