vusec - sfeed_tests - sfeed tests and RSS and Atom files
 (HTM) git clone git://git.codemadness.org/sfeed_tests
 (DIR) Log
 (DIR) Files
 (DIR) Refs
 (DIR) README
 (DIR) LICENSE
       ---
       vusec (29234B)
       ---
            1 <?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
            2         xmlns:content="http://purl.org/rss/1.0/modules/content/"
            3         xmlns:wfw="http://wellformedweb.org/CommentAPI/"
            4         xmlns:dc="http://purl.org/dc/elements/1.1/"
            5         xmlns:atom="http://www.w3.org/2005/Atom"
            6         xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
            7         xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
            8         >
            9 
           10 <channel>
           11         <title>VUSec</title>
           12         <atom:link href="https://www.vusec.net/feed/" rel="self" type="application/rss+xml" />
           13         <link>https://www.vusec.net</link>
           14         <description>Systems and Network Security Group at VU Amsterdam</description>
           15         <lastBuildDate>Wed, 12 Aug 2020 22:33:11 +0000</lastBuildDate>
           16         <language>en-US</language>
           17         <sy:updatePeriod>
           18         hourly        </sy:updatePeriod>
           19         <sy:updateFrequency>
           20         1        </sy:updateFrequency>
           21         <generator>https://wordpress.org/?v=5.5.1</generator>
           22 
           23 <image>
           24         <url>https://www.vusec.net/wp-content/uploads/2016/09/cropped-vusec-logo_small-32x32.png</url>
           25         <title>VUSec</title>
           26         <link>https://www.vusec.net</link>
           27         <width>32</width>
           28         <height>32</height>
           29 </image> 
           30         <item>
           31                 <title>VUSec wins HAck@Sec</title>
           32                 <link>https://www.vusec.net/2020/08/vusec-wins-hacksec/</link>
           33                 
           34                 <dc:creator><![CDATA[herbert.bos]]></dc:creator>
           35                 <pubDate>Wed, 12 Aug 2020 22:33:10 +0000</pubDate>
           36                                 <category><![CDATA[Uncategorized]]></category>
           37                 <guid isPermaLink="false">https://www.vusec.net/?p=1889</guid>
           38 
           39                                         <description><![CDATA[<p>We are happy to announce that the VUSec team won the Hack@Sec Hardware CTF @USENIXSecurity Congratulations to Alyssa, Enrico, Hany, Koen and Marius!</p>
           40 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/08/vusec-wins-hacksec/">VUSec wins HAck@Sec</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
           41 ]]></description>
           42                                                                                 <content:encoded><![CDATA[
           43 <p>We are happy to announce that the VUSec team won the Hack@Sec Hardware CTF @USENIXSecurity</p>
           44 
           45 
           46 
           47 <p>Congratulations to Alyssa, Enrico, Hany, Koen and Marius!</p>
           48 
           49 
           50 
           51 <figure class="wp-block-image size-large"><img loading="lazy" width="799" height="445" src="https://www.vusec.net/wp-content/uploads/2020/08/hack_at_sec_2020.png" alt="" class="wp-image-1890" srcset="https://www.vusec.net/wp-content/uploads/2020/08/hack_at_sec_2020.png 799w, https://www.vusec.net/wp-content/uploads/2020/08/hack_at_sec_2020-768x428.png 768w" sizes="(max-width: 799px) 100vw, 799px" /></figure>
           52 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/08/vusec-wins-hacksec/">VUSec wins HAck@Sec</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
           53 ]]></content:encoded>
           54                                         
           55                 
           56                 
           57                         </item>
           58                 <item>
           59                 <title>Pietro Frigo Wins Qualcomm Innovation fellowship</title>
           60                 <link>https://www.vusec.net/2020/05/pietro-frigo-wins-qualcomm-innovation-fellowship/</link>
           61                 
           62                 <dc:creator><![CDATA[herbert.bos]]></dc:creator>
           63                 <pubDate>Mon, 25 May 2020 17:01:00 +0000</pubDate>
           64                                 <category><![CDATA[Uncategorized]]></category>
           65                 <guid isPermaLink="false">https://www.vusec.net/?p=1770</guid>
