Benedict Schlueter (@benedictschluet) 's Twitter Profile
Benedict Schlueter

@benedictschluet

PhD Student @ETH

ID: 1725889890

linkhttp://benschlueter.com calendar_today03-09-2013 15:58:23

13 Tweet

74 Followers

185 Following

eurobits (@eurobitscyber) 's Twitter Profile Photo

Herzlichen Glückwunsch an Benedict Schlüter! 🎉 Der 21-jährige Student von der Ruhr-Universität Bochum hat den eurobits Excellence Award 2021 gewonnen. Mit seiner Bachelor-Arbeit aus dem Bereich IT-Sicherheit überzeugte er im Finale die Jury. Relive 👉 youtu.be/YN-mSaK7Vf4 Horst Goertz Institute for IT Security

Herzlichen Glückwunsch an Benedict Schlüter! 🎉 Der 21-jährige Student von der <a href="/ruhrunibochum/">Ruhr-Universität Bochum</a> hat den eurobits Excellence Award 2021 gewonnen. Mit seiner Bachelor-Arbeit aus dem Bereich IT-Sicherheit überzeugte er im Finale die Jury.
Relive 👉 youtu.be/YN-mSaK7Vf4
<a href="/HGI_Bochum/">Horst Goertz Institute for IT Security</a>
VUSec (@vu5ec) 's Twitter Profile Photo

How do synchronization primitives work during speculative execution? THEY DON'T! Disclosing #GhostRace (paper USENIX Security). We turn all arch. race-free critical regions of OS/Hypervisors into Speculative Race Conditions. Joint work VUSec IBM Research: vusec.net/projects/ghost…

Shweta Shinde (@shw3ta_shinde) 's Twitter Profile Photo

Can a malicious cloud provider send bad notifications to break confidential VMs? Disclosing #AhoiAttacks that break confidential computing offered by AMD SEV-SNP and Intel TDX by abusing interrupt delivery. Check our USENIX Security & IEEE S&P papers. ahoi-attacks.github.io/?1337

Andrin Bertschi (@andrinbertschi) 's Twitter Profile Photo

After more than 6 months of hard work, we are thrilled to disclose #AhoiAttacks that break confidential computing offered by AMD SEV-SNP and Intel TDX with malicious interrupts. ahoi-attacks.github.io

VUSec (@vu5ec) 's Twitter Profile Photo

Branch History Injection (BHI) is back! Disclosing Native BHI, bypassing deployed Spectre-v2/BHI mitigations (e.g., eBPF=off) to leak arbitrary kernel/host memory (e.g., root password hash below). Joint work by Sander Wiebing alvise Herbert Bos Cristiano Giuffrida: vusec.net/projects/nativ…

Shweta Shinde (@shw3ta_shinde) 's Twitter Profile Photo

WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP got the Distinguished Paper award at IEEE #SP24! Blog & artifacts: ahoi-attacks.github.io/wesee/ Our talk is on May 22, Wed in Track 2, Ballroom 5 @ 1:25 PM #ahoi Congrats Benedict Schlueter Supraja Andrin Bertschi

Stefan Gast (@notbobbytables) 's Twitter Profile Photo

Announcing #CounterSEVeillance, a novel attack on AMD SEV-SNP inferring control-flow information and operand properties from performance-counter data with single-instruction resolution. Thanks to Hannes Weissteiner, Robin Leander Schröder and Daniel Gruss for the amazing collaboration!

Shweta Shinde (@shw3ta_shinde) 's Twitter Profile Photo

🔓 Heracles ACM CCS 2025'25: Breaking AMD’s Confidential Computing! We show that the hypervisor can read and move hardware-encrypted memory on AMD SEV-SNP. We build a chosen-plaintext oracle to leak kernel memory, auth keys, and cookies from "confidential" VMs heracles-attack.github.io

Shweta Shinde (@shw3ta_shinde) 's Twitter Profile Photo

🚨Breaking AMD’s Confidential Computing (again!) — Meet RMPocalypse 🚨 Thrilled to share our 2nd paper at ACM CCS 2025 🎉 We break AMD SEV-SNP’s guarantees—with just one write! Forge attestation & enable debug, with 100% success 👥Work with Benedict Schlueter 📄rmpocalypse.github.io