Pietro Frigo

@pit_frg

Security researcher. PhD student

Vrijeme pridruživanja: kolovoz 2010.

Tweetovi

Blokirali ste korisnika/cu @pit_frg

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @pit_frg

  1. proslijedio/la je Tweet
    10. ruj 2019.

    Introducing : the first PRIME+PROBE cache attack over the network using technology. Here is NetCAT leaking keystrokes from a victim SSH client in real-time: Dennis

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    9. kol 2019.

    I am looking for a PhD student working with me on systems security and privacy-related topics starting this fall! Details: Application deadline: August 29, 2019

    Poništi
  3. proslijedio/la je Tweet
    24. svi 2019.

    Now online ’s great talk at about the attack: Rogue In-Flight Data Load. Cc

    Poništi
  4. proslijedio/la je Tweet
    21. svi 2019.

    Congratulations for winning the best practical paper award at

    Poništi
  5. proslijedio/la je Tweet
    21. svi 2019.

    Now at just received the Distinguished Practical Paper Award for their paper about rowhammer attack on ECC memory. Cc Congratulations 🎉

    Poništi
  6. proslijedio/la je Tweet
    21. svi 2019.

    Distinguished practical paper award goes to “Exploiting Correcting Codes: On the Effectiveness of ECC Memory Against Rowhammer Attacks”

    Poništi
  7. proslijedio/la je Tweet

    "Privilege levels are just a social construct" Yes!!! Exactly!

    Poništi
  8. proslijedio/la je Tweet
    20. svi 2019.

    's presents , the vulnerability in Intel CPUs that allows unprivileged attackers to leak sensitive information across *any* security boundary. Even from javascript.

    Poništi
  9. proslijedio/la je Tweet
    20. svi 2019.

    Next presentation at : "RIDL: Rogue In-Flight Data Load", a cool new microarchitectural attack from :

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    20. svi 2019.

    Here is explaining that contrary to what many people thought, *ECC memory is not enough to stop attacks* at conference.

    Poništi
  11. proslijedio/la je Tweet
    20. svi 2019.

    Now at HW security session: talking Exploiting Correcting Codes: On the effectiveness of ECC Memory Against Attacks

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    16. svi 2019.
    Odgovor korisnicima

    This story is blatantly inaccurate. The dispute was over the amount of bounty when compared to similar previous vulnerabilities. We held Intel's embargo for a long time so that they can develop fixes and release them in time.

    Poništi
  13. proslijedio/la je Tweet
    14. svi 2019.

    Anyone who wants to hear more about , 's at AMSec Symposium is free and open to everyone:

    Poništi
  14. 14. svi 2019.

    Really cool project! So long and thanks for all the fish

    Poništi
  15. proslijedio/la je Tweet
    14. svi 2019.

    And it only took a year of embargo to disclose this demo to the public! Check out more cool demos at !

    Poništi
  16. 3. svi 2018.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·