|
|
vusec - sfeed_tests - sfeed tests and RSS and Atom files |
|
|
 |
git clone git://git.codemadness.org/sfeed_tests (git://git.codemadness.org) |
|
|
 |
Log |
|
|
 |
Files |
|
|
 |
Refs |
|
|
 |
README |
|
|
 |
LICENSE |
|
|
|
--- |
|
|
|
vusec (29234B) |
|
|
|
--- |
|
|
|
1 <?xml version="1.0" encoding="UTF-8"?><rss version="2.0" |
|
|
|
2 xmlns:content="http://purl.org/rss/1.0/modules/content/" |
|
|
|
3 xmlns:wfw="http://wellformedweb.org/CommentAPI/" |
|
|
|
4 xmlns:dc="http://purl.org/dc/elements/1.1/" |
|
|
|
5 xmlns:atom="http://www.w3.org/2005/Atom" |
|
|
|
6 xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" |
|
|
|
7 xmlns:slash="http://purl.org/rss/1.0/modules/slash/" |
|
|
|
8 > |
|
|
|
9 |
|
|
|
10 <channel> |
|
|
|
11 <title>VUSec</title> |
|
|
|
12 <atom:link href="https://www.vusec.net/feed/" rel="self" type="application/rss+xml" /> |
|
|
|
13 <link>https://www.vusec.net</link> |
|
|
|
14 <description>Systems and Network Security Group at VU Amsterdam</description> |
|
|
|
15 <lastBuildDate>Wed, 12 Aug 2020 22:33:11 +0000</lastBuildDate> |
|
|
|
16 <language>en-US</language> |
|
|
|
17 <sy:updatePeriod> |
|
|
|
18 hourly </sy:updatePeriod> |
|
|
|
19 <sy:updateFrequency> |
|
|
|
20 1 </sy:updateFrequency> |
|
|
|
21 <generator>https://wordpress.org/?v=5.5.1</generator> |
|
|
|
22 |
|
|
|
23 <image> |
|
|
|
24 <url>https://www.vusec.net/wp-content/uploads/2016/09/cropped-vusec-logo_small-32x32.png</url> |
|
|
|
25 <title>VUSec</title> |
|
|
|
26 <link>https://www.vusec.net</link> |
|
|
|
27 <width>32</width> |
|
|
|
28 <height>32</height> |
|
|
|
29 </image> |
|
|
|
30 <item> |
|
|
|
31 <title>VUSec wins HAck@Sec</title> |
|
|
|
32 <link>https://www.vusec.net/2020/08/vusec-wins-hacksec/</link> |
|
|
|
33 |
|
|
|
34 <dc:creator><![CDATA[herbert.bos]]></dc:creator> |
|
|
|
35 <pubDate>Wed, 12 Aug 2020 22:33:10 +0000</pubDate> |
|
|
|
36 <category><![CDATA[Uncategorized]]></category> |
|
|
|
37 <guid isPermaLink="false">https://www.vusec.net/?p=1889</guid> |
|
|
|
38 |
|
|
|
39 <description><![CDATA[<p>We are happy to announce that the VUSec team won the Hack@Sec Hardware CTF @USENIXSecurity Congratulations to Alyssa, Enrico, Hany, Koen and Marius!</p> |
|
|
|
40 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/08/vusec-wins-hacksec/">VUSec wins HAck@Sec</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
41 ]]></description> |
|
|
|
42 <content:encoded><![CDATA[ |
|
|
|
43 <p>We are happy to announce that the VUSec team won the Hack@Sec Hardware CTF @USENIXSecurity</p> |
|
|
|
44 |
|
|
|
45 |
|
|
|
46 |
|
|
|
47 <p>Congratulations to Alyssa, Enrico, Hany, Koen and Marius!</p> |
|
|
|
48 |
|
|
|
49 |
|
|
|
50 |
|
|
|
51 <figure class="wp-block-image size-large"><img loading="lazy" width="799" height="445" src="https://www.vusec.net/wp-content/uploads/2020/08/hack_at_sec_2020.png" alt="" class="wp-image-1890" srcset="https://www.vusec.net/wp-content/uploads/2020/08/hack_at_sec_2020.png 799w, https://www.vusec.net/wp-content/uploads/2020/08/hack_at_sec_2020-768x428.png 768w" sizes="(max-width: 799px) 100vw, 799px" /></figure> |
|
|
|
52 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/08/vusec-wins-hacksec/">VUSec wins HAck@Sec</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
53 ]]></content:encoded> |
|
|
|
54 |
|
|
|
55 |
|
|
|
56 |
|
|
|
57 </item> |
|
|
|
58 <item> |
|
|
|
59 <title>Pietro Frigo Wins Qualcomm Innovation fellowship</title> |
|
|
|
60 <link>https://www.vusec.net/2020/05/pietro-frigo-wins-qualcomm-innovation-fellowship/</link> |
|
|
|
61 |
|
|
|
62 <dc:creator><![CDATA[herbert.bos]]></dc:creator> |
|
|
|
63 <pubDate>Mon, 25 May 2020 17:01:00 +0000</pubDate> |
|
|
|
64 <category><![CDATA[Uncategorized]]></category> |
|
|
|
65 <guid isPermaLink="false">https://www.vusec.net/?p=1770</guid> |
|
|
|
66 |
|
|
|
67 <description><![CDATA[<p>Pietro won the Qualcomm Innovation Fellowship. The QIF program is focused on recognizing, rewarding, and mentoring innovative PhD students across a broad range of technical research areas .</p> |
