#usenix2024

ISEC @ TU GrazIAIK
2024-08-23

Lukas Lamster presented his paper “Voodoo: Memory Tagging, Authenticated Encryption, and Error Correction through MAGIC”.
Find out more: usenix.org/system/files/usenix

ISEC @ TU GrazIAIK
2024-08-23

IAIK researcher Lukas Maar presented two papers at : “SLUBStick: Arbitrary Memory Writes through Practical Software Cross-Cache Attacks within the Linux Kernel” and “Defects-in-Depth: Analyzing the Integration of Effective Defenses against One-Day Exploits in Android Kernels” More here: usenix.org/system/files/usenix & usenix.org/system/files/usenix

ISEC @ TU GrazIAIK
2024-08-23

Earlier this month @notbobbytables and @lavados travelled through North America giving talks at Blackhat, Intel and lately USENIX, where they were joined by fellow researchers Lukas Maar and Lukas Lamster!

2024-08-14

Our #usenix2024 paper "SIMurai: Slicing Through the Complexity of SIM Card Security Research" just went public!

We asked ourselves: What kind of attacks could a hostile SIM launch against your phone?

2024-07-05

I had the pleasure to contribute to Lukas Maar's #USENIX2024 paper "SLUBStick".
SLUBStick elevates limited heap vulnerabilities within the #Linux kernel to arbitrary memory read-and-write primitives, leveraging a timing side channel.
Thanks to Lukas Maar, Martin Unterguggenberger, Mathias Oberhuber and Stefan Mangard for this great opportunity!
Congratulations to Lukas Maar for driving the paper to acceptance at USENIX Security!

You can read the full paper here: stefangast.eu/papers/slubstick

#SLUBStick #Kernel #Linux #KernelSecurity #sidechannel #usenixsecurity #usenixsec

A preview of the SLUBStick paper
2024-06-24

Also looking forward to present #SnailLoad at #USENIX2024.
(3/3)

#usenixsecurity #usenixsec #usenixsecurity

2024-06-14

I had the pleasure to contribute to the #USENIX2024 paper "Divide and Surrender", recovering the full secret key from the reference implementation of the HQC Key Encapsulation Mechanism, exploiting a timing side channel arising from non-constant-time modulo operations.
Thanks to Robin Leander Schröder and Qian Guo for this opportunity and congratulations to Robin Leander Schröder for getting his first paper accepted at USENIX Security!

You can read the full paper here: stefangast.eu/papers/divide_an

#divideandsurrender #hqc #sidechannel #postquantumcrypto #usenixsecurity

A screenshot of the Divide and Surrender paper

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst