Tweets

You blocked @vu5ec

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @vu5ec

  1. Jan 27

    Another day, another embargo and addendum! “New” (not really!) variants of the day: L1D evictions (Fig 6, RIDL paper) or and vector registers or . See . As a bonus: a faster RIDL exploit that leaks a root hash in 4s:

    Undo
  2. Jan 14

    Our NDSS paper, ABSynthe is now online: ABSynthe takes a target program and a microarchitecture and automatically synthesizes new side channels. With cool leakage maps!

    Undo
  3. 4 Dec 2019

    We compiled a long list of Threats to Validity/Relevance in Security Research for our students, building on common sense & our papers on malware experiments and on benchmarking (and inspired by 's excellent blog). Perhaps useful for others?

    Undo
  4. Retweeted

    Intel is still working to close a potentially damaging loophole in its chip architecture that could allow hackers to steal data, almost two years after the issue was disclosed

    Undo
  5. Retweeted
    12 Nov 2019
    Undo
  6. Retweeted

    In other news Rogue In-Flight Data Load won the 2nd place for Applied Research at 2019. I met many nice and interesting people at the poster presentation :).

    Undo
  7. Retweeted

    When Intel released patch for CPU vulns last May, it said the patch fixed all the vulns. But researchers at say this isn't true and Intel knew it. Intel asked them not to disclose this and to alter conf. paper about the vulns. My story for

    Show this thread
    Undo
  8. 12 Nov 2019

    Long embargos without transparency hurt endusers who remain unknowingly exposed to serious flaws. covers our saga with in her piece. remains a problem after 1+ year, 2 flawed patches and 2 embargos (+1 still ongoing).

    Undo
  9. Retweeted
    Undo
  10. Retweeted
    12 Nov 2019

    deserves a lot of credit for this. She is better at finding variants than engineers. Also kudos to Jonas Theis, our master student who put together the fast /etc/shadow exploit as a term project!

    Undo
  11. Retweeted

    Microarchitectural processor vulnerabilities like Spectre and Meltdown were bad, but at least Intel fixed them promptly. Now it seems another deep-seated chip flaw lingered in Intel’s silicon for more than a year after the company was warned about it.

    Undo
  12. Retweeted
    12 Nov 2019

    Intel are disclosing 77 vulns today (), some in their CPUs - HW bugs are always painful, but hardware is never perfect. Happy to see TAA disclosed after I found it >1y ago, but @dkg0414's page size issue looks a lot more painful. JCC icache errata too.

    Undo
  13. 12 Nov 2019

    Video shows leaking root password hash in default settings in 30s!

    Show this thread
    Undo
  14. 12 Nov 2019

    Today, last-minute embargo on parts of ends. The "new" is just a variant we reported in Sep 2018, and it leaks your root hashes fast! Latest Intel patches remain broken. See for addendum and exploits.

    Show this thread
    Undo
  15. Retweeted
    13 Oct 2019

    @vu5sec Great line-up for our VUSec/AMSec Workshop on System Security: Michael Franz (UC Irvine) Mathias Payer (EPFL) Stijn Volckaert (KU Leuven) Lucas Davi (U. Duisburg) Stefan Brunthaler ( U. der Bundeswehr) Robert Buhren (TU Berlin) Free/open for all.

    Show this thread
    Undo
  16. Retweeted
    26 Sep 2019

    Great start to with keynoting

    Undo
  17. Retweeted
    26 Sep 2019
    Undo
  18. Retweeted

    🐱 NetCAT Attack Cybersecurity researchers demonstrate a new side-channel vulnerability that could allow network-based hackers to remotely steal sensitive data from modern Intel CPUs solely sending specially crafted network packets Details ➤

    Undo
  19. Retweeted

    If today's Apple launch isn't your cup of tea, check out this cunning over-the-network Intel side-channel leak

    Undo
  20. Retweeted
    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·