Daniel De Almeida Braga

26 posts

Daniel De Almeida Braga

Daniel De Almeida Braga

@faulst

PhD student in applied cryptography in the SPICY team (former @EMSEC35) at IRISA Laboratory in Rennes. [email protected]

Katılım Ağustos 2018
64 Takip Edilen44 Takipçiler
Daniel De Almeida Braga retweetledi
Martin R. Albrecht
Martin R. Albrecht@martinralbrecht·
68 (UK affiliated) researchers working on security and privacy have raised alarms about provisions in the UK #OnlineSafetyBill: "our concern is that surveillance technologies are deployed in the spirit of providing online safety." Read our letter here: haddadi.github.io/UKOSBOpenlette…
Martin R. Albrecht tweet media
English
9
195
291
262.7K
Daniel De Almeida Braga retweetledi
Anjo Vahldiek-Oberwagner
Anjo Vahldiek-Oberwagner@ovahldy·
I guess our advertisements worked too well. We're in dire need of additional evaluators, due to a record high number of registrations. If you or someone in your group is eager to join the team, please fill out the self-nomination form before the weekend: forms.gle/wp5XpF5EmHJEZP…
Anjo Vahldiek-Oberwagner@ovahldy

Last chance. @USENIXSecurity 2023 artifact registrations deadline is tomorrow. We look forward to your great artifacts!

English
1
11
9
4.7K
Daniel De Almeida Braga retweetledi
DIMVA Conference
DIMVA Conference@DIMVAConf·
Are paper deadlines approaching too quickly, and do you need more time to polish your paper? DIMVA allows updating the body of your paper up to one week after submission! Submit until December 7, and polish until December 14
DIMVA Conference tweet media
English
0
2
6
0
Daniel De Almeida Braga retweetledi
Thomas Rokicki
Thomas Rokicki@ThomasRokicki·
I will be defending my PhD Thesis entitled "Side Channels in Web Browsers: Applications to Security and Privacy" in @irisa_lab tomorrow (29/11) at 2pm! I will host a livestream for remote viewers, feel free to come take a look: youtube.com/watch?v=C55s7k…
YouTube video
YouTube
IRISA@irisa_lab

Demain Soutenance de #thèse #doctorat #PhD #Rennes - Equide de recherche @spicy_irisa , @ThomasRokicki @INSA_Rennesirisa.fr/date/2022-11/c…

English
2
7
40
0
Daniel De Almeida Braga retweetledi
Lukasz Olejnik, Ph.D, LL.M 𝛁
Users of glassess beware! You may be leaking secret data during Zoom/Skype/etc videoconferences. Screen reflected in glasses, then visible during a videoconferencing. School-grade physics/optics sufficient to understand the exploit equations. arxiv.org/pdf/2205.03971…
Lukasz Olejnik, Ph.D, LL.M 𝛁 tweet mediaLukasz Olejnik, Ph.D, LL.M 𝛁 tweet mediaLukasz Olejnik, Ph.D, LL.M 𝛁 tweet mediaLukasz Olejnik, Ph.D, LL.M 𝛁 tweet media
English
4
99
284
0
Daniel De Almeida Braga retweetledi
Yasemin Acar
Yasemin Acar@yazz_acar·
Do you contribute to software that improves #security and/or #privacy? We’d love to chat with you about impacts of your software in a 45-ish minute interview study. 80USD gift card for qualifying participants. To join our research, sign up here: gwusec.seas.gwu.edu/ethicalimpactp…
English
1
38
69
0
SPICY_IRISA
SPICY_IRISA@spicy_irisa·
Wow! Dragondoom appears in the @PwnieAwards nominations for the category "Best Cryptography" Attack. Now @faulst is compelled to design a logo ;) @irisa_lab
English
1
0
5
0
Daniel De Almeida Braga retweetledi
Ján Jančár
Ján Jančár@j08ny·
"What do cryptographic library developers think about timing attacks?" Come to our talk at @IEEESSP, Ballroom BC in ~20 minutes! It's not an attack paper, but we have "attack" in the name.
Ján Jančár@j08ny

What do cryptographic library developers think about timing attacks? We asked and got responses from 44 in our IEEE S&P 2022 paper co-authored with Marcel Fourné, @faulst, Mohamed Sabt, @cryptojedi, Gilles Barthe, Pierre-Alain Foque and @yazz_acar. is.muni.cz/go/d54huq 1/4

English
1
5
25
0
Daniel De Almeida Braga retweetledi
SPICY_IRISA
SPICY_IRISA@spicy_irisa·
If you'are @IEEESSP, don't miss the presentation of our work "They're not that hard to mitigate": What Cryptographic Library Developers Think About Timing Attacks. A joint work with @j08ny, M. Fourné, @faulst, M. Sabt, @cryptojedi, G. Barthe, PA Fouque and @yazz_acar
English
1
5
21
0
Daniel De Almeida Braga retweetledi
Ján Jančár
Ján Jančár@j08ny·
What do cryptographic library developers think about timing attacks? We asked and got responses from 44 in our IEEE S&P 2022 paper co-authored with Marcel Fourné, @faulst, Mohamed Sabt, @cryptojedi, Gilles Barthe, Pierre-Alain Foque and @yazz_acar. is.muni.cz/go/d54huq 1/4
English
1
22
53
0
Daniel De Almeida Braga retweetledi
Daniel Moghimi
Daniel Moghimi@flowyroll·
Workshop on Attacks on Cryptography (WAC4) is about to start, crypto.iacr.org/2021/wac.php Session I, "Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)" @ic0nz1 and "PARASITE: PAssword Recovery Attack against Srp Implementations in ThE wild" @faulst
English
0
2
6
0
Daniel De Almeida Braga retweetledi
Matthew Green
Matthew Green@matthew_d_green·
My students @maxzks and Tushar Jois spent most of the summer going through every piece of public documentation, forensics report, and legal document we could find to figure out how police were “breaking phone encryption”. 1/
English
18
561
1.3K
0
Daniel De Almeida Braga
@skrobotmarjan @vanhoefm FYI, OPAQUE also needs a hash-to-curve procedure, and also use a secure one (the draft reference the same IETF hash-to-curve document, which is being created to avoid the issues we had with Dragonfly)
English
0
0
0
0
Marjan Skrobot
Marjan Skrobot@skrobotmarjan·
@vanhoefm What about CPace protocol? If I recall well, they also need a “hash-to-curve” procedure. Is there a similar issue as with Dragonfly?
English
3
0
1
0
Mathy Vanhoef
Mathy Vanhoef@vanhoefm·
More evidence that WPA3 and its Dragonfly handshake is hard to implement securely: IWD was still vulnerable to side-channel leaks. Additionally, the patch for FreeRADIUS was not backported to their v3 branch. This confirms our warning that Dragonfly is hard to implement securely
English
3
25
55
0