vusec - sfeed_tests - sfeed tests and RSS and Atom files
(HTM) git clone git://git.codemadness.org/sfeed_tests
(DIR) Log
(DIR) Files
(DIR) Refs
(DIR) README
(DIR) LICENSE
---
vusec (29234B)
---
1 <?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
2 xmlns:content="http://purl.org/rss/1.0/modules/content/"
3 xmlns:wfw="http://wellformedweb.org/CommentAPI/"
4 xmlns:dc="http://purl.org/dc/elements/1.1/"
5 xmlns:atom="http://www.w3.org/2005/Atom"
6 xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
7 xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
8 >
9
10 <channel>
11 <title>VUSec</title>
12 <atom:link href="https://www.vusec.net/feed/" rel="self" type="application/rss+xml" />
13 <link>https://www.vusec.net</link>
14 <description>Systems and Network Security Group at VU Amsterdam</description>
15 <lastBuildDate>Wed, 12 Aug 2020 22:33:11 +0000</lastBuildDate>
16 <language>en-US</language>
17 <sy:updatePeriod>
18 hourly </sy:updatePeriod>
19 <sy:updateFrequency>
20 1 </sy:updateFrequency>
21 <generator>https://wordpress.org/?v=5.5.1</generator>
22
23 <image>
24 <url>https://www.vusec.net/wp-content/uploads/2016/09/cropped-vusec-logo_small-32x32.png</url>
25 <title>VUSec</title>
26 <link>https://www.vusec.net</link>
27 <width>32</width>
28 <height>32</height>
29 </image>
30 <item>
31 <title>VUSec wins HAck@Sec</title>
32 <link>https://www.vusec.net/2020/08/vusec-wins-hacksec/</link>
33
34 <dc:creator><![CDATA[herbert.bos]]></dc:creator>
35 <pubDate>Wed, 12 Aug 2020 22:33:10 +0000</pubDate>
36 <category><![CDATA[Uncategorized]]></category>
37 <guid isPermaLink="false">https://www.vusec.net/?p=1889</guid>
38
39 <description><![CDATA[<p>We are happy to announce that the VUSec team won the Hack@Sec Hardware CTF @USENIXSecurity Congratulations to Alyssa, Enrico, Hany, Koen and Marius!</p>
40 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/08/vusec-wins-hacksec/">VUSec wins HAck@Sec</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
41 ]]></description>
42 <content:encoded><![CDATA[
43 <p>We are happy to announce that the VUSec team won the Hack@Sec Hardware CTF @USENIXSecurity</p>
44
45
46
47 <p>Congratulations to Alyssa, Enrico, Hany, Koen and Marius!</p>
48
49
50
51 <figure class="wp-block-image size-large"><img loading="lazy" width="799" height="445" src="https://www.vusec.net/wp-content/uploads/2020/08/hack_at_sec_2020.png" alt="" class="wp-image-1890" srcset="https://www.vusec.net/wp-content/uploads/2020/08/hack_at_sec_2020.png 799w, https://www.vusec.net/wp-content/uploads/2020/08/hack_at_sec_2020-768x428.png 768w" sizes="(max-width: 799px) 100vw, 799px" /></figure>
52 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/08/vusec-wins-hacksec/">VUSec wins HAck@Sec</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
53 ]]></content:encoded>
54
55
56
57 </item>
58 <item>
59 <title>Pietro Frigo Wins Qualcomm Innovation fellowship</title>
60 <link>https://www.vusec.net/2020/05/pietro-frigo-wins-qualcomm-innovation-fellowship/</link>
61
62 <dc:creator><![CDATA[herbert.bos]]></dc:creator>
63 <pubDate>Mon, 25 May 2020 17:01:00 +0000</pubDate>
64 <category><![CDATA[Uncategorized]]></category>
65 <guid isPermaLink="false">https://www.vusec.net/?p=1770</guid>
66
67 <description><![CDATA[<p>Pietro won the Qualcomm Innovation Fellowship. The QIF program is focused on recognizing, rewarding, and mentoring innovative PhD students across a broad range of technical research areas .</p>
68 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/pietro-frigo-wins-qualcomm-innovation-fellowship/">Pietro Frigo Wins Qualcomm Innovation fellowship</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
69 ]]></description>
70 <content:encoded><![CDATA[
