Twitter | Search | |
Dmitry Evtyushkin
Assistant professor . I specialize in systems security, , computer architecture and hardware security.
126
Tweets
236
Following
116
Followers
Tweets
Dmitry Evtyushkin retweeted
Taylor Hornby Jan 25
Microarchitectural attack research like Flush+Reload and Meltdown fascinates me because it's forced to study something man-made as if it were something we just found in nature.
Reply Retweet Like
Dmitry Evtyushkin retweeted
Anders Fogh Jan 23
Interesting that Apple describes meltdown as requiring indirect branches. That is wrong.
Reply Retweet Like
Dmitry Evtyushkin retweeted
Adwait Jog Jan 14
We are organizing the 2nd workshop on minimizing data movement (Min-move 2018 -- ). Please consider submitting. Retweet and Spread the word!
Reply Retweet Like
Dmitry Evtyushkin retweeted
Misterch0c Jan 12
Rolling your own encryption
Reply Retweet Like
Dmitry Evtyushkin retweeted
Anders Fogh Jan 11
Reply Retweet Like
Dmitry Evtyushkin retweeted
Trammell Hudson ⚙ Jan 8
Speculative execution considered harmful in 1995: "Prefetching may fetch otherwise inaccesible instructions in Virtual 8086 mode."
Reply Retweet Like
Dmitry Evtyushkin retweeted
Murmus Ctf Jan 5
Super weird seeing politics twitter and infosec twitter on the same timeline right now. It's hard to parse "speculative branch execution" and "speculation about executive branch" when they're in side-by-side tweets.
Reply Retweet Like
Dmitry Evtyushkin retweeted
Alex Ionescu Jan 4
We built multi-tenant cloud computing on top of processors and chipsets that were designed and hyper-optimized for single-tenant use. We crossed our fingers that it would be OK and it would all turn out great and we would all profit. In 2018, reality has come back to bite us.
Reply Retweet Like
Dmitry Evtyushkin retweeted
Alexander Tarasikov Jan 3
Sad that your CPU is broken? These microarchitectures were advertised as "Out-of-Order" from the very beginning.
Reply Retweet Like
Dmitry Evtyushkin retweeted
brainsmoke Jan 4
With computing trends going through alternating phases (dynamic vs. static typing, microcode vs. RISC), let's hope we've reached peak shared resources across security boundaries and the pendulum swings the other way.
Reply Retweet Like
Dmitry Evtyushkin Jan 3
2016-10-15 - "Jump over ASLR: Attacking Branch Predictors to Bypass ASLR" by Dmitry Evtyushkin et al.
Reply Retweet Like
Dmitry Evtyushkin retweeted
matt blaze Dec 20
In my professional opinion, suing those who discuss software vulnerabilities is itself a reliable indication of dangerously vulnerable software and incompetent security practices. For that reason, I will be avoiding Keeper Security products.
Reply Retweet Like
Dmitry Evtyushkin retweeted
Steve Stewart-Williams Dec 20
Great example of the power of ideological diversity: Wikipedia articles produced by politically diverse teams are of higher quality than those produced by like-minded ones HT cc.
Reply Retweet Like
Dmitry Evtyushkin Dec 5
My recent paper also has a logo, not that pretty though :)
Reply Retweet Like
Dmitry Evtyushkin retweeted
Adwait Jog Dec 4
I am co-organizing the second version of the workshop on minimizing data movement (Min-Move). It will be co-located with ASPLOS 2018. Stay tuned for more details. :
Reply Retweet Like
Dmitry Evtyushkin retweeted
Constantin Milos Dec 2
RT : : Fighting a That Causes $450B of Annual Damage | *
Reply Retweet Like
Dmitry Evtyushkin retweeted
Noah Smith Nov 23
Public debate is slowly but inexorably being taken over by bots:
Reply Retweet Like
Dmitry Evtyushkin retweeted
Brendan Dolan-Gavitt Nov 22
This is all really good advice on writing an SOP/Research Statement if you're applying to a PhD program in CS!
Reply Retweet Like
Dmitry Evtyushkin retweeted
☣ The Hacker Tools Nov 20
OnionShare - Securely and anonymously share a file of any size
Reply Retweet Like
Dmitry Evtyushkin retweeted
ACLU Nov 21
Reply Retweet Like