|
|
|
68 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/pietro-frigo-wins-qualcomm-innovation-fellowship/">Pietro Frigo Wins Qualcomm Innovation fellowship</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
69 ]]></description> |
|
|
|
70 <content:encoded><![CDATA[ |
|
|
|
71 <p>Pietro won the <a href="https://www.qualcomm.com/invention/research/university-relations/innovation-fellowship/winners">Qualcomm Innovation Fellowship</a>. The QIF program is focused on recognizing, rewarding, and mentoring innovative PhD students across a broad range of technical research areas .</p> |
|
|
|
72 |
|
|
|
73 |
|
|
|
74 |
|
|
|
75 <div class="wp-block-group"><div class="wp-block-group__inner-container"> |
|
|
|
76 <figure class="wp-block-gallery columns-2 is-cropped"><ul class="blocks-gallery-grid"><li class="blocks-gallery-item"><figure><img loading="lazy" width="674" height="1111" src="https://www.vusec.net/wp-content/uploads/2020/05/pit.jpg" alt="" data-id="1774" data-full-url="/wp-content/uploads/2020/05/pit.jpg" data-link="/pit-2/" class="wp-image-1774"/><figcaption class="blocks-gallery-item__caption">The ecstatic winner</figcaption></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" width="335" height="721" src="https://www.vusec.net/wp-content/uploads/2020/05/pietro_qif.2.png" alt="" data-id="1775" data-full-url="/wp-content/uploads/2020/05/pietro_qif.2.png" data-link="/pietro_qif-2/" class="wp-image-1775"/><figcaption class="blocks-gallery-item__caption">List of winners</figcaption></figure></li></ul></figure> |
|
|
|
77 </div></div> |
|
|
|
78 |
|
|
|
79 |
|
|
|
80 |
|
|
|
81 <p></p> |
|
|
|
82 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/pietro-frigo-wins-qualcomm-innovation-fellowship/">Pietro Frigo Wins Qualcomm Innovation fellowship</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
83 ]]></content:encoded> |
|
|
|
84 |
|
|
|
85 |
|
|
|
86 |
|
|
|
87 </item> |
|
|
|
88 <item> |
|
|
|
89 <title>TRRespass wins best paper Award at Security & privacy</title> |
|
|
|
90 <link>https://www.vusec.net/2020/05/trrespass-wins-best-paper-award-at-security-privacy/</link> |
|
|
|
91 |
|
|
|
92 <dc:creator><![CDATA[herbert.bos]]></dc:creator> |
|
|
|
93 <pubDate>Mon, 25 May 2020 14:46:17 +0000</pubDate> |
|
|
|
94 <category><![CDATA[Uncategorized]]></category> |
|
|
|
95 <guid isPermaLink="false">https://www.vusec.net/?p=1768</guid> |
|
|
|
96 |
|
|
|
97 <description><![CDATA[<p>Our TRRespass work on finding vulnerabilities in state-of-the-art in-DRAM defenses against Rowhammer attacks was awarded “Best Paper” at the IEEE Symposium on Security and Privacy (the leading Computer Security conference)</p> |
|
|
|
98 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/trrespass-wins-best-paper-award-at-security-privacy/">TRRespass wins best paper Award at Security & privacy</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
99 ]]></description> |
|
|
|
100 <content:encoded><![CDATA[ |
|
|
|
101 <p>Our <a href="https://www.vusec.net/projects/trrespass">TRRespass </a>work on finding vulnerabilities in state-of-the-art in-DRAM defenses against Rowhammer attacks was awarded “Best Paper” at the <a href="https://www.ieee-security.org/TC/SP2020">IEEE Symposium on Security and Privacy</a> (the leading Computer Security conference)</p> |
|
|
|
102 |
|
|
|
103 |
|
|
|
104 |
|
|
|
105 <figure class="wp-block-image size-large is-resized"><img loading="lazy" src="https://www.vusec.net/wp-content/uploads/2020/03/ddr4.jpg" alt="" class="wp-image-1701" width="505" height="337"/><figcaption>DDR4 DRAM chips of all major vendors still vulnerable to Rowhammer, despite TRR defense.</figcaption></figure> |
|
|
|
106 |
|
|
|
107 |
|
|
|
108 |
|
|
|