           66 
           67                                         <description><![CDATA[<p>Pietro won the Qualcomm Innovation Fellowship. The QIF program is focused on recognizing, rewarding, and mentoring innovative PhD students across a broad range of technical research areas .</p>
           68 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/pietro-frigo-wins-qualcomm-innovation-fellowship/">Pietro Frigo Wins Qualcomm Innovation fellowship</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
           69 ]]></description>
           70                                                                                 <content:encoded><![CDATA[
           71 <p>Pietro won the <a href="https://www.qualcomm.com/invention/research/university-relations/innovation-fellowship/winners">Qualcomm Innovation Fellowship</a>. The QIF program is focused on recognizing, rewarding, and mentoring innovative PhD students across a broad range of technical research areas .</p>
           72 
           73 
           74 
           75 <div class="wp-block-group"><div class="wp-block-group__inner-container">
           76 <figure class="wp-block-gallery columns-2 is-cropped"><ul class="blocks-gallery-grid"><li class="blocks-gallery-item"><figure><img loading="lazy" width="674" height="1111" src="https://www.vusec.net/wp-content/uploads/2020/05/pit.jpg" alt="" data-id="1774" data-full-url="/wp-content/uploads/2020/05/pit.jpg" data-link="/pit-2/" class="wp-image-1774"/><figcaption class="blocks-gallery-item__caption">The ecstatic winner</figcaption></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" width="335" height="721" src="https://www.vusec.net/wp-content/uploads/2020/05/pietro_qif.2.png" alt="" data-id="1775" data-full-url="/wp-content/uploads/2020/05/pietro_qif.2.png" data-link="/pietro_qif-2/" class="wp-image-1775"/><figcaption class="blocks-gallery-item__caption">List of winners</figcaption></figure></li></ul></figure>
           77 </div></div>
           78 
           79 
           80 
           81 <p></p>
           82 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/pietro-frigo-wins-qualcomm-innovation-fellowship/">Pietro Frigo Wins Qualcomm Innovation fellowship</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
           83 ]]></content:encoded>
           84                                         
           85                 
           86                 
           87                         </item>
           88                 <item>
           89                 <title>TRRespass wins best paper Award at Security &#038; privacy</title>
           90                 <link>https://www.vusec.net/2020/05/trrespass-wins-best-paper-award-at-security-privacy/</link>
           91                 
           92                 <dc:creator><![CDATA[herbert.bos]]></dc:creator>
           93                 <pubDate>Mon, 25 May 2020 14:46:17 +0000</pubDate>
           94                                 <category><![CDATA[Uncategorized]]></category>
           95                 <guid isPermaLink="false">https://www.vusec.net/?p=1768</guid>
           96 
           97                                         <description><![CDATA[<p>Our TRRespass work on finding vulnerabilities in state-of-the-art in-DRAM defenses against Rowhammer attacks was awarded &#8220;Best Paper&#8221; at the IEEE Symposium on Security and Privacy (the leading Computer Security conference)</p>
           98 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/trrespass-wins-best-paper-award-at-security-privacy/">TRRespass wins best paper Award at Security &#038; privacy</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
           99 ]]></description>
          100                                                                                 <content:encoded><![CDATA[
          101 <p>Our <a href="https://www.vusec.net/projects/trrespass">TRRespass </a>work on finding vulnerabilities in state-of-the-art in-DRAM defenses against Rowhammer attacks was awarded &#8220;Best Paper&#8221; at the <a href="https://www.ieee-security.org/TC/SP2020">IEEE Symposium on Security and Privacy</a> (the leading Computer Security conference)</p>
          102 
          103 
          104 
          105 <figure class="wp-block-image size-large is-resized"><img loading="lazy" src="https://www.vusec.net/wp-content/uploads/2020/03/ddr4.jpg" alt="" class="wp-image-1701" width="505" height="337"/><figcaption>DDR4 DRAM chips of all major vendors still vulnerable to Rowhammer, despite TRR defense.</figcaption></figure>
          106 
          107 
          108 
