Daniel Genkin (@danielgenkin) 's Twitter Profile
Daniel Genkin

@danielgenkin

Associate Professor at Georgia Tech. Security, systems, side channels, cryptography.

ID: 1029963330876841990

linkhttps://faculty.cc.gatech.edu/~genkin/ calendar_today16-08-2018 05:29:28

13 Tweet

273 Followers

172 Following

Daniel Genkin (@danielgenkin) 's Twitter Profile Photo

After more than a year of embargo we can now show you how speculative attacks can extract sensitive information from the Safari browser on Apple platforms. Check out our latest paper ileakage.com. Great work by Jason Kim, Stephan van Schaik and Yuval Yarom.

After more than a year of embargo we can now show you how speculative attacks can extract sensitive information from the Safari browser on <a href="/Apple/">Apple</a> platforms. Check out our latest paper ileakage.com. Great work by Jason Kim, <a href="/themadstephan/">Stephan van Schaik</a> and <a href="/yuvalyarom/">Yuval Yarom</a>.
Mikko Ohtamaa (@moo9000) 's Twitter Profile Photo

iLeakage: Speculative execution attack on Safari, iPhone, iPad and Mac, allowing a hostile website to extract your passwords and other secrets. ileakage.com The only way to be safe is to stop using Safari: At the time of public release, Apple has implemented a

iLeakage: Speculative execution attack on Safari, iPhone, iPad and Mac, allowing a hostile website to extract your passwords and other secrets.

ileakage.com

The only way to be safe is to stop using Safari: 
At the time of public release, Apple has implemented a
Daniel Genkin (@danielgenkin) 's Twitter Profile Photo

For those wondering if Apple’s iOS/iPadOS 17.1 and macOS 14.1 released yesterday protect against ileakage.com? We took a look for you, the answer is no. Devices are still vulnerable.

For those wondering if Apple’s iOS/iPadOS 17.1 and macOS 14.1 released yesterday protect against ileakage.com? We took a look for you, the answer is no. Devices are still vulnerable.
USENIX WOOT Conference on Offensive Technologies (@wootsecurity) 's Twitter Profile Photo

WOOT! Big news! Starting 2024 WOOT will be @USENIX WOOT Conference on Offensive Technologies! WOOT '24 will be on August 12-13 2024, colocated with USENIX Security WOOT '24 will be co-chaired by Alyssa Milburn (Intel) and Adam Doupé (Arizona State University <= corrected!) usenix.org/conference/woo…

WOOT! Big news!

Starting 2024 WOOT will be @USENIX WOOT Conference on Offensive Technologies!

WOOT '24 will be on August 12-13 2024, colocated with USENIX Security

WOOT '24 will be co-chaired by <a href="/noopwafel/">Alyssa Milburn</a> (<a href="/intel/">Intel</a>) and <a href="/adamdoupe/">Adam Doupé</a> (<a href="/ASU/">Arizona State University</a> &lt;= corrected!) 

usenix.org/conference/woo…
Daniel Genkin (@danielgenkin) 's Twitter Profile Photo

Microarchitectural unboxing: check out our new demo for breaking two factor authentication using iLeakage. Yes you heard it, speculative execution attacks on Apple’s M3 Macs and latest Safari that defeat Facebook’s 2FA over SMS. ileakage.com

Microarchitectural unboxing: check out our new demo for breaking two factor authentication using iLeakage. Yes you heard it, speculative execution attacks on Apple’s M3 Macs and latest Safari that defeat Facebook’s 2FA over SMS.

ileakage.com
Daniel Genkin (@danielgenkin) 's Twitter Profile Photo

I'm very thankful to the Sloan Foundation for recognizing my research. Could not have done it without my awesome students, great collaborators, and wonderful mentors. Checkout our research group that made this possible at architecture.fail

Daniel Genkin (@danielgenkin) 's Twitter Profile Photo

Ever wondered what happens when side-channel resistant code meets a fancy prefetcher? Checkout our paper breaking constant time crypto on Apple CPUs. gofetch.fail Joint work with Boru Chen, yingchen wang, Pradyumna Shome (pradyumna.bsky.social), Chris Fletcher, David Kohlbrenner, Riccardo Paccagnella

HOSEIN. YAVARZADEH (@hosein_yz) 's Twitter Profile Photo

Excited to present "Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor" at ASPLOS with Archit Agarwal, Max Christman, Christina Garman, Daniel Genkin, Andrew Kwong, Daniel Moghimi, Deian Stefan, Kazem Taram and Dean Tullsen. (1/4)🧵

Daniel Genkin (@danielgenkin) 's Twitter Profile Photo

Have an Apple device from the last few years? We have a new side channel attack for you. Checkout our work at predictors.fail Joint work with Jason Kim, Jalen Chuang and Yuval Yarom (Yuval Yarom). Could not have asked for a better team!

Have an Apple device from the last few years? We have a new side channel attack for you. Checkout our work at predictors.fail 

Joint work with Jason Kim, Jalen Chuang and Yuval Yarom (<a href="/yuvalyarom/">Yuval Yarom</a>). Could not have asked for a better team!
Daniel Genkin (@danielgenkin) 's Twitter Profile Photo

Want to know what happens when commercial TEEs meet improvised DRAM memory interposers? SGX mayhem including attestation key extraction. Please DO try that at home😉. Check out our work at wiretap.fail

Want to know what happens when commercial TEEs meet improvised DRAM memory interposers? SGX mayhem including attestation key extraction. Please DO try that at home😉. Check out our work at wiretap.fail