Michael Schwarz

689 posts

Michael Schwarz

Michael Schwarz

@misc0110

InfoSec Faculty @ #CISPA. Side-channel attacks. Exploiting microarchitectures. #Meltdown #Spectre #ZombieLoad #SGX #JavaScript #Rowhammer

เข้าร่วม Mart 2014
458 กำลังติดตาม7.2K ผู้ติดตาม
ทวีตที่ปักหมุด
Michael Schwarz
Michael Schwarz@misc0110·
Getting tenure was a great journey. I want to thank my students, collaborators, and colleagues for their help! This wouldn't have been possible without them.
English
19
1
70
8.7K
Michael Schwarz รีทวีตแล้ว
Daniel Weber
Daniel Weber@weber_daniel·
We're [1] disclosing StackWarp, a CPU vulnerability allowing complete AMD SEV VM takeovers! The project was lead by @Rayiizzz, who is also on the academic job market, so hit him up if u want research like this on your campus! [1] @Rayiizzz, T. Hornetz, me, @fth0mas, @misc0110
Daniel Weber tweet media
English
1
4
8
853
Michael Schwarz
Michael Schwarz@misc0110·
StackWarp: A new CPU vulnerability affecting AMD SEV-SNP (Zen 1-5). A malicious host can manipulate the stack pointer inside the confidential virtual machine, breaking integrity and confidentiality guarantees. /cc @Rayiizzz stackwarpattack.com
Michael Schwarz tweet media
English
0
9
47
4.3K
Michael Schwarz รีทวีตแล้ว
Ruiyi Zhang
Ruiyi Zhang@Rayiizzz·
Today we reveal StackWarp: a new CPU vulnerability exploiting a synchronization bug in AMD’s stack engine across Zen 1–5 CPUs. It enables deterministic manipulation of Confidential VM's stack pointer, allowing RCE and privilege escalation via both control- and data-flow hijacking
English
18
179
1.4K
146.4K
Michael Schwarz รีทวีตแล้ว
Shah Sheikh
Shah Sheikh@shah_sheikh·
New StackWarp Attack Threatens Confidential VMs on AMD Processors: Researchers have disclosed technical details on a new AMD processor attack that allows remote code execution inside confidential VMs. The post New StackWarp Attack Threatens… securityweek.com/new-stackwarp-…
English
0
2
0
214
Michael Schwarz รีทวีตแล้ว
Andreas Kogler
Andreas Kogler@0xhilbert·
I‘ll be joining the Microarchitecture Security Conference (uasc) in Leuven this February - come by and say hello. 👋
English
0
2
14
851
Michael Schwarz
Michael Schwarz@misc0110·
Registration is open for MICSEC Winter School 2025 (Dec 1–5)! An incredible week in side-channel and microarchitectural security with talks and hands-on sessions from world-class experts. Register now: micsec.wp.imt.fr
English
0
0
2
449
Michael Schwarz รีทวีตแล้ว
Daniel Weber
Daniel Weber@weber_daniel·
Thrilled to present our (Lukas G., @LTrampert ,Youheng L, @jovanbulck ,@misc0110) newest paper ("SCASE: Automated Secret Recovery via Side-Channel-Assisted Symbolic Execution") at #USENIX Security this week! 1/n
English
2
3
7
606
Michael Schwarz รีทวีตแล้ว
Kav
Kav@kavehrazavi·
I am chairing the second edition of the microarchitecture security conference (uASC'26). Paper deadline for the first cycle is July 15. Please spread the word, submit, and/or join us in charming Leuven in February 2026! More info: uasc.cc
English
1
7
15
1.5K
Michael Schwarz รีทวีตแล้ว
Seres István András
Seres István András@Istvan_A_Seres·
✅ Write constant-time crypto code ☠️ Compiler introduces timing side-channels Do Compilers Break Constant-time Guarantees? fc25.ifca.ai/preproceedings… TL;DR: Yes!🥲 👏👏👏Great work @misc0110 & team!
Seres István András tweet media
English
1
7
22
1.7K
Michael Schwarz รีทวีตแล้ว
Daniel Weber
Daniel Weber@weber_daniel·
@LTrampert and I just gave a talk at Black Hat Asia showing how CSS can be abused to deanonymize you when opening an email! cc: @BlackHatEvents #BHASIA25
Daniel Weber tweet media
English
1
1
1
321
Michael Schwarz รีทวีตแล้ว
Daniel Weber
Daniel Weber@weber_daniel·
Heading to Black Hat Asia now! @LTrampert and I will give a briefing about deanonymizing users not only on the web but also in their email clients! #BHASIA
English
0
3
5
557
Michael Schwarz รีทวีตแล้ว
Daniel Gruss
Daniel Gruss@lavados·
The second #DIMVA25 deadline is upcoming: February 12 AoE. If you're planning to submit a paper, register it already: dimva.org/dimva2025/ DIMVA has a great community and is quite visible: 3 out of my 10 top cited papers are DIMVA papers! Hope to see many of you in Austria!
English
1
5
6
1.3K
Michael Schwarz
Michael Schwarz@misc0110·
@_MatteoRizzo Wow, great work! The PoC also works like a charm on the Ryzen 9 7940HS I tested. Looking forward to reading more details about that.
English
0
0
3
628
Michael Schwarz รีทวีตแล้ว
Matteo Rizzo
Matteo Rizzo@_MatteoRizzo·
github.com/google/securit… Our newest research project is finally public! We can load malicious microcode on Zen1-Zen4 CPUs!
English
12
275
806
122.9K
Michael Schwarz รีทวีตแล้ว
Daniel Gruss
Daniel Gruss@lavados·
The uASC registration is open now: uasc.cc Also the uASC deadline is approaching: January 27 AoE. We accept papers, posters, and talks. We have conference proceedings. We're interested in any insights broadly around microarchitecture security.
English
0
8
9
2.4K
Michael Schwarz รีทวีตแล้ว
Daniel Gruss
Daniel Gruss@lavados·
CFP for uASC 25 is still open. We have rolling reviews, and 1 submission is already accepted. If you have interesting results on microarchitecture security (incl. weak threat models or reproducing prior work), check out the CFP at uasc.cc The CFP closes **Jan 28**
English
1
6
13
1.5K
Michael Schwarz รีทวีตแล้ว
Daniel Gruss
Daniel Gruss@lavados·
Got some negative or unrealistic threat model results that still bring interesting insights? A side channel that requires root to leak something from the kernel? Reproducing prior work? Somewhat related to microarchitecture? Here's your venue: uasc.cc
English
1
19
27
3.8K