          109 <figure class="wp-block-image size-large"><img loading="lazy" width="2560" height="1272" src="https://www.vusec.net/wp-content/uploads/2020/03/rowsVsFlips-scaled.jpg" alt="" class="wp-image-1656" srcset="https://www.vusec.net/wp-content/uploads/2020/03/rowsVsFlips-scaled.jpg 2560w, https://www.vusec.net/wp-content/uploads/2020/03/rowsVsFlips-768x382.jpg 768w, https://www.vusec.net/wp-content/uploads/2020/03/rowsVsFlips-1536x763.jpg 1536w, https://www.vusec.net/wp-content/uploads/2020/03/rowsVsFlips-2048x1017.jpg 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /><figcaption>if only we hammer more rows,</figcaption></figure>
          110 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/trrespass-wins-best-paper-award-at-security-privacy/">TRRespass wins best paper Award at Security &#038; privacy</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
          111 ]]></content:encoded>
          112                                         
          113                 
          114                 
          115                         </item>
          116                 <item>
          117                 <title>Cristiano Giuffrida WINS VMWare Early Career Faculty Grant</title>
          118                 <link>https://www.vusec.net/2020/05/cristiano-giuffrida-wins-vmware-early-career-faculty-grant/</link>
          119                 
          120                 <dc:creator><![CDATA[herbert.bos]]></dc:creator>
          121                 <pubDate>Mon, 25 May 2020 12:57:32 +0000</pubDate>
          122                                 <category><![CDATA[Uncategorized]]></category>
          123                 <guid isPermaLink="false">https://www.vusec.net/?p=1765</guid>
          124 
          125                                         <description><![CDATA[<p>We are proud to announce that Cristiano Giuffrida has won the VMware Early Career Faculty Grant &#8211; a program intended to recognize the next generation of exceptional faculty members. A gift to the researcher’s university is made in support of his/her research and to promote excellence in teaching.</p>
          126 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/cristiano-giuffrida-wins-vmware-early-career-faculty-grant/">Cristiano Giuffrida WINS VMWare Early Career Faculty Grant</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
          127 ]]></description>
          128                                                                                 <content:encoded><![CDATA[
          129 <p>We are proud to announce that <a href="https://www.vusec.net/people/cristiano-giuffrida/">Cristiano Giuffrida </a>has won the VMware <a href="https://www.vmware.com/company/research/faculty-programs.html#early">Early Career Faculty Grant </a>&#8211; a program intended to recognize the next generation of exceptional faculty members. A gift to the researcher’s university is made in support of his/her research and to promote excellence in teaching. </p>
          130 
          131 
          132 
          133 <figure class="wp-block-image size-large"><img loading="lazy" width="450" height="600" src="https://www.vusec.net/wp-content/uploads/2016/04/giuffrida_large.jpg" alt="" class="wp-image-68" srcset="https://www.vusec.net/wp-content/uploads/2016/04/giuffrida_large.jpg 450w, https://www.vusec.net/wp-content/uploads/2016/04/giuffrida_large-225x300.jpg 225w" sizes="(max-width: 450px) 100vw, 450px" /></figure>
          134 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/cristiano-giuffrida-wins-vmware-early-career-faculty-grant/">Cristiano Giuffrida WINS VMWare Early Career Faculty Grant</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
          135 ]]></content:encoded>
          136                                         
          137                 
          138                 
          139                         </item>
          140                 <item>
          141                 <title>Trrespass: Rowhammer in the news (again)</title>
          142                 <link>https://www.vusec.net/2020/03/trrespass-rowhammer-in-the-news-again/</link>
          143                 
          144                 <dc:creator><![CDATA[herbert.bos]]></dc:creator>
          145                 <pubDate>Thu, 12 Mar 2020 09:14:45 +0000</pubDate>
          146                                 <category><![CDATA[Uncategorized]]></category>
          147                 <guid isPermaLink="false">https://www.vusec.net/?p=1700</guid>
          148 
