Roland Czerny

10 posts

Roland Czerny

Roland Czerny

@_rolicz

PhD student in the CoreSec group @ #TUGraz https://t.co/xCOyhnTm8w

Graz, Österreich Katılım Ağustos 2011
49 Takip Edilen48 Takipçiler
Roland Czerny retweetledi
Stefan Gast
Stefan Gast@notbobbytables·
Announcing #CounterSEVeillance, a novel attack on AMD SEV-SNP inferring control-flow information and operand properties from performance-counter data with single-instruction resolution. Thanks to @hweissi, Robin Leander Schröder and @lavados for the amazing collaboration!
English
3
10
37
3.6K
Roland Czerny retweetledi
ISEC TU Graz
ISEC TU Graz@isec_tugraz·
@redrabbyte just received the Best Paper Award @ASIACCS2024 🎉Congrats to everyone that worked on the paper!!
ISEC TU Graz tweet mediaISEC TU Graz tweet media
English
0
4
18
1.8K
Roland Czerny retweetledi
TU Graz
TU Graz@tugraz·
🚨‼️ New security loophole allows spying on internet users visiting websites and watching videos ‼️🚨 The security loophole known as "SnailLoad" allows bypassing firewalls, VPN connections and browser privacy modes. No malicious code is required to exploit this vulnerability and the data traffic does not need to be intercepted. All types of end devices and internet connections are affected simply by monitoring fluctuations in the speed of the internet connection. ➡️ tugraz.at/en/tu-graz/ser… ⬅️ The research team led by Stefan Gast and Daniel Gruss will present the scientific paper on the loophole at the conferences Black Hat USA 2024 and USENIX Security Symposium. #SnailLoad Image: The team from the Institute of Applied Information Processing and Communications at TU Graz that discovered and analysed the security loophole (from left): Fabian Rauscher (@v4m1n), Jonas Juffinger, Stefan Gast (@notbobbytables), Simone Franza (@silent_bits), Daniel Gruss (@lavados), Roland Czerny (@_rolicz); IAIK - TU Graz
TU Graz tweet media
English
1
23
55
6.1K
Roland Czerny retweetledi
Lukas Giner
Lukas Giner@redrabbyte·
Our new paper "Generic and Automated Drive-by GPU Cache Attacks from the Browser" has been accepted at @ASIACCS2024! 🎉 We show basic cache attack primitives on NVIDIA&AMD, and more complex attacks on NVIDIA. You can read it and try a tiny POC here ginerlukas.com/gpuattacks/.
English
2
22
61
10.5K
Roland Czerny retweetledi
Cat Easdon
Cat Easdon@cat_easdon·
Honored to receive best paper award for our CustomProcessingUnit paper at WOOT! Check out our static and dynamic analysis frameworks for Intel microcode 😃 Shout out to @borrello_pietro (1st author and newly minted Dr 🎓), @marv0x90, @_rolicz, @misc0110 for this awesome collab
USENIX WOOT Conference on Offensive Technologies@wootsecurity

🏆🏆*WOOT 2023 BEST PAPER AWARD* 🏆🏆 "CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode" Congratulation to the authors!!! @borrello_pietro @cat_easdon @marv0x90 @misc0110

English
0
1
15
601
Roland Czerny retweetledi
Pietro Borrello
Pietro Borrello@borrello_pietro·
I'm super happy to share that our work "CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode" has been accepted at #WOOT23! 🎉 We extend our #BHUSA work to show how microcode tracing and patching can be useful to improve CPU performance and security 👀
Pietro Borrello tweet media
English
5
79
232
35.3K
Roland Czerny retweetledi
Edward Snowden
Edward Snowden@Snowden·
You may have heard about @Intel's horrific #Meltdown bug. But have you watched it in action? When your computer asks you to apply updates this month, don't click "not now." (via spectreattack.com & @misc0110)
English
116
4.5K
4.6K
0