Claudio Canella (@cc0x1f) 's Twitter Profile
Claudio Canella

@cc0x1f

ID: 1036576659107930112

linkhttp://cc0x1f.net calendar_today03-09-2018 11:28:28

129 Tweet

506 Followers

166 Following

Daniel Gruss (@lavados) 's Twitter Profile Photo

At #BHASIA 2020 this year: 1. The Evil Alt-Ego by Trishita Tiwari šŸ‘©ā€šŸ’» et al blackhat.com/asia-20/briefi… 2. Page Cache Attacks with Trishita Tiwari šŸ‘©ā€šŸ’» Michael Schwarz Erik Kraft blackhat.com/asia-20/briefi… 3. Complexity killed Security (Friday Keynote) by me blackhat.com/asia-20/briefi… [1/2]

Black Hat (@blackhatevents) 's Twitter Profile Photo

Claudio Canella & Lukas Giner & Michael Schwarz will present ā€˜Store-to-Leak Forwarding: There and Back Again’ at #BHASIA and outline a countermeasure that prevents all known microarchitectural KASLR breaks, including Store-to-leak, Fallout, and DrK. ow.ly/DGeA50Bv8gL

Michael Schwarz (@misc0110) 's Twitter Profile Photo

See #PLATYPUS in action: breaking kernel address space layout randomization within seconds by observing the CPU's power consumption with RAPL. platypusattack.com

Daniel Gruss (@lavados) 's Twitter Profile Photo

Congrats Richard Fellner! This is the guy who implemented the original KAISER/KPTI patch! Very talented in many ways but also kind and patient person. Sadly he does not want to continue with academia but prefers industry. PS: I can get you in touch with him if you want ;)

David Oswald (@sublevado) 's Twitter Profile Photo

With #VoltPillager, we show that Intel #SGX is vulnerable to low-cost hardware fault injection attacks - and that SGX cannot protect against an attacker with physical access (like malicious cloud provider). More details: zt-chen.github.io/voltpillager/ Flavio Garcia George Zitai Chen

Daniel Gruss (@lavados) 's Twitter Profile Photo

Finished my habilitation (venia docendi). Thus, my official title is now "Ass.Prof. Priv.-Doz. Dipl.-Ing. Dr.techn. BSc" (the "Priv.-Doz." is new). The habilitation thesis is now public on my website: gruss.cc/files/habil.pdf

Finished my habilitation (venia docendi). Thus, my official title is now "Ass.Prof. Priv.-Doz. Dipl.-Ing. Dr.techn. BSc" (the "Priv.-Doz." is new). 
The habilitation thesis is now public on my website: gruss.cc/files/habil.pdf
Daniel Gruss (@lavados) 's Twitter Profile Photo

Hey #graz and #german-speaking followers! If you're thinking about what to study, I'm giving a short talk in German @ 17:30 today: tugraz.webex.com/tugraz-de/j.ph… Kleine Zeitung

Black Hat (@blackhatevents) 's Twitter Profile Photo

Claudio Canella & Michael Schwarz propose a new approach for automatically generating seccomp filters for Linux applications, and show the effectiveness of their new approach in preventing real-world exploits with only minimal overhead in #BHASIA Briefing ow.ly/Sz4s50DrBVP

Black Hat (@blackhatevents) 's Twitter Profile Photo

Claudio Canella & Michael Schwarz propose a new approach for automatically generating seccomp filters for Linux applications, and show the effectiveness of their new approach in preventing real-world exploits with only minimal overhead in #BHASIA Briefing ow.ly/91EX50DK2BU

Black Hat (@blackhatevents) 's Twitter Profile Photo

Enter Sandbox | At this #BHASIA Briefing Claudio Canella & Michael Schwarz propose a new approach for automatically generating seccomp filters for Linux applications, & show the effectiveness of their new approach in preventing real-world exploits. Learn more: bit.ly/2NY08TR

GeneviĆØve Patterson (@genevievemp) 's Twitter Profile Photo

Walter Lasecki assaulted me. He pinned me against a bar, he put his hand up my skirt and his fingers in my underwear. He grabbed and twisted. He leaned in and insisted that I sleep with him. ā€œIt could be innocent,ā€ he said.

Daniel Weber (@weber_daniel) 's Twitter Profile Photo

I am honored to announce that our (ahmad, hamed, Michael Schwarz, Christian Rossow (@[email protected])) work on automatic discovery of side channels was accepted at USENIX Security '21. We developed Osiris, a fuzzer searching for instructions that can be abused as microarchitectural timing side channels. (1/3)

I am honored to announce that our (ahmad, hamed, <a href="/misc0110/">Michael Schwarz</a>, <a href="/chrossow/">Christian Rossow (@rossow@infosec.exchange)</a>) work on automatic discovery of side channels was accepted at <a href="/USENIXSecurity/">USENIX Security</a> '21. 
We developed Osiris, a fuzzer searching for instructions that can be abused as microarchitectural timing side channels. 
(1/3)
Michael Schwarz (@misc0110) 's Twitter Profile Photo

I'm very proud of my student Daniel Weber who invested a lot of time to turn his (already great) bachelor thesis into a paper. Having a first-author USENIX Security paper is an exceptional start for a PhD! x.com/weber_daniel/s…

Cat Easdon (@cat_easdon) 's Twitter Profile Photo

Delighted to announce that our paper 'Rapid Prototyping for Microarchitectural Attacks' has been accepted at USENIX Security'22 #usesec22! Preprint at cattius.com/images/rapid-p…. /cc Michael Schwarz @marv0x90 Daniel Gruss Dynatrace

Delighted to announce that our paper 'Rapid Prototyping for Microarchitectural Attacks' has been accepted at <a href="/USENIXSecurity/">USENIX Security</a>'22 #usesec22! Preprint at cattius.com/images/rapid-p…. /cc <a href="/misc0110/">Michael Schwarz</a> @marv0x90 <a href="/lavados/">Daniel Gruss</a> <a href="/Dynatrace/">Dynatrace</a>
Lukas Giner (@redrabbyte) 's Twitter Profile Photo

Happy to announce my first paper has been accepted at USENIX 2022! Andreas Kogler, Claudio Canella , Michael Schwarz, Daniel Gruss and I have an in-depth look at the remaining attack surface presented by LVI-Null and propose a targeted (creativešŸ˜‰) mitigation for LVI fixed CPUs ginerlukas.com/publications/p…

Lukas Giner (@redrabbyte) 's Twitter Profile Photo

We've open-sourced our mitigation, LVINullify, on github.com/lvi-nullify/LV… Big thanks to all my co-authors for their hard work!

Claudio Canella (@cc0x1f) 's Twitter Profile Photo

Proud to announce that our work on automatically generating Linux seccomp filters won the Best Paper Award at CCSW. Thanks again to my colleagues Mario Werner, Daniel Gruss, and Michael Schwarz for their help.

Proud to announce that our work on automatically generating Linux seccomp filters won the Best Paper Award at CCSW. Thanks again to my colleagues Mario Werner, <a href="/lavados/">Daniel Gruss</a>, and <a href="/misc0110/">Michael Schwarz</a> for their help.
The Michigan Daily (@michigandaily) 's Twitter Profile Photo

#FocalPoint: University of Michigan administrators were made aware of alleged academic bullying from then-Computer Science and Engineering at Michigan professor Daniel Genkin. He was later hired by Georgia Tech. Our investigation into previously-undisclosed allegations of abusive behavior against Genkin: michigandaily.com/news/focal-poi…