109 <figure class="wp-block-image size-large"><img loading="lazy" width="2560" height="1272" src="https://www.vusec.net/wp-content/uploads/2020/03/rowsVsFlips-scaled.jpg" alt="" class="wp-image-1656" srcset="https://www.vusec.net/wp-content/uploads/2020/03/rowsVsFlips-scaled.jpg 2560w, https://www.vusec.net/wp-content/uploads/2020/03/rowsVsFlips-768x382.jpg 768w, https://www.vusec.net/wp-content/uploads/2020/03/rowsVsFlips-1536x763.jpg 1536w, https://www.vusec.net/wp-content/uploads/2020/03/rowsVsFlips-2048x1017.jpg 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /><figcaption>if only we hammer more rows,</figcaption></figure> |
|
|
|
110 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/trrespass-wins-best-paper-award-at-security-privacy/">TRRespass wins best paper Award at Security & privacy</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
111 ]]></content:encoded> |
|
|
|
112 |
|
|
|
113 |
|
|
|
114 |
|
|
|
115 </item> |
|
|
|
116 <item> |
|
|
|
117 <title>Cristiano Giuffrida WINS VMWare Early Career Faculty Grant</title> |
|
|
|
118 <link>https://www.vusec.net/2020/05/cristiano-giuffrida-wins-vmware-early-career-faculty-grant/</link> |
|
|
|
119 |
|
|
|
120 <dc:creator><![CDATA[herbert.bos]]></dc:creator> |
|
|
|
121 <pubDate>Mon, 25 May 2020 12:57:32 +0000</pubDate> |
|
|
|
122 <category><![CDATA[Uncategorized]]></category> |
|
|
|
123 <guid isPermaLink="false">https://www.vusec.net/?p=1765</guid> |
|
|
|
124 |
|
|
|
125 <description><![CDATA[<p>We are proud to announce that Cristiano Giuffrida has won the VMware Early Career Faculty Grant – a program intended to recognize the next generation of exceptional faculty members. A gift to the researcher’s university is made in support of his/her research and to promote excellence in teaching.</p> |
|
|
|
126 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/cristiano-giuffrida-wins-vmware-early-career-faculty-grant/">Cristiano Giuffrida WINS VMWare Early Career Faculty Grant</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
127 ]]></description> |
|
|
|
128 <content:encoded><![CDATA[ |
|
|
|
129 <p>We are proud to announce that <a href="https://www.vusec.net/people/cristiano-giuffrida/">Cristiano Giuffrida </a>has won the VMware <a href="https://www.vmware.com/company/research/faculty-programs.html#early">Early Career Faculty Grant </a>– a program intended to recognize the next generation of exceptional faculty members. A gift to the researcher’s university is made in support of his/her research and to promote excellence in teaching. </p> |
|
|
|
130 |
|
|
|
131 |
|
|
|
132 |
|
|
|
133 <figure class="wp-block-image size-large"><img loading="lazy" width="450" height="600" src="https://www.vusec.net/wp-content/uploads/2016/04/giuffrida_large.jpg" alt="" class="wp-image-68" srcset="https://www.vusec.net/wp-content/uploads/2016/04/giuffrida_large.jpg 450w, https://www.vusec.net/wp-content/uploads/2016/04/giuffrida_large-225x300.jpg 225w" sizes="(max-width: 450px) 100vw, 450px" /></figure> |
|
|
|
134 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/cristiano-giuffrida-wins-vmware-early-career-faculty-grant/">Cristiano Giuffrida WINS VMWare Early Career Faculty Grant</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
135 ]]></content:encoded> |
|
|
|
136 |
|
|
|
137 |
|
|
|
138 |
|
|
|
139 </item> |
|
|
|
140 <item> |
|
|
|
141 <title>Trrespass: Rowhammer in the news (again)</title> |
|
|
|
142 <link>https://www.vusec.net/2020/03/trrespass-rowhammer-in-the-news-again/</link> |
|
|
|
143 |
|
|
|
144 <dc:creator><![CDATA[herbert.bos]]></dc:creator> |
|
|
|
145 <pubDate>Thu, 12 Mar 2020 09:14:45 +0000</pubDate> |
|
|
|
146 <category><![CDATA[Uncategorized]]></category> |
|
|
|
147 <guid isPermaLink="false">https://www.vusec.net/?p=1700</guid> |
|
|
|
148 |
|
|
|
149 <description><![CDATA[<p>Rowhammer, the DRAM vulnerability that was supposedly fixed in DDR4 is not fixed in DDR4. The TRRespass attack shows that DIMMs from all 3 major vendors (good for 95% of the market) are still vulnerable. The news appeared in different international media (see the writeup on NakedSecurity) and in the Netherlands in de Volkskrant. There … <a href="https://www.vusec.net/2020/03/trrespass-rowhammer-in-the-news-again/" class="more-link">Continue reading <span class="screen-reader-text">Trrespass: Rowhammer in the news (again)</span> <span class="meta-nav">→</span></a></p> |
