Emanuele Vannacci

97 posts

Emanuele Vannacci

Emanuele Vannacci

@vanema94

PhD student at @vu5ec - (u)arch attacks && memory_safety

Amsterdam, The Netherlands Katılım Ekim 2011
442 Takip Edilen185 Takipçiler
Emanuele Vannacci retweetledi
Tavis Ormandy
Tavis Ormandy@taviso·
This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... 🧵1/n
Tavis Ormandy tweet media
English
245
3.1K
15.4K
3.3M
Emanuele Vannacci
Emanuele Vannacci@vanema94·
My code doesn't work in one specific case. I find a bug. I fix the bug. Code does not work anymore. Why did my code work before? Another bug cancels the first bug in all but that one case. Hypothesis: My code works iff the number of bugs is even.
English
0
0
7
495
Emanuele Vannacci
Emanuele Vannacci@vanema94·
I'm thrilled to announce that our paper "Speculation@Fault" @USENIXSecurity is online! Read about how we automatically find information leakages arising from CPU exceptions by fuzzing against speculative contracts.
Jana Hofmann@jana_tweets_cs

Now that the embargo is finally lifted🥳: I'm excited to share details about our most recent work (appearing at USENIX this week) on modeling and testing microarchitectural information leakage of CPU exceptions (think Meltdown 👻and alike).

English
1
6
19
2.9K
Emanuele Vannacci retweetledi
VUSec
VUSec@vu5ec·
Introducing #FPVI and #SCSB, two new transient execution vulnerabilities based on previously unexplored causes of Machine Clear. See vusec.net/projects/fpvi-…. We use FPVI to read arbitrary memory in Firefox via attacker-controlled and transiently-injected floating-point results:
GIF
English
2
42
112
0
Emanuele Vannacci retweetledi
VUSec
VUSec@vu5ec·
While we showed earlier that DDR4 is vulnerable to Rowhammer, we could not launch attacks from JavaScript. Until now. By synchronizing memory requests with DRAM refresh commands, we show that web users are at risk also. Page: vusec.net/projects/smash/ Demo: youtube.com/watch?v=k2D4D-…
YouTube video
YouTube
English
0
58
127
0
Emanuele Vannacci retweetledi
e. v. m.
e. v. m.@evm_sec·
Most Innovative Research #pwnie goes to @vu5ec team for the TRRespass work (Rowhammer mitigations in RAM sticks aren't actually working)
English
0
7
25
0
Emanuele Vannacci retweetledi
VUSec
VUSec@vu5ec·
#BlindSide’s source code is now online. We also released 2 new kernel exploit demo videos, e.g., Exploit 2: a single buffer overflow to speculatively break arbitrary randomization and mount an architectural data-only exploit to leak the root password hash: vusec.net/projects/blind…
GIF
English
0
58
138
0
Emanuele Vannacci
Emanuele Vannacci@vanema94·
@bz2 @VUamsterdam even without considering that surgical masks protect other people from you, so they work only if everyone wear them.
English
1
0
0
0
Bertram Bourdrez
Bertram Bourdrez@bz2·
@VUamsterdam Dit is schandelijk. Als je het niet verplicht stelt (en dat zouden we moeten doen), waarom het niet adviseren? Het kost niks om zo'n advies uit te vaardigen. Waarom zou juist een universiteit de wetenschap op dit gebied negeren?
Nederlands
1
2
5
0
Vrije Universiteit Amsterdam (inactief)
3/3 Femke Halsema gaf gister het advies om in publiek toegankelijke binnenruimten een mondkapje te dragen. Als universiteit vallen we hier niet onder. Op de VU geldt dat iedereen zelf een keuze mag maken wat betreft het dragen van een mondkapje. vu.nl/coronavirus
Nederlands
1
6
6
0
Emanuele Vannacci retweetledi
Kav
Kav@kavehrazavi·
Best paper award @IEEEEUROSP! @rk_konoth didn't give up after the 1st, 2ed .. rejects. Kept improving the paper, formal verification, more features, integrations. Apparently there is sometimes a big light at the end of the tunnel! Talk on Thursday at 16:30 CEST
Radhesh Krishnan@rk_konoth

Our paper #SecurePay won the best paper award at @IEEEEUROSP 2020. Thank you @elathan @herbertbos @kavehrazavi et al. @vu5ec! Enjoy download.vusec.net/papers/securep…

English
1
12
65
0
Emanuele Vannacci retweetledi
VUSec
VUSec@vu5ec·
Our #TagBleed paper is now online. We show Tagged TLB's performance benefits come at a security cost. TL;DR Confused-deputy side-channel attacks based on Tagged TLBs can break #KASLR even in face of ideal #KPTI or state-of-the-art KASLR mitigations: download.vusec.net/papers/tagblee…
English
2
41
94
0