SECTRS @ ETH Zurich (@sectrs_ethz) 's Twitter Profile
SECTRS @ ETH Zurich

@sectrs_ethz

Secure & Trustworthy Systems Group @CSatETH @ETH Zürich.
Led by Shweta Shinde @shw3ta_shinde

ID: 1351147742152847360

linkhttps://sectrs.ethz.ch/ calendar_today18-01-2021 12:43:56

12 Tweet

80 Followers

0 Following

Srdjan Čapkun (@srdjancapkun) 's Twitter Profile Photo

Too much control over smartphones is in hands of few companies. Gatekeeping limits developers, users, governments. A different phone architecture can hand control back to the users while still protecting existing ecosystems. With Shweta Shinde Ivan Puddu. arxiv.org/abs/2102.02743

Too much control over smartphones is in hands of few companies. Gatekeeping limits developers, users, governments. A different phone architecture can hand control back to the users while still protecting existing ecosystems.  With <a href="/shw3ta_shinde/">Shweta Shinde</a> <a href="/dn0sar/">Ivan Puddu</a>.  
arxiv.org/abs/2102.02743
ETH Zurich (@eth_en) 's Twitter Profile Photo

An international research team whose members include an ETH Zurich professor has revealed a vulnerability in the #SecurityArchitecture of Intel #processors. Until July, Microsoft and Google products were also affected. ETH CS Department NUS ethz.ch/en/news-and-ev…

Shweta Shinde (@shw3ta_shinde) 's Twitter Profile Photo

We have released the details of our upcoming ACM CCS 2025 2021 paper about a new software attack on SGX Our attack, SmashEx, exploits reentrancy bugs in enclave exception handling Check out our webpage for technical details: jasonyu1996.github.io/SmashEx Jinhua Jason Yu Prateek

ETH CS Department (@csateth) 's Twitter Profile Photo

Thank you Shweta Shinde for yesterday's insightful inaugural lecture titled “Trust, but Verify: Building the Foundations for Secure Software”. Watch the recording here bit.ly/3E3WEVn UC Berkeley NUS ETH Zurich #trustedcomputing #systemsecurity #programanalysis

Thank you <a href="/shw3ta_shinde/">Shweta Shinde</a> for yesterday's insightful inaugural lecture titled “Trust, but Verify: Building the Foundations for Secure Software”. Watch the recording here bit.ly/3E3WEVn <a href="/UCBerkeley/">UC Berkeley</a>  <a href="/NUSingapore/">NUS</a> <a href="/ETH_en/">ETH Zurich</a> #trustedcomputing #systemsecurity #programanalysis
Shweta Shinde (@shw3ta_shinde) 's Twitter Profile Photo

It's rewarding that our secure smartphone efforts are gaining recognition on a broader platform. Proud of the whole team: Friederike Groschupp, Mark, Moritz Schneider, Ivan Puddu, Srdjan Čapkun #cybersecurity #ETHZ #swisscybersecuritydays #scsd24

Shweta Shinde (@shw3ta_shinde) 's Twitter Profile Photo

Can a malicious cloud provider send bad notifications to break confidential VMs? Disclosing #AhoiAttacks that break confidential computing offered by AMD SEV-SNP and Intel TDX by abusing interrupt delivery. Check our USENIX Security & IEEE S&P papers. ahoi-attacks.github.io/?1337

Shweta Shinde (@shw3ta_shinde) 's Twitter Profile Photo

Our first attack #Heckler to appear USENIX Security breaks Intel TDX and AMD SEV-SNP by sending interrupts that trigger existing handlers to change the register state and variables in userspace. We break sshd, sudo, and other apps Details & Demo at ahoi-attacks.github.io/heckler/?1337

Shweta Shinde (@shw3ta_shinde) 's Twitter Profile Photo

Our second attack #WeSee to appear IEEE S&P breaks AMD SEV-SNP by sending an interrupt specially introduced for SEV. Starting from a kernel read to arbitrary code injection, we gain a root shell. Details & Demo at ahoi-attacks.github.io/wesee/?1337

Shweta Shinde (@shw3ta_shinde) 's Twitter Profile Photo

We provide an overview of this new family of attacks ahoi-attacks.github.io/blog/ahoi-over… Track CVE-2024-25742, CVE-2024-25743, CVE-2024-25744 for more updates on fixes and patches A fantastic effort by SECTRS @ ETH Zurich team: Benedict Schlueter Supraja Andrin Bertschi Zauney