Medijski sadržaj
- Tweetovi
- Tweetovi i odgovori
- Medijski sadržaj, trenutna stranica.
-
Introducing Rosita - a code rewrite engine that removes side-channel leakage. Work by
@manushanga and Niels Samwel, with@lejla_batina, Francesco Regazzoni,@MWagnerRedChair, and yours truly.pic.twitter.com/fbwTLKF4Jo
Prikaži ovu nit -
Our paper "Robust Website Fingerprinting Through the Cache Occupancy Channel" has been accepted to
@USENIXSecurity#usesec19. Joint work with@aToliks, Lachlan Kang, Yarden Haskal, Yosef Meltser,@prateekmittal_ and@yossioren. https://arxiv.org/abs/1811.07153 pic.twitter.com/H0DU40PrBm
-
Nadia Heninger delivering the first invited talk in Kangacryptpic.twitter.com/r71Xsq3VLp
-
Dont miss! the
#foreshadow team presents a new service to the community. Today 8:30pm@USENIXSecurity@MarinaMinkin@ofir1942@jovanbulck@raoul_strackx@bariskasikci@ThomasWenisch Mark Silberstein, Daniel Genkin, Frank Piessenspic.twitter.com/geRDjWqwu4
-
The Foreshadow war room
@USENIXSecurity - T-00:20@MarinaMinkin@ofir1942@jovanbulck@raoul_strackx@bariskasikci@ThomasWenisch Mark Silberstein, Daniel Genkin, Frank Piessens,pic.twitter.com/EiHhxXn0XV
-
Read our technical analysis of Foreshadow related
@intel discoveries now! https://foreshadowattack.com/@MarinaMinkin@ofir1942@jovanbulck@raoul_strackx@bariskasikci@ThomasWenisch Mark Silberstein, Daniel Genkin, Frank Piessens,pic.twitter.com/Z3hvbbb3mO
-
-
Following seven months of responsible disclosure, we are happy to announce that our Foreshadow attack is now public https://foreshadowattack.com . Work with
@MarinaMinkin@ofir1942@jovanbulck@raoul_strackx@bariskasikci@ThomasWenisch Mark Silberstein, Daniel Genkin, Frank Piessenspic.twitter.com/T8GkpURJs5
Prikaži ovu nit -
Our cache+lattice attack on SGX EPID is now public https://tches.iacr.org/index.php/TCHES/article/view/879 …pic.twitter.com/zREwy7gGNG
-
Side channel attack from web ads. https://ia.cr/2018/119 . Joint work with Daniel Genkin,
@levp92, and Eran Tromer.pic.twitter.com/d2QRNZzveJ
-
May the fourth be with you. Our
#CCS17 attack on libgcrypt's Curve25519 is online. https://eprint.iacr.org/2017/806@acm_ccspic.twitter.com/w53MgftDlA
-
Yang Su presenting "USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs".
#usesec17pic.twitter.com/dbU6vq9QIl
-
"USB Snooping Made Easy: Crosstalk Leakage Attacks on USB Hubs", to be presented
@USENIXSecurity, is now online: http://autoidlab.cs.adelaide.edu.au/sites/default/files/publications/papers/camera.pdf …pic.twitter.com/R7klrFdK7Y
-
Do Hardware Cache Flushing Operations Actually Meet Our Expectations? https://arxiv.org/abs/1612.04474 pic.twitter.com/4vD9U4XgLM
-
@CesarPereidaG presenting "Make Sure DSA Signing Exponentiation Really are Constant-Time".#CCS16pic.twitter.com/lYJVnMu6Kp
-
Daniel Genkin presenting ECDSA Key Extraction from Mobile Devices via Nonintrusove Physical Side Channels.
#CCS16pic.twitter.com/ZeDzRwQ9kv
-
-
OpenSSL DSA vulnerable to side-channel attacks due to an 11 years old bug. http://eprint.iacr.org/2016/594.pdf pic.twitter.com/sh2lz3AT8Q
-
Stealing bitcoins with a sound card - http://www.cs.tau.ac.il/~tromer/mobilesc/ …pic.twitter.com/Gw6kzotGiE
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.