Pietro Frigo
@pit_frg
Security researcher. PhD student @vu5ec
ID: 178131949
13-08-2010 23:34:36
44 Tweet
455 Followers
477 Following
Introducing #NetCAT: the first PRIME+PROBE cache attack over the network using #Intel #DDIO technology. Here is NetCAT leaking keystrokes from a victim SSH client in real-time: youtu.be/QXut1XBymAk Michael Ben Gras Dennis Cristiano Giuffrida Herbert Bos Kav
This is how I and Emanuele Vannacci spent the better part of our last ~2 years! Check out our results! /cc VUSec SAFARI Research Group
In other news I am leaving VU and its great people to start a new group ETH Zurich focused primarily on hardware security. I am hiring motivated PhD students. DM me if you find hardware attacks like #TRRespass or #NetCAT cool and want to actually engineer secure computers! Please RT
Congrats on the #sp20 best paper award for TRRespass Emanuele Vannacci Pietro Frigo! VUSec
Looking forward for me and Pietro Frigo to present "A journey into the secret flaws of in-DRAM RowHammer mitigations" at @HITBSecConf2020 ! Don't miss it! #HITBLockdown002
These guys managed to steal some of our best from academia recently (Victor van der Veen Radhesh Krishnan). Their internship program must be good...
A prestigious PhD Thesis award for the remarkable Victor van der Veen, well deserved.
Happy to announce that our (Pietro Frigo nSinus-R (@[email protected]) VUSec) talk "A Dirty Little History" was accepted at #BHUSA ! We're going to show how "Branch History Injection" can bypass Spectre-v2 HW defenses deployed on the latest Intel and ARM CPUs. blackhat.com/us-22/briefing…
If you are at USENIX Security or Black Hat this week and interested in microarchitectural security, feel free to check out Pietro Frigo and Enrico Barberis talks on Spectre-BHI and get more insights on our work! Talks will be Wed (Usenix) and Thu (BlackHat) afternoon.
Ping me if you’re around! I’ll be at USENIX Security today and tomorrow and in Vegas from Thursday