71 <p>Pietro won the <a href="https://www.qualcomm.com/invention/research/university-relations/innovation-fellowship/winners">Qualcomm Innovation Fellowship</a>. The QIF program is focused on recognizing, rewarding, and mentoring innovative PhD students across a broad range of technical research areas .</p>
72
73
74
75 <div class="wp-block-group"><div class="wp-block-group__inner-container">
76 <figure class="wp-block-gallery columns-2 is-cropped"><ul class="blocks-gallery-grid"><li class="blocks-gallery-item"><figure><img loading="lazy" width="674" height="1111" src="https://www.vusec.net/wp-content/uploads/2020/05/pit.jpg" alt="" data-id="1774" data-full-url="/wp-content/uploads/2020/05/pit.jpg" data-link="/pit-2/" class="wp-image-1774"/><figcaption class="blocks-gallery-item__caption">The ecstatic winner</figcaption></figure></li><li class="blocks-gallery-item"><figure><img loading="lazy" width="335" height="721" src="https://www.vusec.net/wp-content/uploads/2020/05/pietro_qif.2.png" alt="" data-id="1775" data-full-url="/wp-content/uploads/2020/05/pietro_qif.2.png" data-link="/pietro_qif-2/" class="wp-image-1775"/><figcaption class="blocks-gallery-item__caption">List of winners</figcaption></figure></li></ul></figure>
77 </div></div>
78
79
80
81 <p></p>
82 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/pietro-frigo-wins-qualcomm-innovation-fellowship/">Pietro Frigo Wins Qualcomm Innovation fellowship</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
83 ]]></content:encoded>
84
85
86
87 </item>
88 <item>
89 <title>TRRespass wins best paper Award at Security & privacy</title>
90 <link>https://www.vusec.net/2020/05/trrespass-wins-best-paper-award-at-security-privacy/</link>
91
92 <dc:creator><![CDATA[herbert.bos]]></dc:creator>
93 <pubDate>Mon, 25 May 2020 14:46:17 +0000</pubDate>
94 <category><![CDATA[Uncategorized]]></category>
95 <guid isPermaLink="false">https://www.vusec.net/?p=1768</guid>
96
97 <description><![CDATA[<p>Our TRRespass work on finding vulnerabilities in state-of-the-art in-DRAM defenses against Rowhammer attacks was awarded “Best Paper” at the IEEE Symposium on Security and Privacy (the leading Computer Security conference)</p>
98 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/trrespass-wins-best-paper-award-at-security-privacy/">TRRespass wins best paper Award at Security & privacy</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
99 ]]></description>
100 <content:encoded><![CDATA[
101 <p>Our <a href="https://www.vusec.net/projects/trrespass">TRRespass </a>work on finding vulnerabilities in state-of-the-art in-DRAM defenses against Rowhammer attacks was awarded “Best Paper” at the <a href="https://www.ieee-security.org/TC/SP2020">IEEE Symposium on Security and Privacy</a> (the leading Computer Security conference)</p>
102
103
104
105 <figure class="wp-block-image size-large is-resized"><img loading="lazy" src="https://www.vusec.net/wp-content/uploads/2020/03/ddr4.jpg" alt="" class="wp-image-1701" width="505" height="337"/><figcaption>DDR4 DRAM chips of all major vendors still vulnerable to Rowhammer, despite TRR defense.</figcaption></figure>
106
107
108
109 <figure class="wp-block-image size-large"><img loading="lazy" width="2560" height="1272" src="https://www.vusec.net/wp-content/uploads/2020/03/rowsVsFlips-scaled.jpg" alt="" class="wp-image-1656" srcset="https://www.vusec.net/wp-content/uploads/2020/03/rowsVsFlips-scaled.jpg 2560w, https://www.vusec.net/wp-content/uploads/2020/03/rowsVsFlips-768x382.jpg 768w, https://www.vusec.net/wp-content/uploads/2020/03/rowsVsFlips-1536x763.jpg 1536w, https://www.vusec.net/wp-content/uploads/2020/03/rowsVsFlips-2048x1017.jpg 2048w" sizes="(max-width: 2560px) 100vw, 2560px" /><figcaption>if only we hammer more rows,</figcaption></figure>