          149                                         <description><![CDATA[<p>Rowhammer, the DRAM vulnerability that was supposedly fixed in DDR4 is not fixed in DDR4. The TRRespass attack shows that DIMMs from all 3 major vendors (good for 95% of the market) are still vulnerable. The news appeared in different international media (see the writeup on NakedSecurity) and in the Netherlands in de Volkskrant. There &#8230; <a href="https://www.vusec.net/2020/03/trrespass-rowhammer-in-the-news-again/" class="more-link">Continue reading <span class="screen-reader-text">Trrespass: Rowhammer in the news (again)</span> <span class="meta-nav">&#8594;</span></a></p>
          150 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/03/trrespass-rowhammer-in-the-news-again/">Trrespass: Rowhammer in the news (again)</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
          151 ]]></description>
          152                                                                                 <content:encoded><![CDATA[
          153 <div class="wp-block-cover has-background-dim" style="background-image:url(/wp-content/uploads/2020/03/ddr4.jpg);min-height:215px"><div class="wp-block-cover__inner-container">
          154 <p class="has-text-align-center has-large-font-size"></p>
          155 </div></div>
          156 
          157 
          158 
          159 <p>Rowhammer, the DRAM vulnerability that was supposedly fixed in DDR4 is not fixed in DDR4. The <a href="https://www.vusec.net/projects/trrespass/">TRRespass</a> attack shows that DIMMs from all 3 major vendors (good for 95% of the market) are still vulnerable.  The news appeared in different international media (see the writeup on <a href="https://nakedsecurity.sophos.com/2020/03/11/trrepass-research-reveals-rowhammering-is-alive-and-well/">NakedSecurity</a>) and in the Netherlands in de <a href="https://www.volkskrant.nl/nieuws-achtergrond/vrijwel-elke-laptop-smartphone-en-server-ter-wereld-kwetsbaar-voor-aanvallen-ontdekt-vu~b23b8656/">Volkskrant</a>. There was a short interview on <a href="https://www.nporadio1.nl/langs-de-lijn-en-omstreken/uitzendingen/735849-2020-03-10">Radio 1 (22:51 h).</a></p>
          160 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/03/trrespass-rowhammer-in-the-news-again/">Trrespass: Rowhammer in the news (again)</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
          161 ]]></content:encoded>
          162                                         
          163                 
          164                 
          165                         </item>
          166                 <item>
          167                 <title>Harry King Wins bachelor Thesis Prize</title>
          168                 <link>https://www.vusec.net/2020/01/harry-king-wins-bachelor-thesis-prize/</link>
          169                 
          170                 <dc:creator><![CDATA[herbert.bos]]></dc:creator>
          171                 <pubDate>Thu, 23 Jan 2020 15:51:10 +0000</pubDate>
          172                                 <category><![CDATA[Uncategorized]]></category>
          173                 <guid isPermaLink="false">https://www.vusec.net/?p=1476</guid>
          174 
          175                                         <description><![CDATA[<p>Recently graduated Harry King just won the (university-wide) best bachelor thesis award for his thesis on &#8220;Development Tools &#38;Techniques for a More Robust Operating System&#8221;. For his thesis project he built an operating system kernel from scratch in Ada. The implementation in Ada allowed him to formally verify the OS components.</p>
          176 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/01/harry-king-wins-bachelor-thesis-prize/">Harry King Wins bachelor Thesis Prize</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
          177 ]]></description>
          178                                                                                 <content:encoded><![CDATA[
          179 <p>Recently graduated Harry King  just won the (university-wide) best bachelor thesis award  for his  thesis on &#8220;Development Tools &amp;<br>Techniques for a More Robust Operating System&#8221;.  For his thesis project he built an operating system kernel from scratch in Ada. The implementation in Ada allowed him to formally verify the OS components.  </p>
          180 
          181 
          182 
          183 <figure class="wp-block-image size-large is-resized"><img loading="lazy" src="https://www.vusec.net/wp-content/uploads/2020/01/harry_king_wins_prize-scaled.jpg" alt="" class="wp-image-1477" width="487" height="365" srcset="https://www.vusec.net/wp-content/uploads/2020/01/harry_king_wins_prize-scaled.jpg 2560w, https://www.vusec.net/wp-content/uploads/2020/01/harry_king_wins_prize-768x576.jpg 768w, https://www.vusec.net/wp-content/uploads/2020/01/harry_king_wins_prize-1536x1152.jpg 1536w, https://www.vusec.net/wp-content/uploads/2020/01/harry_king_wins_prize-2048x1536.jpg 2048w" sizes="(max-width: 487px) 100vw, 487px" /></figure>
