Michael Schwarz

@misc0110

PostDoc in InfoSec @ . Side-channel attacks. Exploiting microarchitectures.

Vrijeme pridruživanja: ožujak 2014.

Tweetovi

Blokirali ste korisnika/cu @misc0110

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @misc0110

  1. Prikvačeni tweet
    16. pro 2019.

    My PhD thesis "Software-based Side-Channel Attacks and Defenses in Restricted Environments" is finally available online: I really enjoyed my last 3 years working on it, also due to my great colleagues, especially , , and

    Poništi
  2. proslijedio/la je Tweet
    prije 14 sati

    & outline challenges for future research on Meltdown attacks and mitigations and will discuss the short-term and long-term implications of Meltdown for hardware vendors, software vendors, and users at this Briefing

    Poništi
  3. proslijedio/la je Tweet
    27. sij

    With L1D Eviction Sampling, we show that the mitigations against -type attacks are insufficient and data can still be leaked with ! Check out to find out more! /cc

    Poništi
  4. proslijedio/la je Tweet
    26. sij

    & & dig into Platform Security in their Briefing ‘Store-to-Leak Forwarding: There and Back Again’.

    Poništi
  5. proslijedio/la je Tweet
    23. sij

    The Security Circus 2019 update is now online:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    18. sij

    Get an overview of microarchitectural attacks and defenses, including ways of mounting well-known microarchitectural attacks without relying on any hardware effects in Briefing by , &

    Poništi
  7. proslijedio/la je Tweet
    18. sij

    In this talk, & show that Meltdown is still an issue on modern CPUs and present ZombieLoad - a Meltdown-type attack which leaks data across multiple privilege boundaries. Register now to save on a Briefings pass to hear this talk and more

    Poništi
  8. proslijedio/la je Tweet
    6. sij

    The DIMVA 2020 Call for Papers is out. Submission deadline: 16/02/2020. Get the :

    Poništi
  9. proslijedio/la je Tweet
    6. sij

    will take place in Lisbon, Portugal! Send us your best work, you have plenty of time before the deadline on February 16!

    Poništi
  10. proslijedio/la je Tweet
    29. pro 2019.

    If you've seen our talks, please leave us a feedback so that we can improve future talks. For here: And for here: It helps us if you add whether you've seen the talk via stream or live.

    Poništi
  11. proslijedio/la je Tweet
    28. pro 2019.
    Poništi
  12. proslijedio/la je Tweet
    10. pro 2019.

    Embargo ends - is public: It allows to induce faults into computations in SGX, breaking crypto and corrupting memory. Great collaboration with Kit Murdock, , , , Frank Piessens!!

    Prikaži ovu nit
    Poništi
  13. 21. stu 2019.
    Poništi
  14. proslijedio/la je Tweet
    14. stu 2019.

    CCS 2019 is over for me. Lots of fantastic research, talks and a great hallway track. Thanks everybody.

    Poništi
  15. 12. stu 2019.

    I can say the same, that was a great collaboration!

    Poništi
  16. proslijedio/la je Tweet
    12. stu 2019.

    With issues during some disclosures, Intel took our concerns *very* seriously and improved the communication and handling of issues *substantially* over the past year. This deserves recognition and I want to thank Intel for improving the process.

    Poništi
  17. proslijedio/la je Tweet
    12. stu 2019.

    Yes is back with two surprises: 1. A new variant, acronymed "TAA" that works on MDS-resistant silicon (CCL) 2. The VERW software sequence mitigation is broken.

    Poništi
  18. proslijedio/la je Tweet
    12. stu 2019.

    Intel's Cascade Lake CPUs impacted by new Zombieload v2 attack

    Poništi
  19. proslijedio/la je Tweet
    12. stu 2019.

    In addition, the research team also found out that the VERW instruction-set -- mitigations that Intel recommended in handling Zombieload and the other MDS attacks -- also didn't work as intended.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    12. stu 2019.

    After extended embargo, excited to announce our latest paper "A tale of two worlds: Assessing the vulnerability of enclave shielding runtimes". cc:

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·