Michael Schwarz (@misc0110) 's Twitter Profile
Michael Schwarz

@misc0110

InfoSec Faculty @ #CISPA. Side-channel attacks. Exploiting microarchitectures. #Meltdown #Spectre #ZombieLoad #SGX #JavaScript #Rowhammer

ID: 2419140080

linkhttps://misc0110.net calendar_today30-03-2014 15:16:04

684 Tweet

7,7K Followers

466 Following

Informationsdienst Wissenschaft - Nachrichten (@idw_online_de) 's Twitter Profile Photo

GhostWrite, a new CPU vulnerability, compromises the integrity of T-Head’s “XuanTie C910” RISC-V CPU. Discovered by CISPA researchers, GhostWrite grants unprivileged users read-and-write access to physical memory on the C910 #cpusecurity #cispa nachrichten.idw-online.de/2024/08/07/cpu…

GhostWrite, a new CPU vulnerability, compromises the integrity of T-Head’s “XuanTie C910” RISC-V CPU. Discovered by CISPA researchers, GhostWrite grants unprivileged users read-and-write access to physical memory on the C910 #cpusecurity #cispa
nachrichten.idw-online.de/2024/08/07/cpu…
Michael Schwarz (@misc0110) 's Twitter Profile Photo

Exciting work from my newest PhD Fabian Thomas! He just started at the beginning of the year, and this was his first project in his PhD. If you are Black Hat, don't miss his talk starting in 10 minutes!

Andrey Akinshin (@andrey_akinshin) 's Twitter Profile Photo

A new critical CPU vulnerability is discovered: #GhostWrite. Affects T-Head XuanTie C910 RISC-V CPU. Allows reading and writing arbitrary physical memory. The only mitigation is disabling half of the instruction set; the performance penalty is up to 77%. ghostwriteattack.com

A new critical CPU vulnerability is discovered: #GhostWrite.
Affects T-Head XuanTie C910 RISC-V CPU. Allows reading and writing arbitrary physical memory. The only mitigation is disabling half of the instruction set; the performance penalty is up to 77%.
ghostwriteattack.com
Mrs. Y. (@mrsyiswhy) 's Twitter Profile Photo

SCMagazine: A pair of researchers told #BHUSA attendees of a vulnerability they uncovered dubbed "GhostWrite," capable of allowing an attacker to pull memory contents from RISC-V International chips. #BlackHat2024 #cybersecurity #infosec #ITsecurity bit.ly/3yklRwx

Fabian Thomas (@fth0mas) 's Twitter Profile Photo

Had a nice talk about #GhostWrite today together with @hetterichlorenz at #BHUSA. Our demos included reading arbitrary memory and escalating privileges. Further, we showed how #GhostWrite can interact with physical devices. Stay tuned for the recording. ghostwriteattack.com

Had a nice talk about #GhostWrite today together with @hetterichlorenz at #BHUSA. Our demos included reading arbitrary memory and escalating privileges. Further, we showed how #GhostWrite can interact with physical devices. Stay tuned for the recording.

ghostwriteattack.com
Fabian Thomas (@fth0mas) 's Twitter Profile Photo

Want to learn how to get root on the T-Head C910 #RISCV CPU within seconds? Visit our website ghostwriteattack.com covering the #GhostWrite vulnerability. #BlackHat #BHUSA

ACSAC (@acsac_conf) 's Twitter Profile Photo

The first #ACSAC2024 #PaperPreview today is by Weber et al., who show that HW features can be used to stop #SideChannel #attacks almost immediately by monitoring the victim: openconf.org/acsac2024/modu… #cybersecurity Daniel Weber @____salmon____ Jan Reineke Michael Schwarz Cispa (degen)

The first #ACSAC2024 #PaperPreview today is by Weber et al., who show that HW features can be used to stop #SideChannel #attacks almost immediately by monitoring the victim: openconf.org/acsac2024/modu…
#cybersecurity
<a href="/weber_daniel/">Daniel Weber</a> @____salmon____ <a href="/jan__reineke/">Jan Reineke</a> <a href="/misc0110/">Michael Schwarz</a> <a href="/cispa/">Cispa (degen)</a>
Daniel Gruss (@lavados) 's Twitter Profile Photo

