Anna Pätschke (@paetscan) 's Twitter Profile
Anna Pätschke

@paetscan

PhD student at @UniLuebeck, Institute for IT Security

ID: 1387741898543149063

calendar_today29-04-2021 12:15:06

42 Tweet

101 Takipçi

154 Takip Edilen

CASA - Cluster of Excellence for Cyber Security (@casa_exc) 's Twitter Profile Photo

Some Impressions of Day 2 of #WISC2023: Today, the participants enjoyed talks by Shruti Tople and Maria Eichlseder, and held poster presentations and lightning talks.

Some Impressions of Day 2 of #WISC2023: Today, the participants enjoyed talks by <a href="/shrutitople/">Shruti Tople</a>  and Maria Eichlseder, and held poster presentations and lightning talks.
CASA - Cluster of Excellence for Cyber Security (@casa_exc) 's Twitter Profile Photo

Some impressions from this morning at #WISC2023- including a talk by Jade Philipoom and workshops on “Allyship and the Power of Networks” and “Presentation skills for young scientists”

Some impressions from this morning at #WISC2023- including a talk by Jade Philipoom and workshops on “Allyship and the Power of Networks” and “Presentation skills for young scientists”
Elbsides / elbsides@infosec.exchange / (@elbsides) 's Twitter Profile Photo

The third session of talks on Friday starts with Nick Mahling: 'Reverse Engineering of Intel’s Branch Prediction' - the importance of understanding and mitigating microarchitectural vulnerabilities arising from branch prediction mechanisms in CPUs.

Schülerakademie Lübeck (@saluehl) 's Twitter Profile Photo

Am 23. & 24.02.2024 findet LüHack statt. Beim Online-Team-Wettbewerb zum Thema #IT-Sicherheit, können Schüler:innen den sicheren Umgang mit Computern trainieren und ihre #Hacker:innen-Skills erproben. 💻Sie wollen mit Ihrer Schule teilnehmen? 👉Anmeldung: luehack.sshuzl.de

Am 23. &amp; 24.02.2024 findet LüHack statt. Beim Online-Team-Wettbewerb zum Thema #IT-Sicherheit, können Schüler:innen den sicheren Umgang mit Computern trainieren und ihre #Hacker:innen-Skills erproben. 💻Sie wollen mit Ihrer Schule teilnehmen? 👉Anmeldung: luehack.sshuzl.de
ssh@uzl (@ssh_uzl) 's Twitter Profile Photo

Das #Lühack24 ist vorbei, aber wer hat eigentlich gewonnen? Das erfahrt ihr morgen ab 18 Uhr bei der #Lühack24 Siegerehrung im Hörsaal AM4 im Audimax der Universität Lübeck. Eine Online-Teilnahme ist möglich: luehack.sshuzl.de/organisatorisc…. Wir freuen uns auf euch!

Anna Pätschke (@paetscan) 's Twitter Profile Photo

Looking forward to great discussions about side-channels and their mitigations on Wednesday - and hopefully clearing the fog of obfuscation 🌁

Bart Preneel (@bpreneel1) 's Twitter Profile Photo

About 250 scientists from 31 countries have signed another open letter homes.esat.kuleuven.be/~preneel/Open_… criticizing the latest EU #chatcontrol draft patrick-breyer.de/wp-content/upl…. The letter confirms 2 earlier letters from July 2023 edri.org/wp-content/upl… and May 2024 nce.mpi-sp.org/index.php/s/eq…

Bart Preneel (@bpreneel1) 's Twitter Profile Photo

#chatcontrol was removed from the agenda last week which was seen as a small victory. But this week Orban has put it back on the agenda. In the mean time our letter explaining why #chatcontrol is a terrible idea has been signed by more than 350 experts homes.esat.kuleuven.be/~preneel/Open_…

Thomas Eisenbarth (@tomcrypt) 's Twitter Profile Photo

Check out #TDX⬇down showing Single-Stepping and Instruction Counting attacks on #Intel #TDX, also exposing novel leakage in #wolfSSL and #OpenSSL #ECDSA nonce generation. Join Luca Wilke for the presentation at ACM CCS 2025 next week. uzl-its.github.io/tdxdown/

Check out #TDX⬇down showing Single-Stepping and Instruction Counting attacks on #Intel #TDX, also exposing novel leakage in #wolfSSL and #OpenSSL #ECDSA nonce generation.

Join <a href="/lucawilkeUzL/">Luca Wilke</a>  for the presentation at <a href="/acm_ccs/">ACM CCS 2025</a>  next week. 
uzl-its.github.io/tdxdown/
Cosic.be (@cosicbe) 's Twitter Profile Photo

#BadRAM: Tampering with DRAM modules allows attackers to bypass SEV-SNP's write protection and forging attestation reports, breaking all trust in #SEVSNP badram.eu Research by COSIC KU Leuven, the University of Lübeck, and the University of Birmingham

#BadRAM: Tampering with DRAM modules allows attackers to bypass SEV-SNP's write protection and forging attestation reports, breaking all trust in 
#SEVSNP
badram.eu
Research by COSIC KU Leuven, the University of Lübeck, and the University of Birmingham