|
|
|
150 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/03/trrespass-rowhammer-in-the-news-again/">Trrespass: Rowhammer in the news (again)</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
151 ]]></description> |
|
|
|
152 <content:encoded><![CDATA[ |
|
|
|
153 <div class="wp-block-cover has-background-dim" style="background-image:url(/wp-content/uploads/2020/03/ddr4.jpg);min-height:215px"><div class="wp-block-cover__inner-container"> |
|
|
|
154 <p class="has-text-align-center has-large-font-size"></p> |
|
|
|
155 </div></div> |
|
|
|
156 |
|
|
|
157 |
|
|
|
158 |
|
|
|
159 <p>Rowhammer, the DRAM vulnerability that was supposedly fixed in DDR4 is not fixed in DDR4. The <a href="https://www.vusec.net/projects/trrespass/">TRRespass</a> attack shows that DIMMs from all 3 major vendors (good for 95% of the market) are still vulnerable. The news appeared in different international media (see the writeup on <a href="https://nakedsecurity.sophos.com/2020/03/11/trrepass-research-reveals-rowhammering-is-alive-and-well/">NakedSecurity</a>) and in the Netherlands in de <a href="https://www.volkskrant.nl/nieuws-achtergrond/vrijwel-elke-laptop-smartphone-en-server-ter-wereld-kwetsbaar-voor-aanvallen-ontdekt-vu~b23b8656/">Volkskrant</a>. There was a short interview on <a href="https://www.nporadio1.nl/langs-de-lijn-en-omstreken/uitzendingen/735849-2020-03-10">Radio 1 (22:51 h).</a></p> |
|
|
|
160 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/03/trrespass-rowhammer-in-the-news-again/">Trrespass: Rowhammer in the news (again)</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
161 ]]></content:encoded> |
|
|
|
162 |
|
|
|
163 |
|
|
|
164 |
|
|
|
165 </item> |
|
|
|
166 <item> |
|
|
|
167 <title>Harry King Wins bachelor Thesis Prize</title> |
|
|
|
168 <link>https://www.vusec.net/2020/01/harry-king-wins-bachelor-thesis-prize/</link> |
|
|
|
169 |
|
|
|
170 <dc:creator><![CDATA[herbert.bos]]></dc:creator> |
|
|
|
171 <pubDate>Thu, 23 Jan 2020 15:51:10 +0000</pubDate> |
|
|
|
172 <category><![CDATA[Uncategorized]]></category> |
|
|
|
173 <guid isPermaLink="false">https://www.vusec.net/?p=1476</guid> |
|
|
|
174 |
|
|
|
175 <description><![CDATA[<p>Recently graduated Harry King just won the (university-wide) best bachelor thesis award for his thesis on “Development Tools &Techniques for a More Robust Operating System”. For his thesis project he built an operating system kernel from scratch in Ada. The implementation in Ada allowed him to formally verify the OS components.</p> |
|
|
|
176 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/01/harry-king-wins-bachelor-thesis-prize/">Harry King Wins bachelor Thesis Prize</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
177 ]]></description> |
|
|
|
178 <content:encoded><![CDATA[ |
|
|
|
179 <p>Recently graduated Harry King just won the (university-wide) best bachelor thesis award for his thesis on “Development Tools &<br>Techniques for a More Robust Operating System”. For his thesis project he built an operating system kernel from scratch in Ada. The implementation in Ada allowed him to formally verify the OS components. </p> |
|
|
|
180 |
|
|
|
181 |
|
|
|
182 |
|
|
|
183 <figure class="wp-block-image size-large is-resized"><img loading="lazy" src="https://www.vusec.net/wp-content/uploads/2020/01/harry_king_wins_prize-scaled.jpg" alt="" class="wp-image-1477" width="487" height="365" srcset="https://www.vusec.net/wp-content/uploads/2020/01/harry_king_wins_prize-scaled.jpg 2560w, https://www.vusec.net/wp-content/uploads/2020/01/harry_king_wins_prize-768x576.jpg 768w, https://www.vusec.net/wp-content/uploads/2020/01/harry_king_wins_prize-1536x1152.jpg 1536w, https://www.vusec.net/wp-content/uploads/2020/01/harry_king_wins_prize-2048x1536.jpg 2048w" sizes="(max-width: 487px) 100vw, 487px" /></figure> |
|
|
|
