Twitter | Pretraživanje | |
Cristiano Giuffrida
Assistant Professor in Systems Security & Reliability . Co-leads
514
Tweetovi
281
Pratim
648
Osobe koje vas prate
Tweetovi
Cristiano Giuffrida proslijedio/la je tweet
Thorsten Holz 2. velj
Now that the decisions for the fall deadline are sent out a quick reminder: we organize an artifact evaluation, you can register your paper until February 4 and then submit the artifact by February 7. Details are available at
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
Lorenzo Cavallaro 27. sij
Are you working on thought-provoking and/or preliminary yet promising systems security research? Wait no longer and submit your work to 2020 (co-located with )! Deadline Feb 20, 2020 - w00t w00t :-)
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
VUSec 27. sij
Another day, another embargo and addendum! “New” (not really!) variants of the day: L1D evictions (Fig 6, RIDL paper) or and vector registers or . See . As a bonus: a faster RIDL exploit that leaks a root hash in 4s:
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
EuroSec Workshop 27. sij
This year it took us a little while longer, but of course we are going to have another great workshop at 2020 🙃 You find the here:
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
Davide Balzarotti 23. sij
The Security Circus 2019 update is now online:
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
VUSec 14. sij
Our NDSS paper, ABSynthe is now online: ABSynthe takes a target program and a microarchitecture and automatically synthesizes new side channels. With cool leakage maps!
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
DIMVA Conference 6. sij
The DIMVA 2020 Call for Papers is out. Submission deadline: 16/02/2020. Get the :
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
Erik Bosman 18. pro
I have retroactively fixed everybody's complaint about movie hacking/reverse engineering not being realistic.
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
VUSec 4. pro
We compiled a long list of Threats to Validity/Relevance in Security Research for our students, building on common sense & our papers on malware experiments and on benchmarking (and inspired by 's excellent blog). Perhaps useful for others?
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
Financial Times 13. stu
Intel is still working to close a potentially damaging loophole in its chip architecture that could allow hackers to steal data, almost two years after the issue was disclosed
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
Stephan van Schaik 12. stu
In other news Rogue In-Flight Data Load won the 2nd place for Applied Research at 2019. I met many nice and interesting people at the poster presentation :).
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
Kim Zetter 12. stu
Odgovor korisniku/ci @KimZetter
Even the patch Intel released today still doesn't address all of the vulns the researchers submitted to the company - and it still leaves unfixed the core issue from which all of the vulnerabilities arise.
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
Kim Zetter 12. stu
When Intel released patch for CPU vulns last May, it said the patch fixed all the vulns. But researchers at say this isn't true and Intel knew it. Intel asked them not to disclose this and to alter conf. paper about the vulns. My story for
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
VUSec 12. stu
Long embargos without transparency hurt endusers who remain unknowingly exposed to serious flaws. covers our saga with in her piece. remains a problem after 1+ year, 2 flawed patches and 2 embargos (+1 still ongoing).
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
Andy Greenberg 12. stu
Microarchitectural processor vulnerabilities like Spectre and Meltdown were bad, but at least Intel fixed them promptly. Now it seems another deep-seated chip flaw lingered in Intel’s silicon for more than a year after the company was warned about it.
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
Kav 12. stu
deserves a lot of credit for this. She is better at finding variants than engineers. Also kudos to Jonas Theis, our master student who put together the fast /etc/shadow exploit as a term project!
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
VUSec 12. stu
Odgovor korisniku/ci @themadstephan @noopwafel i 5 ostali
Video shows leaking root password hash in default settings in 30s!
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
Gernot Heiser 30. lis
Immensely honoured to have been involved in this work, and it being recognised for its long-term impact
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
Laura Ferranti 24. lis
Are you interested in and applications? Would you like to explore and issues in these domains? Then check our vacancy for a Postdoc on "Privacy-preserving Algorithms for Motion Planning":
Reply Retweet Označi sa "sviđa mi se"
Cristiano Giuffrida proslijedio/la je tweet
Mathias Payer 24. lis
Visiting as a committee member for the wizard convention^Z 's defense, who successfully passed with just a little help from his paranymphs. Congratulations!
Reply Retweet Označi sa "sviđa mi se"