Toots for lavados@infosec.exchange account

Shared by Daniel Gruss on 2025-02-03 at 20:32 (original by Nspace)

=> More informations about this toot | View the thread

Shared by Daniel Gruss on 2025-01-30 at 15:54 (original by DIMVA Conference)

=> More informations about this toot | View the thread

Shared by Daniel Gruss on 2025-01-30 at 15:53 (original by ISEC @ TU Graz)

=> More informations about this toot | View the thread

Shared by Daniel Gruss on 2025-01-29 at 00:57 (original by Chandler Carruth)

=> More informations about this toot | View the thread

Shared by Daniel Gruss on 2025-01-28 at 15:13 (original by DIMVA Conference)

=> More informations about this toot | View the thread

Written by Daniel Gruss on 2025-01-28 at 14:14

DIMVA decisions were just sent out. Congratulations to all authors who got and accept!

If your paper was not accepted, the uASC deadline is in 22 hours (same length+format) and uASC is looking for interesting insights despite flaws in the threat model -> uasc.cc

=> More informations about this toot | View the thread

Written by Daniel Gruss on 2025-01-26 at 12:54

We updated the uASC deadline: it is January 28 AoE, which is 1 day after the DIMVA notification.

Take a look at our CFP. Any insights around microarchitecture security are interesting.

https://uasc.cc/

=> More informations about this toot | View the thread

Written by Daniel Gruss on 2025-01-21 at 23:25

hyperref unfortunately can add deanonymizing information to PDFs. I posted a patch + a two-liner cp/sed here: https://github.com/latex3/hyperref/issues/376

Run that and get an anonymized PDF that does not contain all your bibkeys.

=> More informations about this toot | View the thread

Written by Daniel Gruss on 2025-01-21 at 22:52

The uASC registration is open now:

https://uasc.cc/

Also the uASC deadline is approaching: January 27 AoE.

We accept papers, posters, and talks. We have conference proceedings. We're interested in any insights broadly around microarchitecture security.

Don't miss the deadline, don't miss the conference ;)

=> More informations about this toot | View the thread

Written by Daniel Gruss on 2025-01-20 at 22:20

It's kind of like werewolves (aka Mafia aka secret Hitler) but nothing is ever revealed. No one learns anyone else's role at any point in the game. Any arguments and votes are handed in in written form.

The only thing that is revealed is how the process concluded, i.e., with one or the other outcome.

=> More informations about this toot | View the thread

Shared by Daniel Gruss on 2025-01-20 at 22:15 (original by Bart Coppens)

=> More informations about this toot | View the thread

Written by Daniel Gruss on 2025-01-20 at 19:53

Can I ask you all for a quick review of this idea?

Threat Model and Attack Scenario:

PC member A and B agree to not mark each other as a conflict and write each other favorable reviews and fight for each others papers.

Proposed Mitigation:

Conclusion:

Our approach solves the problem. PC member A and B cannot write each other favorable reviews or fight for each other's paper anymore.

Hoping for typical reviews from security folks here that identify any weaknesses or potential side effects ;)

=> More informations about this toot | View the thread

Shared by Daniel Gruss on 2025-01-13 at 18:49 (original by ISEC @ TU Graz)

=> More informations about this toot | View the thread

Shared by Daniel Gruss on 2025-01-07 at 09:38 (original by Florian A.)

=> More informations about this toot | View the thread

Written by Daniel Gruss on 2025-01-05 at 16:40

CFP for uASC 25 is still open. We have rolling reviews, and 1 submission is already accepted. If you have interesting results on microarchitecture security (incl. weak threat models or reproducing prior work), check out the CFP at http://uasc.cc

The CFP closes Jan 28

We look for contributions from academia and industry and accept papers, posters, and talks. Or just attend uASC 25 on February 19 in Bochum and meet fellow microarchitecture security researchers.

=> More informations about this toot | View the thread

Shared by Daniel Gruss on 2025-01-05 at 12:07 (original by Ange)

=> More informations about this toot | View the thread

Shared by Daniel Gruss on 2025-01-01 at 14:49 (original by w0lf)

=> More informations about this toot | View the thread

Shared by Daniel Gruss on 2024-12-31 at 00:53 (original by Mäh W.)

=> More informations about this toot | View the thread

Shared by Daniel Gruss on 2024-12-30 at 16:45 (original by Stefan 🪴)

=> More informations about this toot | View the thread

Shared by Daniel Gruss on 2024-12-30 at 12:50 (original by Stefan :mastodon:)

=> More informations about this toot | View the thread

=> This profile without reblog | Go to lavados@infosec.exchange account

Proxy Information
Original URL
gemini://mastogem.picasoft.net/profile/109590815976425691/reblog
Status Code
Success (20)
Meta
text/gemini
Capsule Response Time
411.784822 milliseconds
Gemini-to-HTML Time
6.823049 milliseconds

This content has been proxied by September (3851b).