Anil Kurmus

@kurmus

Systems Security . Speculative exec, kernels, filesystems, exploitation, mitigations, applied crypto. Opinions are mine only. 0x381A1757

Zurich
Vrijeme pridruživanja: rujan 2008.

Tweetovi

Blokirali ste korisnika/cu @kurmus

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @kurmus

  1. proslijedio/la je Tweet
    30. sij
    Poništi
  2. 24. sij

    It's 2020 and people are still working on kernel CFI. The (Linux) kernel has just too much access for CFI to be a reasonable tradeoff. For example it has been shown that one can gain privesc by corrupting targeted FS blocks . <Ostrich sticks head in sand>

    Poništi
  3. proslijedio/la je Tweet
    15. sij

    The paper submission deadline for is in one month! Great conference at a great location (Lisbon). Check the

    Poništi
  4. proslijedio/la je Tweet
    Odgovor korisniku/ci

    The OpenBSD thing reminds me of this paper but our system would not break any runtime as it would just verify that the syscall actually exists in the binary on disc

    Poništi
  5. proslijedio/la je Tweet
    4. pro 2019.

    We compiled a long list of Threats to Validity/Relevance in Security Research for our students, building on common sense & our papers on malware experiments and on benchmarking (and inspired by 's excellent blog). Perhaps useful for others?

    Poništi
  6. proslijedio/la je Tweet
    2. pro 2019.

    Is there any public list/repository/whatever in which the instructions for different archs are semantically divided into categories? Something like: intel_64_arithmetic = ["add", "sub", ...] intel_64_stack = ["pop", "push", ...]

    Poništi
  7. 2. pro 2019.

    1d690299dc9a0ce97a7fffc5cb3e53bdc9c0004ef7f57f377957cafb8a0d0ae5

    Poništi
  8. 28. stu 2019.

    This tool has proven to be very useful for us in analyzing speculative execution attacks. We've open sourced it, so give it a try if you're working in this field and let know what you think :)

    Poništi
  9. proslijedio/la je Tweet
    7. stu 2019.

    Just turned 30 y-old in Tokyo meanwhile speaking about speculative exec attacks at with and celebrating with lots of great folks! Special thanks to for inviting us, organizing such great event and for the amazing surprise cake! Indeed an amazing day!

    Poništi
  10. proslijedio/la je Tweet
    31. lis 2019.

    So the Rust compiler generates the following piece of assembly, which seems to copy data from a location in the stack to a new location in the stack, and then back to the original location [thread].

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    13. lis 2019.

    The complete program for ACM CCS 2019, workshops, and social events is up!

    Poništi
  12. proslijedio/la je Tweet
    13. kol 2019.
    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    13. kol 2019.

    Uploaded the slides for my WOOT'19 talk. Thanks and for inviting me. If you're doing offensive research, I encourage you to submit your work to WOOT next year. It's great!

    Poništi
  14. proslijedio/la je Tweet
    13. kol 2019.
    Poništi
  15. proslijedio/la je Tweet
    12. kol 2019.

    It's been one year since we launched our continuous bug-finding competition, ! We've spent the past year learning all we can about bugs and bug-finding and tomorrow morning, I'll be presenting some of what we've found at

    Poništi
  16. proslijedio/la je Tweet
    12. kol 2019.

    “We also verify that hardening the configuration of applicable mitigations (STIBP in this case) is an effective mitigation, making a case for their wider adoption.”

    Poništi
  17. 12. kol 2019.
    Poništi
  18. proslijedio/la je Tweet

    Followed by Mambretti et al.'s Two methods for exploiting speculative control flow hijacks

    Prikaži ovu nit
    Poništi
  19. 9. kol 2019.

    Erratum: Matthias Neugschwandtner is on twitter :)

    Prikaži ovu nit
    Poništi
  20. 9. kol 2019.

    For those into speculative execution attacks, we have two new exploitation methods using the I$ and BTB as side channels. Come and listen to 's talk on Monday at . /cc @tracenbreak

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·