Got some negative or unrealistic threat model results that still bring interesting insights? A side channel that requires root to leak something from the kernel? Reproducing prior work? Somewhat related to microarchitecture? Here's your venue: uasc.cc

Daniel Weber (@weber_daniel) 's Twitter Profile Photo

Super excited to present our (L. Niemann, @____salmon____, Jan Reineke, Michael Schwarz) newest paper at #ACSAC2024! We show how modern CPU hardware can be leveraged to stop side-channel attacks almost instantly (~200 CPU cycles)! Code/Paper: github.com/cispa/IRQGuard

Super excited to present our (L. Niemann, @____salmon____, <a href="/jan__reineke/">Jan Reineke</a>, <a href="/misc0110/">Michael Schwarz</a>)  newest paper at #ACSAC2024! We show how modern CPU hardware can be leveraged to stop side-channel attacks almost instantly (~200 CPU cycles)!
Code/Paper: github.com/cispa/IRQGuard
Daniel Gruss (@lavados) 's Twitter Profile Photo

CFP for uASC 25 is still open. We have rolling reviews, and 1 submission is already accepted. If you have interesting results on microarchitecture security (incl. weak threat models or reproducing prior work), check out the CFP at uasc.cc The CFP closes **Jan 28**

Daniel Gruss (@lavados) 's Twitter Profile Photo

The uASC registration is open now: uasc.cc Also the uASC deadline is approaching: January 27 AoE. We accept papers, posters, and talks. We have conference proceedings. We're interested in any insights broadly around microarchitecture security.

Matteo Rizzo (@_matteorizzo) 's Twitter Profile Photo

github.com/google/securit… Our newest research project is finally public! We can load malicious microcode on Zen1-Zen4 CPUs!

Daniel Gruss (@lavados) 's Twitter Profile Photo

The second #DIMVA25 deadline is upcoming: February 12 AoE. If you're planning to submit a paper, register it already: dimva.org/dimva2025/ DIMVA has a great community and is quite visible: 3 out of my 10 top cited papers are DIMVA papers! Hope to see many of you in Austria!

Daniel Weber (@weber_daniel) 's Twitter Profile Photo

Heading to Black Hat Asia now! Leon Trampert and I will give a briefing about deanonymizing users not only on the web but also in their email clients! #BHASIA

Seres István András (@istvan_a_seres) 's Twitter Profile Photo

✅ Write constant-time crypto code ☠️ Compiler introduces timing side-channels Do Compilers Break Constant-time Guarantees? fc25.ifca.ai/preproceedings… TL;DR: Yes!🥲 👏👏👏Great work Michael Schwarz & team!

✅ Write constant-time crypto code
☠️ Compiler introduces timing side-channels

Do Compilers Break Constant-time Guarantees?
fc25.ifca.ai/preproceedings…

TL;DR: Yes!🥲

👏👏👏Great work <a href="/misc0110/">Michael Schwarz</a> &amp; team!
Kav (@kavehrazavi) 's Twitter Profile Photo

I am chairing the second edition of the microarchitecture security conference (uASC'26). Paper deadline for the first cycle is July 15. Please spread the word, submit, and/or join us in charming Leuven in February 2026! More info: uasc.cc

Daniel Weber (@weber_daniel) 's Twitter Profile Photo

Thrilled to present our (Lukas G., Leon Trampert ,Youheng L, Jo Van Bulck ,Michael Schwarz) newest paper ("SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution") at #USENIX Security this week! 1/n

Michael Schwarz (@misc0110) 's Twitter Profile Photo

Registration is open for MICSEC Winter School 2025 (Dec 1–5)! An incredible week in side-channel and microarchitectural security with talks and hands-on sessions from world-class experts. Register now: micsec.wp.imt.fr