|
Berk Sunar
@
berksunar
Massachusetts, USA
|
|
Vernam Applied Crypto and Cybersecurity Lab; Founder quantumsafe.io
|
|
|
120
Tweetovi
|
42
Pratim
|
106
Osobe koje vas prate
|
| Tweetovi |
| Berk Sunar proslijedio/la je tweet | ||
|
Catalin Cimpanu
@campuscodi
|
3. velj |
|
BREAKING: Twitter says a suspected state-sponsored actor used its API to match usernames to phone numbers
- Attack took place on December 24, 2019
- Twitter said attack came from IPs in Iran, Israel, and Malaysia
zdnet.com/article/twitte… pic.twitter.com/ulWUmfF5L6
|
||
|
|
||
| Berk Sunar proslijedio/la je tweet | ||
|
IronCore Labs
@IronCoreLabs
|
17. sij |
|
Check out our highlights from the #RealWorldCrypto conference this year. #dataprivacy #cryptography #encryption #E2EE @zmre @RealWorldCrypto hubs.ly/H0mDFkM0
|
||
|
|
||
| Berk Sunar proslijedio/la je tweet | ||
|
Herbert Bos
@herbertbos
|
14. sij |
|
Now that i have some more followers thanks to @raistolo!, let me advertise the latest @vu5ec paper. For everyone interested in contention-based side channels. :) twitter.com/vu5ec/status/1…
|
||
|
|
||
| Berk Sunar proslijedio/la je tweet | ||
|
The Register
@TheRegister
|
13. sij |
|
If you haven't shored up that Citrix hole, you were probably hacked over the weekend: Exploit code now available reg.cx/2XGA
|
||
|
|
||
| Berk Sunar proslijedio/la je tweet | ||
|
Fermat's Library
@fermatslibrary
|
11. sij |
|
A visual proof why 1+3+5+...+(2n-1)=n²
⚪⚫⚪⚫⚪⚫
⚫⚫⚪⚫⚪⚫
⚪⚪⚪⚫⚪⚫
⚫⚫⚫⚫⚪⚫
⚪⚪⚪⚪⚪⚫
⚫⚫⚫⚫⚫⚫
|
||
|
|
||
| Berk Sunar proslijedio/la je tweet | ||
|
Peter Shor
@PeterShor1
|
4. pro |
|
I am sure lots of mathematicians are currently working on famous problems without telling anybody. Is this a good aspect of the culture of mathematics? Maybe if all the mathematicians working secretly on the Riemann hypothesis got together and compared notes, they could solve it.
|
||
|
|
||
| Berk Sunar proslijedio/la je tweet | ||
|
Jo Van Bulck
@jovanbulck
|
10. sij |
|
I also added an overview table with all projects that I know of using SGX-Step. I'm planning to keep this list up-to-date. Feel free to reach out if you know of other projects that are not listed below! pic.twitter.com/xAMWcGYjQT
|
||
|
|
||
| Berk Sunar proslijedio/la je tweet | ||
|
Jo Van Bulck
@jovanbulck
|
10. sij |
|
SGX-Step v1.4.0 released with support for x86 ring-0 interrupt handlers and call gates! Allows to build a mini-OS for side-channel research, including easily executing selected functions from a user-space program in privileged ring-0 :-) github.com/jovanbulck/sgx… pic.twitter.com/hwl1v6ryk4
|
||
|
|
||
|
Berk Sunar
@berksunar
|
9. sij |
|
Not sure if reducing number of rounds makes sense @veorq @realworldcrypto Impact on side-channel attacks?
|
||
|
|
||
| Berk Sunar proslijedio/la je tweet | ||
|
Yehuda Lindell
@LindellYehuda
|
8. sij |
|
Jean-Baptiste Bédrune on breaking HSMs @RealWorldCrypto. Not much has been done like this in the past. Why? (1) It's expensive. (2) HSM vendors don't give any information at all; zero transparency. (My opinion - the latter is the main reason.)
|
||
|
|
||
|
Berk Sunar
@berksunar
|
8. sij |
|
@danielmgmi just gave an excellent presentation of TPM.fail #realworldcrypto pic.twitter.com/I0xgRLqvDX
|
||
|
|
||
| Berk Sunar proslijedio/la je tweet | ||
|
Bruno Grieder
@bgrieder
|
8. sij |
|
Ralph Merkle who has just been awarded the Lechvin prize @RealWorldCrypto asking the audience who has heard of Merkle trees ? Obviously, all hands went up pic.twitter.com/xEJwSL6sSx
|
||
|
|
||
| Berk Sunar proslijedio/la je tweet | ||
|
IACR
@IACR_News
|
7. sij |
|
#ePrint SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust: G Leurent, T Peyrin ia.cr/2020/014
|
||
|
|
||
| Berk Sunar proslijedio/la je tweet | ||
|
Daniel Moghimi
@danielmgmi
|
6. sij |
|
Looking forward to give a talk about TPM-Fail this Wednesday(01/08/2020) at RWC 2020 rwc.iacr.org/2020/program.h…
tpm.fail #sidechannels #trustedcomputing #untrustedcomputing pic.twitter.com/dTDq9F9qW2
|
||
|
|
||
| Berk Sunar proslijedio/la je tweet | ||
|
Richard Feynman
@ProfFeynman
|
3. sij |
|
"When one teaches, two learn."
-- Robert Heinlein
|
||
|
|
||
| Berk Sunar proslijedio/la je tweet | ||
|
Catalin Cimpanu
@campuscodi
|
2. sij |
|
FPGA cards can be abused for faster and more reliable Rowhammer attacks
* Academics detail new JackHammer attack
* Twice as fast, 4 times more bit flips than Rowhammer
* FPGAs are commonly used in cloud services, but don't have same security as CPUs
zdnet.com/article/fpga-c… pic.twitter.com/uquRsT0CqD
|
||
|
|
||
| Berk Sunar proslijedio/la je tweet | ||
|
Frank Denis
@jedisct1
|
31. pro |
|
The Second SHA Collision privacylog.blogspot.com/2019/12/the-se…
|
||
|
|
||
|
Berk Sunar
@berksunar
|
30. pro |
|
Our attack "JackHammer" sounds even cooler if you pronounce it with a French accent :) twitter.com/david_schor/st…
|
||
|
|
||
| Berk Sunar proslijedio/la je tweet | ||
|
David Schor
@david_schor
|
30. pro |
|
An interesting paper that was just published in collab w/ Intel showing side-chan defense is critical for FPGAs & other accelerators. They demo 'JackHammer', novel hardware attacks between the mem I/F of the FPGA & host CPU. It's faster & more reliable.
arxiv.org/abs/1912.11523
|
||
|
|
||
| Berk Sunar proslijedio/la je tweet | ||
|
John Carlos Baez
@johncarlosbaez
|
27. pro |
|
In 1935, after the famous Einstein-Podolsky-Rosen paper arguing that quantum mechanics was incomplete, Schrödinger wrote to Einstein:
"I am very happy that in the paper just published in Physical Review you have evidently caught dogmatic q.m. by the coat-tails".
(1/n) pic.twitter.com/Mr9mqVzkwP
|
||
|
|
||