Moritz Lipp

@mlqxyz

PhD Candidate in Information Security @ , Side-Channel Attacks & Exploiting Microarchitecture & Apiculture

Vrijeme pridruživanja: studeni 2015.

Tweetovi

Blokirali ste korisnika/cu @mlqxyz

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mlqxyz

  1. Prikvačeni tweet
    12. stu 2019.

    is back: With our new variant, the attack can be mounted on recent -resistant Intel CPUs! Checkout our updated paper on to find out more! /cc

    Poništi
  2. proslijedio/la je Tweet
    28. sij
    Odgovor korisnicima

    No, it was the same for ZombieLoad, this is also described in the paper from November

    Poništi
  3. 27. sij

    With L1D Eviction Sampling, we show that the mitigations against -type attacks are insufficient and data can still be leaked with ! Check out to find out more! /cc

    Poništi
  4. proslijedio/la je Tweet
    18. sij

    In this talk, & show that Meltdown is still an issue on modern CPUs and present ZombieLoad - a Meltdown-type attack which leaks data across multiple privilege boundaries. Register now to save on a Briefings pass to hear this talk and more

    Poništi
  5. 28. pro 2019.
    Poništi
  6. proslijedio/la je Tweet
    10. pro 2019.

    Embargo ends - is public: It allows to induce faults into computations in SGX, breaking crypto and corrupting memory. Great collaboration with Kit Murdock, , , , Frank Piessens!!

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    12. stu 2019.

    Another patch Tuesday surprise: Local/Remote timing side-channel attacks on Trusted Platform Modules (TPMs) A CC4+ Certified TPM hardware and Intel PTT (firmware-TPM) are affected.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    12. stu 2019.

    With issues during some disclosures, Intel took our concerns *very* seriously and improved the communication and handling of issues *substantially* over the past year. This deserves recognition and I want to thank Intel for improving the process.

    Poništi
  9. proslijedio/la je Tweet
    12. stu 2019.

    Security researchers have discovered a new version of the Zombieload vulnerability. Zombieload v2 impacts Intel CPUs released since 2013, if they support the Intel STX instruction-set.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet

    New: A new 'Zombieload' vulnerability has been found — this time in Intel's newest chip family, Cascade Lake. The researchers said Intel's efforts to change the chip design to protect against these kinds of attacks were “not sufficient.”

    Poništi
  11. proslijedio/la je Tweet
    12. stu 2019.

    Join our ZombieLoad talk tomorrow at 9:00am at - loads of insights and new stuff even if you've already read the paper /cc

    Poništi
  12. proslijedio/la je Tweet
    21. svi 2019.
    Poništi
  13. proslijedio/la je Tweet
    17. svi 2019.

    Using to leak the root password hash from /etc/shadow within a few minutes ( for high-resolution version in original speed)

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    14. svi 2019.

    After and : TU Graz researchers discover new security flaws. impacts on the security of processors. Patches developed last year are ineffective, new updates will be necessary.

    Poništi
  15. 14. svi 2019.
    Poništi
  16. proslijedio/la je Tweet
    14. svi 2019.
    Poništi
  17. proslijedio/la je Tweet
    14. svi 2019.

    : a new attack on CPUs leaking data which is currently loaded from memory - across programs, hyperthreads, SGX, and VMs. /cc

    Poništi
  18. proslijedio/la je Tweet
    31. sij 2019.

    Learn how to write and mount and from scratch, attack crypto algorithms with cache attacks, and more at our training "Microarchitectural Attacks" this year:

    Poništi
  19. proslijedio/la je Tweet
    28. pro 2018.
    Poništi
  20. proslijedio/la je Tweet
    28. pro 2018.
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·