110 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/trrespass-wins-best-paper-award-at-security-privacy/">TRRespass wins best paper Award at Security & privacy</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
111 ]]></content:encoded>
112
113
114
115 </item>
116 <item>
117 <title>Cristiano Giuffrida WINS VMWare Early Career Faculty Grant</title>
118 <link>https://www.vusec.net/2020/05/cristiano-giuffrida-wins-vmware-early-career-faculty-grant/</link>
119
120 <dc:creator><![CDATA[herbert.bos]]></dc:creator>
121 <pubDate>Mon, 25 May 2020 12:57:32 +0000</pubDate>
122 <category><![CDATA[Uncategorized]]></category>
123 <guid isPermaLink="false">https://www.vusec.net/?p=1765</guid>
124
125 <description><![CDATA[<p>We are proud to announce that Cristiano Giuffrida has won the VMware Early Career Faculty Grant – a program intended to recognize the next generation of exceptional faculty members. A gift to the researcher’s university is made in support of his/her research and to promote excellence in teaching.</p>
126 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/cristiano-giuffrida-wins-vmware-early-career-faculty-grant/">Cristiano Giuffrida WINS VMWare Early Career Faculty Grant</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
127 ]]></description>
128 <content:encoded><![CDATA[
129 <p>We are proud to announce that <a href="https://www.vusec.net/people/cristiano-giuffrida/">Cristiano Giuffrida </a>has won the VMware <a href="https://www.vmware.com/company/research/faculty-programs.html#early">Early Career Faculty Grant </a>– a program intended to recognize the next generation of exceptional faculty members. A gift to the researcher’s university is made in support of his/her research and to promote excellence in teaching. </p>
130
131
132
133 <figure class="wp-block-image size-large"><img loading="lazy" width="450" height="600" src="https://www.vusec.net/wp-content/uploads/2016/04/giuffrida_large.jpg" alt="" class="wp-image-68" srcset="https://www.vusec.net/wp-content/uploads/2016/04/giuffrida_large.jpg 450w, https://www.vusec.net/wp-content/uploads/2016/04/giuffrida_large-225x300.jpg 225w" sizes="(max-width: 450px) 100vw, 450px" /></figure>
134 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/05/cristiano-giuffrida-wins-vmware-early-career-faculty-grant/">Cristiano Giuffrida WINS VMWare Early Career Faculty Grant</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
135 ]]></content:encoded>
136
137
138
139 </item>
140 <item>
141 <title>Trrespass: Rowhammer in the news (again)</title>
142 <link>https://www.vusec.net/2020/03/trrespass-rowhammer-in-the-news-again/</link>
143
144 <dc:creator><![CDATA[herbert.bos]]></dc:creator>
145 <pubDate>Thu, 12 Mar 2020 09:14:45 +0000</pubDate>
146 <category><![CDATA[Uncategorized]]></category>
147 <guid isPermaLink="false">https://www.vusec.net/?p=1700</guid>
148
149 <description><![CDATA[<p>Rowhammer, the DRAM vulnerability that was supposedly fixed in DDR4 is not fixed in DDR4. The TRRespass attack shows that DIMMs from all 3 major vendors (good for 95% of the market) are still vulnerable. The news appeared in different international media (see the writeup on NakedSecurity) and in the Netherlands in de Volkskrant. There … <a href="https://www.vusec.net/2020/03/trrespass-rowhammer-in-the-news-again/" class="more-link">Continue reading <span class="screen-reader-text">Trrespass: Rowhammer in the news (again)</span> <span class="meta-nav">→</span></a></p>
150 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/03/trrespass-rowhammer-in-the-news-again/">Trrespass: Rowhammer in the news (again)</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
151 ]]></description>
152 <content:encoded><![CDATA[
153 <div class="wp-block-cover has-background-dim" style="background-image:url(/wp-content/uploads/2020/03/ddr4.jpg);min-height:215px"><div class="wp-block-cover__inner-container">