184 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/01/harry-king-wins-bachelor-thesis-prize/">Harry King Wins bachelor Thesis Prize</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
185 ]]></content:encoded> |
|
|
|
186 |
|
|
|
187 |
|
|
|
188 |
|
|
|
189 </item> |
|
|
|
190 <item> |
|
|
|
191 <title>RIDL Second in CSAW’19 Best applied Research</title> |
|
|
|
192 <link>https://www.vusec.net/2019/11/ridl-second-in-csaw19-best-applied-research/</link> |
|
|
|
193 |
|
|
|
194 <dc:creator><![CDATA[herbert.bos]]></dc:creator> |
|
|
|
195 <pubDate>Sat, 16 Nov 2019 12:26:14 +0000</pubDate> |
|
|
|
196 <category><![CDATA[Uncategorized]]></category> |
|
|
|
197 <guid isPermaLink="false">https://www.vusec.net/?p=1330</guid> |
|
|
|
198 |
|
|
|
199 <description><![CDATA[<p>Two of VUSec’s papers were nominated for the Best Applied Research Award at CSAW’19 in Valence France: ECCploit and RIDL. When the dust settled, “RIDL: Rogue In-Flight Data Load”, thepaper that was published at Security & Privacy in May and that shows a new class of speculative execution attacks that can leak any “in-flight” data … <a href="https://www.vusec.net/2019/11/ridl-second-in-csaw19-best-applied-research/" class="more-link">Continue reading <span class="screen-reader-text">RIDL Second in CSAW’19 Best applied Research</span> <span class="meta-nav">→</span></a></p> |
|
|
|
200 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/11/ridl-second-in-csaw19-best-applied-research/">RIDL Second in CSAW’19 Best applied Research</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
201 ]]></description> |
|
|
|
202 <content:encoded><![CDATA[ |
|
|
|
203 <p>Two of VUSec’s papers were nominated for the Best Applied Research Award at CSAW’19 in Valence France: <a href="https://www.vusec.net/projects/eccploit/">ECCploit</a> and <a href="https://mdsattacks.com/">RIDL</a>.</p> |
|
|
|
204 |
|
|
|
205 |
|
|
|
206 |
|
|
|
207 <p>When the dust settled, “RIDL: Rogue In-Flight Data Load”, the<br>paper that was published at Security & Privacy in May and that shows a new class of speculative execution attacks that can leak any “in-flight” data from Intel CPUs won the second place<br>prize for Best Applied Research at CSAW ’19. </p> |
|
|
|
208 |
|
|
|
209 |
|
|
|
210 |
|
|
|
211 <p>See also: “<a href="http://www.vusec.net/2019/11/much-ado-about-ridl/">Much Ado about RIDL</a>“.</p> |
|
|
|
212 |
|
|
|
213 |
|
|
|
214 |
|
|
|
215 <figure class="wp-block-image size-large"><img loading="lazy" width="1316" height="640" src="https://www.vusec.net/wp-content/uploads/2019/11/csaw-ridl-secondplace.jpg" alt="" class="wp-image-1331" srcset="https://www.vusec.net/wp-content/uploads/2019/11/csaw-ridl-secondplace.jpg 1316w, https://www.vusec.net/wp-content/uploads/2019/11/csaw-ridl-secondplace-768x373.jpg 768w" sizes="(max-width: 1316px) 100vw, 1316px" /></figure> |
|
|
|
216 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/11/ridl-second-in-csaw19-best-applied-research/">RIDL Second in CSAW’19 Best applied Research</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
217 ]]></content:encoded> |
|
|
|
218 |
|
|
|
219 |
|
|
|
220 |
|
|
|
221 </item> |
|
|
|
222 <item> |
|
|
|
223 <title>Much ado about RIDL</title> |
|
|
|
224 <link>https://www.vusec.net/2019/11/much-ado-about-ridl/</link> |
|
|
|
225 |
|
|
|
226 <dc:creator><![CDATA[herbert.bos]]></dc:creator> |
|
|
|
227 <pubDate>Sat, 16 Nov 2019 12:17:07 +0000</pubDate> |
|
|
|
228 <category><![CDATA[Uncategorized]]></category> |
|
|
|
229 <guid isPermaLink="false">https://www.vusec.net/?p=1326</guid> |
|
|
|
230 |
|
|
|
