Jim Miller

93 posts

Jim Miller

Jim Miller

@TheMijCipher

Engineering Director for Cryptography at Trail of Bits

가입일 Nisan 2022
156 팔로잉387 팔로워
Jim Miller 리트윗함
Craig Gidney
Craig Gidney@CraigGidney·
Congrats to Ryan Keegan for being the first to exploit the simulator we used to validate the secret quantum circuits: blog.trailofbits.com/2026/04/17/we-… It kills me that the (now fixed) bugs were simple (we didn't port the op validation code from C++ to Rust!), but that's to be expected.
English
6
12
76
6.1K
Jim Miller 리트윗함
Yoichi Hirai
Yoichi Hirai@pirapira·
@trailofbits Going further, there’s a way to protect the guest program even against potential compiler bugs: formally verify the guest RISC-V assembly code, like I’m experimenting with in evm-asm.
English
1
2
13
5.2K
Jim Miller 리트윗함
Trail of Bits
Trail of Bits@trailofbits·
Google used a ZK proof to disclose a quantum breakthrough that cuts the cost of breaking cryptocurrency by 20x without handing attackers the circuit. We found anyone could forge a “proof” of an even stronger attack. 🧵
English
14
93
721
78.9K
Jim Miller 리트윗함
Tjaden Hess
Tjaden Hess@tjade273·
Lets break down these attacks: x.com/tjade273/statu… First up is wiretap.fail The key insight is that TEEs do not randomize their memory encryption. This is because the encrypted data needs to fit in the same space as the plaintext, so there is no room for a nonce or IV. The typical cipher mode is AES-XEX or the related AES-XTS. en.m.wikipedia.org/wiki/Xor%E2%80… Every memory location acts like an independently keyed cipher, so it’s not quite ECB Tux level bad, there is a sort of _temporal tux_ problem. Every time a value is encrypted at a particular memory location, the ciphertext is the same.
Tjaden Hess tweet media
Tjaden Hess@tjade273

IMO these two attacks spell the beginning of the end for SGX, TDX and SEV-SNP in self-hosted contexts. These DRAM bus attacks were always the glaring hole in the threat model, and I expect DDR5 to fall soon as well. These attacks are explicitly written out of the threat model so they won’t be patched by Intel and AMD, and it’s not clear how they could do so anyway.

English
2
9
22
4.8K
Jim Miller 리트윗함
Trail of Bits
Trail of Bits@trailofbits·
The $1.5B Bybit hack marks a new era in cryptocurrency security. Attackers have moved beyond technical exploits to sophisticated operational attacks. Read our initial analysis of this historic breach and its industry-wide implications: blog.trailofbits.com/2025/02/21/the…
English
9
69
253
330K
Jim Miller
Jim Miller@TheMijCipher·
I am honored to be selected as part of the program committee by the MPCA, so please don't hesitate to reach out with any questions. This will be a great event showcasing the practical side/challenges of MPC. I hope to see you all in Sofia ❤️
English
1
0
0
90
Jim Miller
Jim Miller@TheMijCipher·
The RWMPC workshop will be a 1 day event on March 25 in Sofia, Bulgaria. The content will cover a variety of practical MPC use cases: currently accepting potential talks across real-world deployments, standards, security, formal verification, legal implications, and more!
English
1
0
0
120
Jim Miller
Jim Miller@TheMijCipher·
Start the year off right and register/submit a talk for the Real World MPC workshop! The MPC Alliance is hosting this as a co-located event for Real World Crypto, and the CFP is now open and accepting talks across a wide variety of MPC topics 🙂. Details and links are in 🧵
English
1
2
7
1.6K
Jim Miller
Jim Miller@TheMijCipher·
The first ever Queer in Cryptography conference will be held in Rochester, NY on March 6th and 7th 2025! Register now and come celebrate the many great cryptography contributions from the LGBTQ+ community- allies welcome! cryptography.lgbt
English
0
7
33
3.8K
Jim Miller
Jim Miller@TheMijCipher·
@zama Or another, similar one would be the boxes with gloves that they use for handling nuclear material. For FHE this box would not have see-through glass and only allows for very specific operations with the gloves
Jim Miller tweet media
English
0
1
4
140
Jim Miller
Jim Miller@TheMijCipher·
@zama I like extensions to the typical "lockbox" encryption analogy. For instance, the lockbox contains metal objects of differing sizes, and the FHE analogy is using a magnet to move the objects around (sort them by size, for example). Noise/weight are potential side-channel attacks
English
1
0
3
125
Zama
Zama@zama·
Got a solid analogy to explain Fully Homomorphic Encryption (FHE) in one tweet or image? We know it's a complex topic, but if you can break it down, reply below ⬇️ We’ll mail swag to the best ones 📦🧢🟨
GIF
English
17
11
44
5.4K
Jim Miller 리트윗함
Dan Guido
Dan Guido@dguido·
.@trailofbits had one of the best weeks ever! From groundbreaking ML research to advancing post-quantum crypto, here's a summary of last week:🧵
English
1
11
81
11.5K
Jim Miller 리트윗함
Trail of Bits
Trail of Bits@trailofbits·
Two days ago, @NIST finalized three post-quantum cryptography standards. Today, we are announcing an open-source Rust implementation of one of these standards, SLH-DSA, now available in RustCrypto! blog.trailofbits.com/2024/08/15/we-…
English
1
31
105
9.2K
Jim Miller 리트윗함
Trail of Bits
Trail of Bits@trailofbits·
Will these algorithms start to become widely supported? Yes! Our crypto team anticipated this and implemented the stateless hash-based digital signature scheme (SLH-DSA or SPHINCS) in Rust, now part of RustCrypto. buff.ly/3SN6Lq1
English
1
1
0
156