Daniel Weber

162 posts

Daniel Weber banner
Daniel Weber

Daniel Weber

@weber_daniel

Microarchitectural Security | PhD Student @cispa | Stealing Flags for @saarsec

Katılım Kasım 2018
365 Takip Edilen401 Takipçiler
Daniel Weber
Daniel Weber@weber_daniel·
We're [1] disclosing StackWarp, a CPU vulnerability allowing complete AMD SEV VM takeovers! The project was lead by @Rayiizzz, who is also on the academic job market, so hit him up if u want research like this on your campus! [1] @Rayiizzz, T. Hornetz, me, @fth0mas, @misc0110
Daniel Weber tweet media
English
1
4
8
853
Daniel Weber retweetledi
Ruiyi Zhang
Ruiyi Zhang@Rayiizzz·
Today we reveal StackWarp: a new CPU vulnerability exploiting a synchronization bug in AMD’s stack engine across Zen 1–5 CPUs. It enables deterministic manipulation of Confidential VM's stack pointer, allowing RCE and privilege escalation via both control- and data-flow hijacking
English
18
179
1.4K
146.4K
Daniel Weber
Daniel Weber@weber_daniel·
Thrilled to present our (Lukas G., @LTrampert ,Youheng L, @jovanbulck ,@misc0110) newest paper ("SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution") at #USENIX Security this week! 1/n
English
2
3
7
606
Daniel Weber
Daniel Weber@weber_daniel·
@LTrampert @jovanbulck @misc0110 Automation is the key to further bridge the gap between academic research and practical side-channel attacks! Thus, we automate side-channel attacks by leveraging a symbolic execution engine.
English
0
0
1
47
Daniel Weber
Daniel Weber@weber_daniel·
Heading to Black Hat Asia now! @LTrampert and I will give a briefing about deanonymizing users not only on the web but also in their email clients! #BHASIA
English
0
3
5
557
Daniel Weber retweetledi
Matteo Rizzo
Matteo Rizzo@_MatteoRizzo·
github.com/google/securit… Our newest research project is finally public! We can load malicious microcode on Zen1-Zen4 CPUs!
English
12
275
806
122.9K
Daniel Weber retweetledi
Andreas Kogler
Andreas Kogler@0xhilbert·
Excited to announce the release of the Rapid Data Analysis (RDA) framework! RDA streamlines side-channel analysis with plotting, processing, and analysis tools—usable directly from the terminal or in scripts. Check it out: github.com/0xhilbert/rda #SideChannel
Andreas Kogler tweet media
English
1
9
20
2.4K
Daniel Weber retweetledi
saarsec
saarsec@saarsec·
The *coolest* saarsec summer party ever!
saarsec tweet media
English
0
1
9
436
Daniel Weber retweetledi
Seblu
Seblu@seblu84·
The @Scaleway EM-RV1 OSes were patched several months ago. The default installation disables problematic instructions, and customers who installed their machines before have been contacted. Reminder: #update-the-kernel" target="_blank" rel="nofollow noopener">scaleway.com/en/docs/bare-m… I'd like to thank the @CISPA researchers who contacted us in advance to help manage the problem before making it public. It's sad that such a flaw exists on the TH1520's C910, but fortunately it stems from an error on a draft instruction set that can be software disabled. On the other hand, one of the advantages of open processors is that it allows external entities to look at the sources and see what has been done beyond the usual techniques. #ghostwrite #riscv #rvv #cybersecurity #security #cloud #baremetal
The Register@TheRegister

Faulty instructions in Alibaba's T-Head C910 RISC-V CPUs blow away all security dlvr.it/TBd09l

English
1
5
19
1.4K