231 <description><![CDATA[<p>The RIDL saga that started in September 2018 lingers on. A new embargo and a new set of insufficient patches, and it isn’t over yet. Excellent coverage by Kim Zetter in the New York Times. In addition there were many other outlets covering this: International: https://www.wired.com/story/intel-mds-attack-taa/ https://www.theverge.com/2019/11/13/20962667/intel-processor-security-vulnerabilities-researchers-disclosure https://www.ft.com/content/d60cda42-7699-11e9-be7d-6d846537acab https://in.pcmag.com/news/133831/intel-struggles-to-fix-hardware-based-flaws-researchers-say https://www.tomshardware.com/news/intel-reveals-taa-vulnerabilities-in-cascade-lake-chips-and-a-new-jcc-bug https://www.dailymail.co.uk/sciencetech/article-7681917/Intel-failed-fix-dangerous-chip-flaw-affecting-MILLIONS-Apple-Microsoft-Google-devices.html https://www.engadget.com/2019/11/13/intel-fixes-cpu-security-flaw-for-real/ https://gizmodo.com/intel-reportedly-warned-of-critical-chip-security-flaws-1839807262 Dutch: https://www.nu.nl/tech/6010595/onderzoekers-vrije-universiteit-intel-is-niet-eerlijk-over-processorlek.html … <a href="https://www.vusec.net/2019/11/much-ado-about-ridl/" class="more-link">Continue reading <span class="screen-reader-text">Much ado about RIDL</span> <span class="meta-nav">→</span></a></p> |
|
|
|
232 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/11/much-ado-about-ridl/">Much ado about RIDL</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
233 ]]></description> |
|
|
|
234 <content:encoded><![CDATA[ |
|
|
|
235 <p>The RIDL saga that started in September 2018 lingers on. A new embargo and a new set of insufficient patches, and it isn’t over yet. Excellent coverage by Kim Zetter in the <a href="https://www.nytimes.com/2019/11/12/technology/intel-chip-fix.html">New York Times</a>.</p> |
|
|
|
236 |
|
|
|
237 |
|
|
|
238 |
|
|
|
239 <figure class="wp-block-image size-large"><a href="https://www.nytimes.com/2019/11/12/technology/intel-chip-fix.html"><img loading="lazy" width="1919" height="1129" src="https://www.vusec.net/wp-content/uploads/2019/11/nyt.12.11.2019.Stephan.png" alt="" class="wp-image-1327" srcset="https://www.vusec.net/wp-content/uploads/2019/11/nyt.12.11.2019.Stephan.png 1919w, https://www.vusec.net/wp-content/uploads/2019/11/nyt.12.11.2019.Stephan-768x452.png 768w, https://www.vusec.net/wp-content/uploads/2019/11/nyt.12.11.2019.Stephan-1536x904.png 1536w" sizes="(max-width: 1919px) 100vw, 1919px" /></a></figure> |
|
|
|
240 |
|
|
|
241 |
|
|
|
242 |
|
|
|
243 <p>In addition there were many other outlets covering this:</p> |
|
|
|
244 |
|
|
|
245 |
|
|
|
246 |
|
|
|
247 <h2>International:</h2> |
|
|
|
248 |
|
|
|
249 |
|
|
|
250 |
|
|
|
251 <figure class="wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-the-new-york-times"><div class="wp-block-embed__wrapper"> |
|
|
|
252 <iframe title="Intel Fixes a Security Flaw It Said Was Repaired 6 Months Ago" class="wp-embedded-content" sandbox="allow-scripts" security="restricted" src="https://www.nytimes.com/svc/oembed/html/?url=https%3A%2F%2Fwww.nytimes.com%2F2019%2F11%2F12%2Ftechnology%2Fintel-chip-fix.html#?secret=pvQ8vgEmbY" data-secret="pvQ8vgEmbY" scrolling="no" frameborder="0"></iframe> |
|
|
|
253 </div></figure> |
|
|
|
254 |
|
|
|
255 |
|
|
|
256 |
|
|
|
257 <p><a href="https://www.wired.com/story/intel-mds-attack-taa/">https://www.wired.com/story/intel-mds-attack-taa/</a></p> |
|
|
|
258 |
|
|
|
259 |
|
|
|
260 |
|
|
|
261 <p><a href="https://www.theverge.com/2019/11/13/20962667/intel-processor-security-vulnerabilities-researchers-disclosure">https://www.theverge.com/2019/11/13/20962667/intel-processor-security-vulnerabilities-researchers-disclosure</a></p> |
|
|
|
262 |
|
|
|
263 |
|
|
|
264 |
|
|
|
265 <p><a href="https://www.ft.com/content/d60cda42-7699-11e9-be7d-6d846537acab">https://www.ft.com/content/d60cda42-7699-11e9-be7d-6d846537acab</a></p> |
|
|
|
266 |
|
|
|
267 |
|
|
|
268 |
|
|
|
269 <p><a href="https://in.pcmag.com/news/133831/intel-struggles-to-fix-hardware-based-flaws-researchers-say">https://in.pcmag.com/news/133831/intel-struggles-to-fix-hardware-based-flaws-researchers-say</a></p> |
|
|
|
270 |
|
|
|
271 |
|
|
|
272 |
|
|
|
273 <p><a href="https://www.tomshardware.com/news/intel-reveals-taa-vulnerabilities-in-cascade-lake-chips-and-a-new-jcc-bug">https://www.tomshardware.com/news/intel-reveals-taa-vulnerabilities-in-cascade-lake-chips-and-a-new-jcc-bug</a></p> |
|
|
|
274 |
|
|
|
275 |
|
|
|
