Michael Schwarz

@misc0110

PostDoc in InfoSec @ . Side-channel attacks. Exploiting microarchitectures.

Joined March 2014

Tweets

You blocked @misc0110

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @misc0110

  1. Pinned Tweet
    16 Dec 2019

    My PhD thesis "Software-based Side-Channel Attacks and Defenses in Restricted Environments" is finally available online: I really enjoyed my last 3 years working on it, also due to my great colleagues, especially , , and

    Undo
  2. Retweeted
    Apr 9

    Considering the COVID-19 situation, a decision has been made to make DIMVA2020 a video-based digital conference. The dates will be the same and proceedings will be published as planned. Registration will not be required to attend the conference. More details will be given soon.

    Undo
  3. Retweeted
    Apr 9

    Daniel Gruss (), Daniel Moghimi (), and Jo Van Bulck () will talk about "LVI: Hijacking Transient Execution with Load Value Injection" during Virtual Con. 30th April & 1st May | 10:00 am to 1:00 pm PDT Register:

    Show this thread
    Undo
  4. Retweeted
    Mar 18

    Inject attacker's data via hidden CPU buffers & hijack transient execution "Unlike all previous -type attacks, LVI cannot be transparently mitigated in existing processors & necessitates expensive sw patches, which may slow down Intel SGX enclave computations 2-19x"

    Show this thread
    Undo
  5. Retweeted

    After , and : LVI is a new class of attacks exploiting microarchitectural flaws in modern processors discovered by , , and more! Read more (and watch the amazing cinematic trailer!) on

    Undo
  6. Retweeted
    Mar 14

    November 2017 Lukas Lamster signed up for this Bachelor project that was advertised on our website. At first, he got no bit flips on DDR4 with TRR. Turned out there were more than enough bit flips, he was just looking at too few rows. Great result :)

    Bachelor Project proposal from our website
    Undo
  7. Retweeted
    Mar 12

    The Brutal Performance Impact From Mitigating The Vulnerability A number of workloads can be at ~10% of their pre-mitigated performance, e.g. OpenSSL and others.

    Show this thread
    Undo
  8. Retweeted
    Mar 11
    Show this thread
    Undo
  9. Retweeted
    Mar 11

    Security researchers at TU Graz together with an international team have once again uncovered a serious security hole in computer processors. With the new security hole published under the name "Load Value Injection", there is another method to read out sensitive data.

    Show this thread
    Undo
  10. Mar 11

    An increase from 15 to 49529 LFENCEs in the SGX quoting enclave.

    Undo
  11. Retweeted
    Mar 11

    Interestingly, is the inverse of LVI-NULL. Instead of injecting zero values, we retrieve them via a Meltdown-type attack to break KASLR.

    Undo
  12. Retweeted
    Mar 10

    Load value injection ( ) is a pretty neat attack by . Also can't argue with the quality of the trailer! :'-D

    Undo
  13. Retweeted
    Mar 10

    To put any doubts about the funding of that paper on AMD CPU vulnerabilities to rest, the new LVI research has been funded by Intel, AMD, and ARM.

    Undo
  14. Mar 10

    Intel now officially calls these attacks (, , , , ...) transient execution attacks, and not speculative execution side-channel attacks anymore

    Undo
  15. Retweeted
    Mar 10
    Undo
  16. Retweeted

    LVI Attacks 🔥 CVE-2020-0551 A new hardware affecting modern CPUs puts virtual workloads and data centers at risk of . Read details: It involves reversely exploiting Meltdown and MDS-type flaws to bypass existing defenses.

    Show this thread
    Undo
  17. Retweeted
    Mar 10

    One part to highlight, the "ret" instruction is not safe to use anymore. Hard to imagine...

    Undo
  18. Retweeted
    Mar 10

    Intel CPUs vulnerable to new LVI attacks - LVI attack lets an attacker inject values in the speculative execution process (Meltdown only let you read data) - Intel released patched today - Researchers say chip hardware upgrades will also be needed

    Show this thread
    Undo
  19. Retweeted
    Mar 10

    This was a lot of fun! See the original trailer (for Inception, great movie!) here: Also, thanks a lot to Zack Hemsey for permitting use of his background music! Shout out to "We may have gotten a little carried away."

    Show this thread
    Undo
  20. Retweeted
    Mar 10
    Undo
  21. Retweeted
    Mar 10

    We present Load Value Injection : a new transient-execution attack class; defeats defenses; turns around to *inject* attacker data into victim loads. cc

    Show this thread
    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·