          184 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/01/harry-king-wins-bachelor-thesis-prize/">Harry King Wins bachelor Thesis Prize</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
          185 ]]></content:encoded>
          186                                         
          187                 
          188                 
          189                         </item>
          190                 <item>
          191                 <title>RIDL Second in CSAW&#8217;19 Best applied Research</title>
          192                 <link>https://www.vusec.net/2019/11/ridl-second-in-csaw19-best-applied-research/</link>
          193                 
          194                 <dc:creator><![CDATA[herbert.bos]]></dc:creator>
          195                 <pubDate>Sat, 16 Nov 2019 12:26:14 +0000</pubDate>
          196                                 <category><![CDATA[Uncategorized]]></category>
          197                 <guid isPermaLink="false">https://www.vusec.net/?p=1330</guid>
          198 
          199                                         <description><![CDATA[<p>Two of VUSec&#8217;s papers were nominated for the Best Applied Research Award at CSAW&#8217;19 in Valence France: ECCploit and RIDL. When the dust settled, &#8220;RIDL: Rogue In-Flight Data Load&#8221;, thepaper that was published at Security &#38; Privacy in May and that shows a new class of speculative execution attacks that can leak any &#8220;in-flight&#8221; data &#8230; <a href="https://www.vusec.net/2019/11/ridl-second-in-csaw19-best-applied-research/" class="more-link">Continue reading <span class="screen-reader-text">RIDL Second in CSAW&#8217;19 Best applied Research</span> <span class="meta-nav">&#8594;</span></a></p>
          200 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/11/ridl-second-in-csaw19-best-applied-research/">RIDL Second in CSAW&#8217;19 Best applied Research</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
          201 ]]></description>
          202                                                                                 <content:encoded><![CDATA[
          203 <p>Two of VUSec&#8217;s papers were nominated for the Best Applied Research Award  at CSAW&#8217;19 in Valence France: <a href="https://www.vusec.net/projects/eccploit/">ECCploit</a> and <a href="https://mdsattacks.com/">RIDL</a>.</p>
          204 
          205 
          206 
          207 <p>When the dust settled, &#8220;RIDL: Rogue In-Flight Data Load&#8221;, the<br>paper that was published at Security &amp; Privacy in May and that shows a new class of speculative execution attacks that can leak any &#8220;in-flight&#8221; data from Intel CPUs won the second place<br>prize for Best Applied Research at CSAW &#8217;19. </p>
          208 
          209 
          210 
          211 <p>See also: &#8220;<a href="http://www.vusec.net/2019/11/much-ado-about-ridl/">Much Ado about RIDL</a>&#8220;.</p>
          212 
          213 
          214 
          215 <figure class="wp-block-image size-large"><img loading="lazy" width="1316" height="640" src="https://www.vusec.net/wp-content/uploads/2019/11/csaw-ridl-secondplace.jpg" alt="" class="wp-image-1331" srcset="https://www.vusec.net/wp-content/uploads/2019/11/csaw-ridl-secondplace.jpg 1316w, https://www.vusec.net/wp-content/uploads/2019/11/csaw-ridl-secondplace-768x373.jpg 768w" sizes="(max-width: 1316px) 100vw, 1316px" /></figure>
          216 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/11/ridl-second-in-csaw19-best-applied-research/">RIDL Second in CSAW&#8217;19 Best applied Research</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
          217 ]]></content:encoded>
          218                                         
          219                 
          220                 
          221                         </item>
          222                 <item>
          223                 <title>Much ado about RIDL</title>
          224                 <link>https://www.vusec.net/2019/11/much-ado-about-ridl/</link>
          225                 
          226                 <dc:creator><![CDATA[herbert.bos]]></dc:creator>
          227                 <pubDate>Sat, 16 Nov 2019 12:17:07 +0000</pubDate>
          228                                 <category><![CDATA[Uncategorized]]></category>
          229                 <guid isPermaLink="false">https://www.vusec.net/?p=1326</guid>
