Fabian Thomas (@fth0mas) 's Twitter Profile
Fabian Thomas

@fth0mas

PhD Student @CISPA Helmholtz Center for Information Security.

ID: 1666886822629089282

calendar_today08-06-2023 19:16:17

16 Tweet

97 Followers

36 Following

Fabian Thomas (@fth0mas) 's Twitter Profile Photo

I'm thrilled to present our (@____salmon____, Michael Schwarz) work Hammulator, a parameterizable Rowhammer simulator, at #DRAMSec 2023 (June 17). Our simulator supports both syscall and full-system emulation, enabling comprehensive analysis of #Rowhammer attacks and mitigations.

Andreas Kogler (@0xhilbert) 's Twitter Profile Photo

I am happy to announce that Collide+Power, our new and generic software-based power side-channel technique, has been accepted at USENIX Security 2023 #usesec23. collidepower.com

I am happy to announce that Collide+Power, our new and generic software-based power side-channel technique, has been accepted at <a href="/USENIXSecurity/">USENIX Security</a> 2023 #usesec23. collidepower.com
Daniel Weber (@weber_daniel) 's Twitter Profile Photo

Had the pleasure to present two papers at ESORICS today! The first analyzes the remaining attack surface of Meltdown 3a, the second (presented together with Fabian Thomas) shows that we can use Meltdown-US to leak the cache state of kernel structures on fully patched systems! 1/n

Had the pleasure to present two papers at ESORICS today! The first analyzes the remaining attack surface of Meltdown 3a, the second (presented together with <a href="/fth0mas/">Fabian Thomas</a>) shows that we can use Meltdown-US to leak the cache state of kernel structures on fully patched systems! 1/n
Daniel Weber (@weber_daniel) 's Twitter Profile Photo

In "Reviving Meltdown 3a", we (Fabian Thomas, @____salmon____, Ruiyi Zhang, Michael Schwarz) analyzed 19 CPUs for the system registers that we can still leak using Meltdown 3a. Find the details and the tool to check your own CPU here: github.com/cispa/regcheck

In "Reviving Meltdown 3a", we (<a href="/fth0mas/">Fabian Thomas</a>, @____salmon____, <a href="/Rayiizzz/">Ruiyi Zhang</a>, <a href="/misc0110/">Michael Schwarz</a>) analyzed 19 CPUs for the system registers that we can still leak using Meltdown 3a.
Find the details and the tool to check your own CPU here: github.com/cispa/regcheck
Daniel Weber (@weber_daniel) 's Twitter Profile Photo

In "Indirect Meltdown", we (Fabian Thomas, @____salmon____ , Ruiyi Zhang, Michael Schwarz) show that transient-execution attacks can be turned into side-channel attacks (on fully patched machines)! If you want to know more or play around with our PoC: github.com/cispa/indirect…

In "Indirect Meltdown", we (<a href="/fth0mas/">Fabian Thomas</a>, @____salmon____ , <a href="/Rayiizzz/">Ruiyi Zhang</a>, <a href="/misc0110/">Michael Schwarz</a>) show that transient-execution attacks can be turned into side-channel attacks (on fully patched machines)! 
If you want to know more or play around with our PoC: github.com/cispa/indirect…
Ruiyi Zhang (@rayiizzz) 's Twitter Profile Photo

Finally received my visa today! Unfortunately, I can't book everything in time for #BHUSA, so I'll miss the chance to present. However, you definitely shouldn't miss these two incredible talks: 🗓️ Wednesday | 🕙 10:20 AM 🗓️ Thursday | 🕒 3:20 PM

Finally received my visa today! Unfortunately, I can't book everything in time for #BHUSA, so I'll miss the chance to present. However, you definitely shouldn't miss these two incredible talks:

🗓️ Wednesday | 🕙 10:20 AM
🗓️ Thursday | 🕒 3:20 PM
Fabian Thomas (@fth0mas) 's Twitter Profile Photo

Join Lorenz (@hetterichlorenz) and me tomorrow at our #BHUSA briefing "Arbitrary Data Manipulation and Leakage with CPU Zero-Day Bugs on RISC-V." We'll unveil a novel architectural CPU bug that breaks all security isolations on affected RISC-V hardware. blackhat.com/us-24/briefing…

Michael Schwarz (@misc0110) 's Twitter Profile Photo

With the #GhostWrite CPU vulnerability, all isolation boundaries are broken - sandbox/container/VM can't prevent GhostWrite from writing and reading arbitrary physical memory on affected RISC-V CPUs. Deterministic, fast, and reliable - no side channels. ghostwriteattack.com

With the #GhostWrite CPU vulnerability, all isolation boundaries are broken - sandbox/container/VM can't prevent GhostWrite from writing and reading arbitrary physical memory on affected RISC-V CPUs. Deterministic, fast, and reliable - no side channels. ghostwriteattack.com
Fabian Thomas (@fth0mas) 's Twitter Profile Photo

Had a nice talk about #GhostWrite today together with @hetterichlorenz at #BHUSA. Our demos included reading arbitrary memory and escalating privileges. Further, we showed how #GhostWrite can interact with physical devices. Stay tuned for the recording. ghostwriteattack.com

Had a nice talk about #GhostWrite today together with @hetterichlorenz at #BHUSA. Our demos included reading arbitrary memory and escalating privileges. Further, we showed how #GhostWrite can interact with physical devices. Stay tuned for the recording.

ghostwriteattack.com
Seblu (@seblu84) 's Twitter Profile Photo

The Scaleway EM-RV1 OSes were patched several months ago. The default installation disables problematic instructions, and customers who installed their machines before have been contacted. Reminder: scaleway.com/en/docs/bare-m… I'd like to thank the @CISPA researchers who contacted

Fabian Thomas (@fth0mas) 's Twitter Profile Photo

Want to learn how to get root on the T-Head C910 #RISCV CPU within seconds? Visit our website ghostwriteattack.com covering the #GhostWrite vulnerability. #BlackHat #BHUSA