marton bognar (@martonbognar) 's Twitter Profile
marton bognar

@martonbognar

cybersecurity phd @DistriNet / @KU_Leuven

ID: 489144570

linkhttps://mici.hu calendar_today11-02-2012 07:00:34

769 Tweet

153 Takipçi

268 Takip Edilen

SwiftOnSecurity (@swiftonsecurity) 's Twitter Profile Photo

I've mentioned before, but I think about this a lot. "There must be another room, somewhere down the hall, where the real meeting is happening, where the real experts are, making the real decisions ... because it can’t just be us. It can’t just be this." -- Jake Sullivan, 2013

Fritz Alder (@fritzalder) 's Twitter Profile Photo

Just one week left to submit a talk to the confidential computing devroom FOSDEM @[email protected] 2025. Submit by December 1st, and join us on February 1 in Brussels! falder.org/fosdem25-cfp

Daniel Gruss (@lavados) 's Twitter Profile Photo

Got some negative or unrealistic threat model results that still bring interesting insights? A side channel that requires root to leak something from the kernel? Reproducing prior work? Somewhat related to microarchitecture? Here's your venue: uasc.cc

RuhrSec – IT Security Conference (@ruhrsec) 's Twitter Profile Photo

We’re delighted to reveal our next talk! "Breaking and Securing Memory Isolation in Texas Instruments Microcontrollers.“ by marton bognar and Jo Van Bulck. 🌐 #RuhrSec Website ruhrsec.de/2025/ 📖 RuhrSec Program ruhrsec.de/2025/index.htm… #itsecurity #itsicherheit

We’re delighted to reveal our next talk!
"Breaking and Securing Memory Isolation in Texas Instruments Microcontrollers.“ by <a href="/martonbognar/">marton bognar</a> and <a href="/jovanbulck/">Jo Van Bulck</a>.

🌐 #RuhrSec Website
ruhrsec.de/2025/

📖 RuhrSec Program
ruhrsec.de/2025/index.htm…

#itsecurity #itsicherheit
Adriaan Jacobs (@a3_jacobs) 's Twitter Profile Photo

Happy to share that both our EuroSec Workshop papers got accepted! Congrats to Jonas and Anton for producing such great research so early in their PhD. See you in Rotterdam! Also for EuroSys 2025 and ASPLOS after :) 📜: adriaanjacobs.github.io/files/eurosec2… 📜: adriaanjacobs.github.io/files/eurosec2…

Happy to share that both our <a href="/EuroSecWorkshop/">EuroSec Workshop</a> papers got accepted!

Congrats to Jonas and Anton for producing such great research so early in their PhD.

See you in Rotterdam! Also for <a href="/EuroSysConf/">EuroSys 2025</a> and <a href="/ASPLOSConf/">ASPLOS</a> after :)
📜: adriaanjacobs.github.io/files/eurosec2…
📜: adriaanjacobs.github.io/files/eurosec2…
Adriaan Jacobs (@a3_jacobs) 's Twitter Profile Photo

Happy to receive the EuroSec Workshop'25 Best Paper Award for our paper "CUDA, Woulda, Shoulda: Returning Exploits in a SASS-y World" 🎉 Great recognition for Jonas Roels' hard work! Check the 📜 here: adriaanjacobs.github.io/files/eurosec2…

Happy to receive the <a href="/EuroSecWorkshop/">EuroSec Workshop</a>'25 Best Paper Award for our paper "CUDA, Woulda, Shoulda: Returning Exploits in a SASS-y World" 🎉

Great recognition for <a href="/RoelsJonas/">Jonas Roels</a>' hard work! 

Check the 📜 here: adriaanjacobs.github.io/files/eurosec2…
marton bognar (@martonbognar) 's Twitter Profile Photo

and if you need any more convincing, i will be giving a hands-on introduction to Proteus, our RISC-V processor designed for security researchers!

Kav (@kavehrazavi) 's Twitter Profile Photo

I am chairing the second edition of the microarchitecture security conference (uASC'26). Paper deadline for the first cycle is July 15. Please spread the word, submit, and/or join us in charming Leuven in February 2026! More info: uasc.cc

ORSHIN Horizon Europe Project (101070008) (@orshin_he) 's Twitter Profile Photo

🐦 Forgot to catch the Early Bird? You’re in luck! The #ORSHIN Summer School deal now runs until August 1st! 🎉 Join us for smart ideas, cool people & a splash of sunshine ☀️ 👉 summer-school.info #SummerSchool #LastCallBirds #LearnInStyle

🐦 Forgot to catch the Early Bird? You’re in luck!
The #ORSHIN Summer School deal now runs until August 1st! 🎉

Join us for smart ideas, cool people &amp; a splash of sunshine ☀️
👉 summer-school.info
#SummerSchool #LastCallBirds #LearnInStyle
marton bognar (@martonbognar) 's Twitter Profile Photo

Take a cycle to read our SysTEX paper! We show that timing leaks can be introduced at all levels of the hardware-software stack in embedded systems (hardware state machines, comparisons of native C integers, and library functions). mici.hu/papers/vandijc… github.com/dnet-tee/wait-…

Take a cycle to read our SysTEX paper! We show that timing leaks can be introduced at all levels of the hardware-software stack in embedded systems (hardware state machines, comparisons of native C integers, and library functions).

mici.hu/papers/vandijc…
github.com/dnet-tee/wait-…
Mathy Vanhoef (@vanhoefm) 's Twitter Profile Photo

Ideally all papers should publish their code. You can help realize this by applying to be an artifact reviewer at NDSS'26. You'll get to review artifacts of accepted papers. We especially encourage junior/senior PhD students & PostDocs to apply: docs.google.com/forms/d/e/1FAI…

Mike Solana (@micsolana) 's Twitter Profile Photo

“grok, isn’t it true that [extremely leading question] and [basically instructions for grok to spit out the answer you want to hear].” grok: no that isn’t true

marton bognar (@martonbognar) 's Twitter Profile Photo

Chek out openIPE (IEEE European Symposium on Security and Privacy '25), a platform for security research featuring a memory isolation primitive based on Texas Instruments microcontrollers, an extensible trusted software layer, and tooling for security validation. mici.hu/papers/bognar2… github.com/martonbognar/o…

Chek out openIPE (<a href="/IEEEEUROSP/">IEEE European Symposium on Security and Privacy</a> '25), a platform for security research featuring a memory isolation primitive based on Texas Instruments microcontrollers, an extensible trusted software layer, and tooling for security validation.

mici.hu/papers/bognar2…
github.com/martonbognar/o…
marton bognar (@martonbognar) 's Twitter Profile Photo

We investigated how changes to hardware designs are evaluated and found that systems security papers often omit crucial details, possibly leading to unfair comparisons with other work. Check our paper for more details with a case study + recommendations! mici.hu/papers/demeule…

We investigated how changes to hardware designs are evaluated and found that systems security papers often omit crucial details, possibly leading to unfair comparisons with other work. Check our paper for more details with a case study + recommendations!

mici.hu/papers/demeule…