          230 
          231                                         <description><![CDATA[<p>The RIDL saga that started in September 2018 lingers on. A new embargo and a new set of insufficient patches, and it isn&#8217;t over yet. Excellent coverage by Kim Zetter in the New York Times. In addition there were many other outlets covering this: International: https://www.wired.com/story/intel-mds-attack-taa/ https://www.theverge.com/2019/11/13/20962667/intel-processor-security-vulnerabilities-researchers-disclosure https://www.ft.com/content/d60cda42-7699-11e9-be7d-6d846537acab https://in.pcmag.com/news/133831/intel-struggles-to-fix-hardware-based-flaws-researchers-say https://www.tomshardware.com/news/intel-reveals-taa-vulnerabilities-in-cascade-lake-chips-and-a-new-jcc-bug https://www.dailymail.co.uk/sciencetech/article-7681917/Intel-failed-fix-dangerous-chip-flaw-affecting-MILLIONS-Apple-Microsoft-Google-devices.html https://www.engadget.com/2019/11/13/intel-fixes-cpu-security-flaw-for-real/ https://gizmodo.com/intel-reportedly-warned-of-critical-chip-security-flaws-1839807262 Dutch: https://www.nu.nl/tech/6010595/onderzoekers-vrije-universiteit-intel-is-niet-eerlijk-over-processorlek.html &#8230; <a href="https://www.vusec.net/2019/11/much-ado-about-ridl/" class="more-link">Continue reading <span class="screen-reader-text">Much ado about RIDL</span> <span class="meta-nav">&#8594;</span></a></p>
          232 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/11/much-ado-about-ridl/">Much ado about RIDL</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
          233 ]]></description>
          234                                                                                 <content:encoded><![CDATA[
          235 <p>The RIDL saga that started in September 2018 lingers on. A new embargo and a new set of insufficient patches, and it isn&#8217;t over yet. Excellent coverage by Kim Zetter in the <a href="https://www.nytimes.com/2019/11/12/technology/intel-chip-fix.html">New York Times</a>.</p>
          236 
          237 
          238 
          239 <figure class="wp-block-image size-large"><a href="https://www.nytimes.com/2019/11/12/technology/intel-chip-fix.html"><img loading="lazy" width="1919" height="1129" src="https://www.vusec.net/wp-content/uploads/2019/11/nyt.12.11.2019.Stephan.png" alt="" class="wp-image-1327" srcset="https://www.vusec.net/wp-content/uploads/2019/11/nyt.12.11.2019.Stephan.png 1919w, https://www.vusec.net/wp-content/uploads/2019/11/nyt.12.11.2019.Stephan-768x452.png 768w, https://www.vusec.net/wp-content/uploads/2019/11/nyt.12.11.2019.Stephan-1536x904.png 1536w" sizes="(max-width: 1919px) 100vw, 1919px" /></a></figure>
          240 
          241 
          242 
          243 <p>In addition there were many other outlets covering this:</p>
          244 
          245 
          246 
          247 <h2>International:</h2>
          248 
          249 
          250 
          251 <figure class="wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-the-new-york-times"><div class="wp-block-embed__wrapper">
          252 <iframe title="Intel Fixes a Security Flaw It Said Was Repaired 6 Months Ago" class="wp-embedded-content" sandbox="allow-scripts" security="restricted" src="https://www.nytimes.com/svc/oembed/html/?url=https%3A%2F%2Fwww.nytimes.com%2F2019%2F11%2F12%2Ftechnology%2Fintel-chip-fix.html#?secret=pvQ8vgEmbY" data-secret="pvQ8vgEmbY" scrolling="no" frameborder="0"></iframe>
          253 </div></figure>
          254 
          255 
          256 
          257 <p><a href="https://www.wired.com/story/intel-mds-attack-taa/">https://www.wired.com/story/intel-mds-attack-taa/</a></p>
          258 
          259 
          260 
          261 <p><a href="https://www.theverge.com/2019/11/13/20962667/intel-processor-security-vulnerabilities-researchers-disclosure">https://www.theverge.com/2019/11/13/20962667/intel-processor-security-vulnerabilities-researchers-disclosure</a></p>
          262 
          263 
          264 
          265 <p><a href="https://www.ft.com/content/d60cda42-7699-11e9-be7d-6d846537acab">https://www.ft.com/content/d60cda42-7699-11e9-be7d-6d846537acab</a></p>
          266 
          267 
          268 
          269 <p><a href="https://in.pcmag.com/news/133831/intel-struggles-to-fix-hardware-based-flaws-researchers-say">https://in.pcmag.com/news/133831/intel-struggles-to-fix-hardware-based-flaws-researchers-say</a></p>
          270 
          271 
          272 
          273 <p><a href="https://www.tomshardware.com/news/intel-reveals-taa-vulnerabilities-in-cascade-lake-chips-and-a-new-jcc-bug">https://www.tomshardware.com/news/intel-reveals-taa-vulnerabilities-in-cascade-lake-chips-and-a-new-jcc-bug</a></p>