154 <p class="has-text-align-center has-large-font-size"></p>
155 </div></div>
156
157
158
159 <p>Rowhammer, the DRAM vulnerability that was supposedly fixed in DDR4 is not fixed in DDR4. The <a href="https://www.vusec.net/projects/trrespass/">TRRespass</a> attack shows that DIMMs from all 3 major vendors (good for 95% of the market) are still vulnerable. The news appeared in different international media (see the writeup on <a href="https://nakedsecurity.sophos.com/2020/03/11/trrepass-research-reveals-rowhammering-is-alive-and-well/">NakedSecurity</a>) and in the Netherlands in de <a href="https://www.volkskrant.nl/nieuws-achtergrond/vrijwel-elke-laptop-smartphone-en-server-ter-wereld-kwetsbaar-voor-aanvallen-ontdekt-vu~b23b8656/">Volkskrant</a>. There was a short interview on <a href="https://www.nporadio1.nl/langs-de-lijn-en-omstreken/uitzendingen/735849-2020-03-10">Radio 1 (22:51 h).</a></p>
160 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/03/trrespass-rowhammer-in-the-news-again/">Trrespass: Rowhammer in the news (again)</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
161 ]]></content:encoded>
162
163
164
165 </item>
166 <item>
167 <title>Harry King Wins bachelor Thesis Prize</title>
168 <link>https://www.vusec.net/2020/01/harry-king-wins-bachelor-thesis-prize/</link>
169
170 <dc:creator><![CDATA[herbert.bos]]></dc:creator>
171 <pubDate>Thu, 23 Jan 2020 15:51:10 +0000</pubDate>
172 <category><![CDATA[Uncategorized]]></category>
173 <guid isPermaLink="false">https://www.vusec.net/?p=1476</guid>
174
175 <description><![CDATA[<p>Recently graduated Harry King just won the (university-wide) best bachelor thesis award for his thesis on “Development Tools &Techniques for a More Robust Operating System”. For his thesis project he built an operating system kernel from scratch in Ada. The implementation in Ada allowed him to formally verify the OS components.</p>
176 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/01/harry-king-wins-bachelor-thesis-prize/">Harry King Wins bachelor Thesis Prize</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
177 ]]></description>
178 <content:encoded><![CDATA[
179 <p>Recently graduated Harry King just won the (university-wide) best bachelor thesis award for his thesis on “Development Tools &<br>Techniques for a More Robust Operating System”. For his thesis project he built an operating system kernel from scratch in Ada. The implementation in Ada allowed him to formally verify the OS components. </p>
180
181
182
183 <figure class="wp-block-image size-large is-resized"><img loading="lazy" src="https://www.vusec.net/wp-content/uploads/2020/01/harry_king_wins_prize-scaled.jpg" alt="" class="wp-image-1477" width="487" height="365" srcset="https://www.vusec.net/wp-content/uploads/2020/01/harry_king_wins_prize-scaled.jpg 2560w, https://www.vusec.net/wp-content/uploads/2020/01/harry_king_wins_prize-768x576.jpg 768w, https://www.vusec.net/wp-content/uploads/2020/01/harry_king_wins_prize-1536x1152.jpg 1536w, https://www.vusec.net/wp-content/uploads/2020/01/harry_king_wins_prize-2048x1536.jpg 2048w" sizes="(max-width: 487px) 100vw, 487px" /></figure>
184 <p>The post <a rel="nofollow" href="https://www.vusec.net/2020/01/harry-king-wins-bachelor-thesis-prize/">Harry King Wins bachelor Thesis Prize</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
185 ]]></content:encoded>
186
187
188
189 </item>
190 <item>
191 <title>RIDL Second in CSAW’19 Best applied Research</title>
192 <link>https://www.vusec.net/2019/11/ridl-second-in-csaw19-best-applied-research/</link>
193
194 <dc:creator><![CDATA[herbert.bos]]></dc:creator>
195 <pubDate>Sat, 16 Nov 2019 12:26:14 +0000</pubDate>
196 <category><![CDATA[Uncategorized]]></category>
197 <guid isPermaLink="false">https://www.vusec.net/?p=1330</guid>