276 |
|
|
|
277 <p><a href="https://www.dailymail.co.uk/sciencetech/article-7681917/Intel-failed-fix-dangerous-chip-flaw-affecting-MILLIONS-Apple-Microsoft-Google-devices.html">https://www.dailymail.co.uk/sciencetech/article-7681917/Intel-failed-fix-dangerous-chip-flaw-affecting-MILLIONS-Apple-Microsoft-Google-devices.html</a></p> |
|
|
|
278 |
|
|
|
279 |
|
|
|
280 |
|
|
|
281 <p><a href="https://www.engadget.com/2019/11/13/intel-fixes-cpu-security-flaw-for-real/">https://www.engadget.com/2019/11/13/intel-fixes-cpu-security-flaw-for-real/</a></p> |
|
|
|
282 |
|
|
|
283 |
|
|
|
284 |
|
|
|
285 <p><a href="https://gizmodo.com/intel-reportedly-warned-of-critical-chip-security-flaws-1839807262">https://gizmodo.com/intel-reportedly-warned-of-critical-chip-security-flaws-1839807262</a></p> |
|
|
|
286 |
|
|
|
287 |
|
|
|
288 |
|
|
|
289 <h2>Dutch:</h2> |
|
|
|
290 |
|
|
|
291 |
|
|
|
292 |
|
|
|
293 <p><a href="https://www.nu.nl/tech/6010595/onderzoekers-vrije-universiteit-intel-is-niet-eerlijk-over-processorlek.html">https://www.nu.nl/tech/6010595/onderzoekers-vrije-universiteit-intel-is-niet-eerlijk-over-processorlek.html</a></p> |
|
|
|
294 |
|
|
|
295 |
|
|
|
296 |
|
|
|
297 <p><a href="https://www.nporadio1.nl/nieuws-en-co/onderwerpen/519738-processorchips-intel-nog-steeds-kwetsbaar">https://www.nporadio1.nl/nieuws-en-co/onderwerpen/519738-processorchips-intel-nog-steeds-kwetsbaar</a></p> |
|
|
|
298 |
|
|
|
299 |
|
|
|
300 |
|
|
|
301 <p><a href="https://nos.nl/artikel/2310247-onderzoekers-intel-neemt-beveiligingslek-niet-serieus.html">https://nos.nl/artikel/2310247-onderzoekers-intel-neemt-beveiligingslek-niet-serieus.html</a></p> |
|
|
|
302 |
|
|
|
303 |
|
|
|
304 |
|
|
|
305 <p><a href="https://www.ad.nl/tech/onderzoekers-vu-intel-loog-over-oplossen-lek-in-chips~acb207e0/">https://www.ad.nl/tech/onderzoekers-vu-intel-loog-over-oplossen-lek-in-chips~acb207e0/</a></p> |
|
|
|
306 |
|
|
|
307 |
|
|
|
308 |
|
|
|
309 <p><a href="https://tweakers.net/nieuws/159826/vu-onderzoekers-intel-heeft-ridl-kwetsbaarheid-nog-niet-volledig-opgelost.html">https://tweakers.net/nieuws/159826/vu-onderzoekers-intel-heeft-ridl-kwetsbaarheid-nog-niet-volledig-opgelost.html</a></p> |
|
|
|
310 |
|
|
|
311 |
|
|
|
312 |
|
|
|
313 <p><a href="https://www.computable.nl/artikel/nieuws/cloud-computing/6834006/250449/oproep-vu-zet-hyperthreading-in-intel-processor-uit.html">https://www.computable.nl/artikel/nieuws/cloud-computing/6834006/250449/oproep-vu-zet-hyperthreading-in-intel-processor-uit.html</a></p> |
|
|
|
314 |
|
|
|
315 |
|
|
|
316 |
|
|
|
317 <p><a href="https://radar.avrotros.nl/nieuws/item/processorchips-van-intel-nog-steeds-kwetsbaar/">https://radar.avrotros.nl/nieuws/item/processorchips-van-intel-nog-steeds-kwetsbaar/</a></p> |
|
|
|
318 |
|
|
|
319 |
|
|
|
320 |
|
|
|
321 <p><a href="https://www.noordhollandsdagblad.nl/cnt/dmf20191113_36194155/vu-studie-intel-chips-nog-steeds-kwetsbaar">https://www.noordhollandsdagblad.nl/cnt/dmf20191113_36194155/vu-studie-intel-chips-nog-steeds-kwetsbaar</a></p> |
|
|
|
322 |
|
|
|
323 |
|
|
|
324 |
|
|
|
325 <p><a href="https://www.security.nl/posting/631293/VU-onderzoekers+onthullen+%22nieuwe%22+aanval+op+Intel-processors">https://www.security.nl/posting/631293/VU-onderzoekers+onthullen+%22nieuwe%22+aanval+op+Intel-processors</a></p> |
|
|
|
326 |
|
|
|
327 |
|
|
|
328 |
|
|
|
329 <h3>Tabloids:</h3> |
|
|
|
330 |
|
|
|
331 |
|
|
|
332 |
|
|
|
333 <p><a href="https://www.telegraaf.nl/nieuws/348361583/vu-studie-intel-chips-nog-steeds-kwetsbaar">https://www.telegraaf.nl/nieuws/348361583/vu-studie-intel-chips-nog-steeds-kwetsbaar</a></p> |
|
|
|
334 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/11/much-ado-about-ridl/">Much ado about RIDL</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
335 ]]></content:encoded> |
|
|
|
336 |
|
|
|
337 |
|
|
|
338 |
|
|
|
339 </item> |
|
|
|
340 <item> |
|
|
|
341 <title>ECCPloit wins distinguished paper award at IEEE S&P 2019</title> |
|
|
|
342 <link>https://www.vusec.net/2019/05/eccploit-wins-distinguished-paper-award/</link> |
|
|
|
343 |
|
|
|
344 <dc:creator><![CDATA[Cristiano Giuffrida]]></dc:creator> |
|
|
|
345 <pubDate>Tue, 28 May 2019 11:10:00 +0000</pubDate> |
|
|
|
346 <category><![CDATA[award]]></category> |
|
|
|
347 <guid isPermaLink="false">https://www.vusec.net/?p=1150</guid> |
|
|
|
348 |
|
|
|
349 <description><![CDATA[<p>The ECCploit paper by Lucian Cojocar won the Distinguished Practical Paper Award at IEEE Security & Privacy 2019.</p> |
|
|
|
350 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/05/eccploit-wins-distinguished-paper-award/">ECCPloit wins distinguished paper award at IEEE S&P 2019</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
351 ]]></description> |
|
|
|
352 <content:encoded><![CDATA[ |
|
|
|
353 <p>The <a href="https://bibbase.org/network/publication/cojocar-razavi-giuffrida-bos-exploitingcorrectingcodesontheeffectivenessofeccmemoryagainstrowhammerattacks-2019">ECCploit</a> paper by Lucian Cojocar won the Distinguished Practical Paper Award at IEEE Security & Privacy 2019.</p> |
|
|
|
354 |
|
|
|
355 |
|
|
|
356 |
|
|
|
357 <figure class="wp-block-image"><img loading="lazy" width="1089" height="651" src="https://www.vusec.net/wp-content/uploads/2019/05/image.png" alt="" class="wp-image-1151" srcset="https://www.vusec.net/wp-content/uploads/2019/05/image.png 1089w, https://www.vusec.net/wp-content/uploads/2019/05/image-768x459.png 768w" sizes="(max-width: 1089px) 100vw, 1089px" /></figure> |
|
|
|
358 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/05/eccploit-wins-distinguished-paper-award/">ECCPloit wins distinguished paper award at IEEE S&P 2019</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
359 ]]></content:encoded> |
|
|
|
360 |
|
|
|
361 |
|
|
|
362 |
|
|
|
363 </item> |
|
|
|
364 <item> |
|
|
|
365 <title>RIDL featured in the media</title> |
|
|
|
366 <link>https://www.vusec.net/2019/05/ridl-featured-in-the-media/</link> |
|
|
|
367 |
|
|
|
368 <dc:creator><![CDATA[Cristiano Giuffrida]]></dc:creator> |
|
|
|
369 <pubDate>Mon, 20 May 2019 01:35:24 +0000</pubDate> |
|
|
|
370 <category><![CDATA[press]]></category> |
|
|
|
371 <guid isPermaLink="false">https://www.vusec.net/?p=1146</guid> |
|
|
|
372 |
|
|
|
373 <description><![CDATA[<p>After a long embargo period of 9 months we made our paper RIDL: Rogue In-Flight Data Load available to the general public. RIDL introduces a new class of speculative execution attacks that can leak any “in-flight” data available in the CPU. More information (including some nice demo videos) are available at https://mdsattacks.com. We have also … <a href="https://www.vusec.net/2019/05/ridl-featured-in-the-media/" class="more-link">Continue reading <span class="screen-reader-text">RIDL featured in the media</span> <span class="meta-nav">→</span></a></p> |
|
|
|
374 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/05/ridl-featured-in-the-media/">RIDL featured in the media</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
375 ]]></description> |
|
|
|
376 <content:encoded><![CDATA[ |
|
|
|
377 <p>After a long embargo period of 9 months we made our paper <a href="https://mdsattacks.com/files/ridl.pdf">RIDL: Rogue In-Flight Data Load</a> available to the general public. RIDL introduces a new class of speculative execution attacks that can leak any “in-flight” data available in the CPU.</p> |
|
|
|
378 |
|
|
|
379 |
|
|
|
380 |
|
|
|
381 <p>More information (including some nice demo videos) are available at <a href="https://mdsattacks.com">https://mdsattacks.com</a>. We have also released a tool that you can use to see how vulnerable your computer is to different speculative execution attacks.</p> |
|
|
|
382 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/05/ridl-featured-in-the-media/">RIDL featured in the media</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p> |
|
|
|
383 ]]></content:encoded> |
|
|
|
384 |
|
|
|
385 |
|
|
|
386 |
|
|
|
387 </item> |
|
|
|
388 </channel> |
|
|
|
389 </rss> |
|