Lucian Cojocar

101 posts

Lucian Cojocar

Lucian Cojocar

@LCojocar

Katılım Ocak 2014
152 Takip Edilen169 Takipçiler
Lucian Cojocar
Lucian Cojocar@LCojocar·
@sirmc @vu5ec @IEEESSP Thanks! This would not have been possible without the Rowhammer knowledge that is available in @vu5ec. I think everyone helped me getting over the reverse-engineering-induced gloominess :-).
English
1
1
14
0
Lucian Cojocar retweetledi
Herbert Bos
Herbert Bos@herbertbos·
Still a few days to apply for the assistant/associate prof position in security at @vu5ec (vusec.net). Explicitly also open for promising _young_ researchers. Also in other areas of security. Do not feel shy about applying! tinyurl.com/y4cj9a38 Deadline: 22/02
English
0
17
14
0
Lucian Cojocar retweetledi
0xcensored
0xcensored@0xcensored·
#offensivecon19 faulting bit on an ecc ram with a wire and a lighter.
0xcensored tweet media
English
0
7
19
0
Lucian Cojocar
Lucian Cojocar@LCojocar·
@kavehrazavi That's true. And sometimes, reverse engineering doesn't get enough credit in our work. E.g., "We bypassed the memory initialization by reverse engineering and modifying the parts of the binary BIOS code that performs DRAM initialization" hides many man-hours work.
English
0
1
4
0
Kav
Kav@kavehrazavi·
We could find and fix the problems so much faster if we didn't have to spend a large fraction of our time reverse engineering what is already known by hardware manufacturers.
Cristiano Giuffrida@c_giuffrida

@vu5ec @LCojocar @kavehrazavi @herbertbos Yes, without @LCojocar's heroic reverse engineering efforts this project would have never seen the light. Hardware security by obscurity here to stay for the foreseeable future

English
1
2
10
0
Lucian Cojocar
Lucian Cojocar@LCojocar·
@kavehrazavi Reverse engineering can be depressing and quite solitary. The support from all of you @vu5ec was always there :-), I appreciate the encouragement that I got throughout the process. It was painfully fun!
English
0
0
9
0
Kav
Kav@kavehrazavi·
Credit where credit's due: @LCojocar has been poking server boards with syringe needles to reverse engineer their ECC. And discovering side channels for single bit flip detection, allowing for reliable #Rowhammer exploitation on #ECC memory. More info: vusec.net/projects/eccpl…
English
2
6
23
0
Lucian Cojocar retweetledi
Ivan Krstić
Ivan Krstić@radian·
We’ve released the first Security Overview for the Apple T2 Security Chip! Mac secure boot, storage encryption, and more, e.g.: “Mac portables with the T2 chip have a hardware disconnect that ensures the microphone is disabled when the lid is closed.” apple.com/mac/docs/Apple…
English
5
140
279
0
Lucian Cojocar retweetledi
Today In Infosec
Today In Infosec@todayininfosec·
2002: Sun Microsystems CSO Whitfield Diffie announced that Sun was donating its elliptical curve cryptography technology to the OpenSSL project.
Today In Infosec tweet media
English
6
262
685
0
Lucian Cojocar retweetledi
Ken Shirriff
Ken Shirriff@kenshirriff·
My die photos of the @Intel 8087 floating point chip from 1980. Almost all floating point is based on this chip and today's desktop computers still run 8087 instructions. I reverse engineered the bias generator inside and explain how it works. righto.com/2018/08/inside…
Ken Shirriff tweet mediaKen Shirriff tweet mediaKen Shirriff tweet mediaKen Shirriff tweet media
English
19
368
997
0
Lucian Cojocar retweetledi
Aurélien Francillon
Aurélien Francillon@aurelsec·
"Screaming Channels" paper #CCS18/@BlackHatEvents is online s3.eurecom.fr/tools/screamin… Electromagnetic side channels from a CPU can leak to a radio transmitter. CPU and radio transmitters are often integrated (think WiFi, BlueTooth) We recover an AES key from 10 meters on a BT chip
Aurélien Francillon tweet mediaAurélien Francillon tweet mediaAurélien Francillon tweet mediaAurélien Francillon tweet media
English
18
473
794
0