eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

214
active users

#usenix2024

0 posts0 participants0 posts today
Merlin Chlosta<p>Our <a href="https://infosec.exchange/tags/usenix2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usenix2024</span></a> paper "SIMurai: Slicing Through the Complexity of SIM Card Security Research" just went public!</p><p>We asked ourselves: What kind of attacks could a hostile SIM launch against your phone?</p>
Stefan Gast<p>I had the pleasure to contribute to Lukas Maar's <a href="https://infosec.exchange/tags/USENIX2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USENIX2024</span></a> paper "SLUBStick".<br>SLUBStick elevates limited heap vulnerabilities within the <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> kernel to arbitrary memory read-and-write primitives, leveraging a timing side channel.<br>Thanks to Lukas Maar, Martin Unterguggenberger, Mathias Oberhuber and Stefan Mangard for this great opportunity!<br>Congratulations to Lukas Maar for driving the paper to acceptance at USENIX Security!</p><p>You can read the full paper here: <a href="https://stefangast.eu/papers/slubstick.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">stefangast.eu/papers/slubstick</span><span class="invisible">.pdf</span></a></p><p><a href="https://infosec.exchange/tags/SLUBStick" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SLUBStick</span></a> <a href="https://infosec.exchange/tags/Kernel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kernel</span></a> <a href="https://infosec.exchange/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://infosec.exchange/tags/KernelSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KernelSecurity</span></a> <a href="https://infosec.exchange/tags/sidechannel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sidechannel</span></a> <a href="https://infosec.exchange/tags/usenixsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usenixsecurity</span></a> <a href="https://infosec.exchange/tags/usenixsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usenixsec</span></a></p>
Stefan Gast<p>Also looking forward to present <a href="https://infosec.exchange/tags/SnailLoad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SnailLoad</span></a> at <a href="https://infosec.exchange/tags/USENIX2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USENIX2024</span></a>.<br>(3/3)</p><p><a href="https://infosec.exchange/tags/usenixsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usenixsecurity</span></a> <a href="https://infosec.exchange/tags/usenixsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usenixsec</span></a> <a href="https://infosec.exchange/tags/usenixsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usenixsecurity</span></a></p>
Stefan Gast<p>I had the pleasure to contribute to the <a href="https://infosec.exchange/tags/USENIX2024" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>USENIX2024</span></a> paper "Divide and Surrender", recovering the full secret key from the reference implementation of the HQC Key Encapsulation Mechanism, exploiting a timing side channel arising from non-constant-time modulo operations.<br>Thanks to Robin Leander Schröder and Qian Guo for this opportunity and congratulations to Robin Leander Schröder for getting his first paper accepted at USENIX Security!</p><p>You can read the full paper here: <a href="https://stefangast.eu/papers/divide_and_surrender.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">stefangast.eu/papers/divide_an</span><span class="invisible">d_surrender.pdf</span></a></p><p><a href="https://infosec.exchange/tags/divideandsurrender" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>divideandsurrender</span></a> <a href="https://infosec.exchange/tags/hqc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hqc</span></a> <a href="https://infosec.exchange/tags/sidechannel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sidechannel</span></a> <a href="https://infosec.exchange/tags/postquantumcrypto" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>postquantumcrypto</span></a> <a href="https://infosec.exchange/tags/usenixsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>usenixsecurity</span></a></p>