          274 
          275 
          276 
          277 <p><a href="https://www.dailymail.co.uk/sciencetech/article-7681917/Intel-failed-fix-dangerous-chip-flaw-affecting-MILLIONS-Apple-Microsoft-Google-devices.html">https://www.dailymail.co.uk/sciencetech/article-7681917/Intel-failed-fix-dangerous-chip-flaw-affecting-MILLIONS-Apple-Microsoft-Google-devices.html</a></p>
          278 
          279 
          280 
          281 <p><a href="https://www.engadget.com/2019/11/13/intel-fixes-cpu-security-flaw-for-real/">https://www.engadget.com/2019/11/13/intel-fixes-cpu-security-flaw-for-real/</a></p>
          282 
          283 
          284 
          285 <p><a href="https://gizmodo.com/intel-reportedly-warned-of-critical-chip-security-flaws-1839807262">https://gizmodo.com/intel-reportedly-warned-of-critical-chip-security-flaws-1839807262</a></p>
          286 
          287 
          288 
          289 <h2>Dutch:</h2>
          290 
          291 
          292 
          293 <p><a href="https://www.nu.nl/tech/6010595/onderzoekers-vrije-universiteit-intel-is-niet-eerlijk-over-processorlek.html">https://www.nu.nl/tech/6010595/onderzoekers-vrije-universiteit-intel-is-niet-eerlijk-over-processorlek.html</a></p>
          294 
          295 
          296 
          297 <p><a href="https://www.nporadio1.nl/nieuws-en-co/onderwerpen/519738-processorchips-intel-nog-steeds-kwetsbaar">https://www.nporadio1.nl/nieuws-en-co/onderwerpen/519738-processorchips-intel-nog-steeds-kwetsbaar</a></p>
          298 
          299 
          300 
          301 <p><a href="https://nos.nl/artikel/2310247-onderzoekers-intel-neemt-beveiligingslek-niet-serieus.html">https://nos.nl/artikel/2310247-onderzoekers-intel-neemt-beveiligingslek-niet-serieus.html</a></p>
          302 
          303 
          304 
          305 <p><a href="https://www.ad.nl/tech/onderzoekers-vu-intel-loog-over-oplossen-lek-in-chips~acb207e0/">https://www.ad.nl/tech/onderzoekers-vu-intel-loog-over-oplossen-lek-in-chips~acb207e0/</a></p>
          306 
          307 
          308 
          309 <p><a href="https://tweakers.net/nieuws/159826/vu-onderzoekers-intel-heeft-ridl-kwetsbaarheid-nog-niet-volledig-opgelost.html">https://tweakers.net/nieuws/159826/vu-onderzoekers-intel-heeft-ridl-kwetsbaarheid-nog-niet-volledig-opgelost.html</a></p>
          310 
          311 
          312 
          313 <p><a href="https://www.computable.nl/artikel/nieuws/cloud-computing/6834006/250449/oproep-vu-zet-hyperthreading-in-intel-processor-uit.html">https://www.computable.nl/artikel/nieuws/cloud-computing/6834006/250449/oproep-vu-zet-hyperthreading-in-intel-processor-uit.html</a></p>
          314 
          315 
          316 
          317 <p><a href="https://radar.avrotros.nl/nieuws/item/processorchips-van-intel-nog-steeds-kwetsbaar/">https://radar.avrotros.nl/nieuws/item/processorchips-van-intel-nog-steeds-kwetsbaar/</a></p>
          318 
          319 
          320 
          321 <p><a href="https://www.noordhollandsdagblad.nl/cnt/dmf20191113_36194155/vu-studie-intel-chips-nog-steeds-kwetsbaar">https://www.noordhollandsdagblad.nl/cnt/dmf20191113_36194155/vu-studie-intel-chips-nog-steeds-kwetsbaar</a></p>
          322 
          323 
          324 
          325 <p><a href="https://www.security.nl/posting/631293/VU-onderzoekers+onthullen+%22nieuwe%22+aanval+op+Intel-processors">https://www.security.nl/posting/631293/VU-onderzoekers+onthullen+%22nieuwe%22+aanval+op+Intel-processors</a></p>
          326 
          327 
          328 
          329 <h3>Tabloids:</h3>
          330 
          331 
          332 
          333 <p><a href="https://www.telegraaf.nl/nieuws/348361583/vu-studie-intel-chips-nog-steeds-kwetsbaar">https://www.telegraaf.nl/nieuws/348361583/vu-studie-intel-chips-nog-steeds-kwetsbaar</a></p>
          334 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/11/much-ado-about-ridl/">Much ado about RIDL</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
          335 ]]></content:encoded>
          336                                         
          337                 
          338                 
          339                         </item>
          340                 <item>
          341                 <title>ECCPloit wins distinguished paper award at IEEE S&#038;P 2019</title>
          342                 <link>https://www.vusec.net/2019/05/eccploit-wins-distinguished-paper-award/</link>
          343                 
          344                 <dc:creator><![CDATA[Cristiano Giuffrida]]></dc:creator>
          345                 <pubDate>Tue, 28 May 2019 11:10:00 +0000</pubDate>
          346                                 <category><![CDATA[award]]></category>
          347                 <guid isPermaLink="false">https://www.vusec.net/?p=1150</guid>
          348 
          349                                         <description><![CDATA[<p>The ECCploit paper by Lucian Cojocar won the Distinguished Practical Paper Award at IEEE Security &#38; Privacy 2019.</p>
          350 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/05/eccploit-wins-distinguished-paper-award/">ECCPloit wins distinguished paper award at IEEE S&#038;P 2019</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
          351 ]]></description>
          352                                                                                 <content:encoded><![CDATA[
          353 <p>The <a href="https://bibbase.org/network/publication/cojocar-razavi-giuffrida-bos-exploitingcorrectingcodesontheeffectivenessofeccmemoryagainstrowhammerattacks-2019">ECCploit</a> paper by Lucian Cojocar won the Distinguished Practical Paper Award at IEEE Security &amp; Privacy 2019.</p>
          354 
          355 
          356 
          357 <figure class="wp-block-image"><img loading="lazy" width="1089" height="651" src="https://www.vusec.net/wp-content/uploads/2019/05/image.png" alt="" class="wp-image-1151" srcset="https://www.vusec.net/wp-content/uploads/2019/05/image.png 1089w, https://www.vusec.net/wp-content/uploads/2019/05/image-768x459.png 768w" sizes="(max-width: 1089px) 100vw, 1089px" /></figure>
          358 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/05/eccploit-wins-distinguished-paper-award/">ECCPloit wins distinguished paper award at IEEE S&#038;P 2019</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
          359 ]]></content:encoded>
          360                                         
          361                 
          362                 
          363                         </item>
          364                 <item>
          365                 <title>RIDL featured in the media</title>
          366                 <link>https://www.vusec.net/2019/05/ridl-featured-in-the-media/</link>
          367                 
          368                 <dc:creator><![CDATA[Cristiano Giuffrida]]></dc:creator>
          369                 <pubDate>Mon, 20 May 2019 01:35:24 +0000</pubDate>
          370                                 <category><![CDATA[press]]></category>
          371                 <guid isPermaLink="false">https://www.vusec.net/?p=1146</guid>
          372 
          373                                         <description><![CDATA[<p>After a long embargo period of 9 months we made our paper RIDL: Rogue In-Flight Data Load available to the general public. RIDL introduces a new class of speculative execution attacks that can leak any &#8220;in-flight&#8221; data available in the CPU. More information (including some nice demo videos) are available at https://mdsattacks.com. We have also &#8230; <a href="https://www.vusec.net/2019/05/ridl-featured-in-the-media/" class="more-link">Continue reading <span class="screen-reader-text">RIDL featured in the media</span> <span class="meta-nav">&#8594;</span></a></p>
          374 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/05/ridl-featured-in-the-media/">RIDL featured in the media</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
          375 ]]></description>
          376                                                                                 <content:encoded><![CDATA[
          377 <p>After a long embargo period of 9 months we made our paper <a href="https://mdsattacks.com/files/ridl.pdf">RIDL: Rogue In-Flight Data Load</a> available to the general public. RIDL introduces a new class of speculative execution attacks that can leak any &#8220;in-flight&#8221; data available in the CPU.</p>
          378 
          379 
          380 
          381 <p>More information (including some nice demo videos) are available at  <a href="https://mdsattacks.com">https://mdsattacks.com</a>. We have also released a tool that you can use to see how vulnerable your computer is to different speculative execution attacks.</p>
          382 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/05/ridl-featured-in-the-media/">RIDL featured in the media</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
          383 ]]></content:encoded>
          384                                         
          385                 
          386                 
          387                         </item>
          388         </channel>
          389 </rss>