198
199 <description><![CDATA[<p>Two of VUSec’s papers were nominated for the Best Applied Research Award at CSAW’19 in Valence France: ECCploit and RIDL. When the dust settled, “RIDL: Rogue In-Flight Data Load”, thepaper that was published at Security & Privacy in May and that shows a new class of speculative execution attacks that can leak any “in-flight” data … <a href="https://www.vusec.net/2019/11/ridl-second-in-csaw19-best-applied-research/" class="more-link">Continue reading <span class="screen-reader-text">RIDL Second in CSAW’19 Best applied Research</span> <span class="meta-nav">→</span></a></p>
200 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/11/ridl-second-in-csaw19-best-applied-research/">RIDL Second in CSAW’19 Best applied Research</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
201 ]]></description>
202 <content:encoded><![CDATA[
203 <p>Two of VUSec’s papers were nominated for the Best Applied Research Award at CSAW’19 in Valence France: <a href="https://www.vusec.net/projects/eccploit/">ECCploit</a> and <a href="https://mdsattacks.com/">RIDL</a>.</p>
204
205
206
207 <p>When the dust settled, “RIDL: Rogue In-Flight Data Load”, the<br>paper that was published at Security & Privacy in May and that shows a new class of speculative execution attacks that can leak any “in-flight” data from Intel CPUs won the second place<br>prize for Best Applied Research at CSAW ’19. </p>
208
209
210
211 <p>See also: “<a href="http://www.vusec.net/2019/11/much-ado-about-ridl/">Much Ado about RIDL</a>“.</p>
212
213
214
215 <figure class="wp-block-image size-large"><img loading="lazy" width="1316" height="640" src="https://www.vusec.net/wp-content/uploads/2019/11/csaw-ridl-secondplace.jpg" alt="" class="wp-image-1331" srcset="https://www.vusec.net/wp-content/uploads/2019/11/csaw-ridl-secondplace.jpg 1316w, https://www.vusec.net/wp-content/uploads/2019/11/csaw-ridl-secondplace-768x373.jpg 768w" sizes="(max-width: 1316px) 100vw, 1316px" /></figure>
216 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/11/ridl-second-in-csaw19-best-applied-research/">RIDL Second in CSAW’19 Best applied Research</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
217 ]]></content:encoded>
218
219
220
221 </item>
222 <item>
223 <title>Much ado about RIDL</title>
224 <link>https://www.vusec.net/2019/11/much-ado-about-ridl/</link>
225
226 <dc:creator><![CDATA[herbert.bos]]></dc:creator>
227 <pubDate>Sat, 16 Nov 2019 12:17:07 +0000</pubDate>
228 <category><![CDATA[Uncategorized]]></category>
229 <guid isPermaLink="false">https://www.vusec.net/?p=1326</guid>
230
231 <description><![CDATA[<p>The RIDL saga that started in September 2018 lingers on. A new embargo and a new set of insufficient patches, and it isn’t over yet. Excellent coverage by Kim Zetter in the New York Times. In addition there were many other outlets covering this: International: https://www.wired.com/story/intel-mds-attack-taa/ https://www.theverge.com/2019/11/13/20962667/intel-processor-security-vulnerabilities-researchers-disclosure https://www.ft.com/content/d60cda42-7699-11e9-be7d-6d846537acab https://in.pcmag.com/news/133831/intel-struggles-to-fix-hardware-based-flaws-researchers-say https://www.tomshardware.com/news/intel-reveals-taa-vulnerabilities-in-cascade-lake-chips-and-a-new-jcc-bug https://www.dailymail.co.uk/sciencetech/article-7681917/Intel-failed-fix-dangerous-chip-flaw-affecting-MILLIONS-Apple-Microsoft-Google-devices.html https://www.engadget.com/2019/11/13/intel-fixes-cpu-security-flaw-for-real/ https://gizmodo.com/intel-reportedly-warned-of-critical-chip-security-flaws-1839807262 Dutch: https://www.nu.nl/tech/6010595/onderzoekers-vrije-universiteit-intel-is-niet-eerlijk-over-processorlek.html … <a href="https://www.vusec.net/2019/11/much-ado-about-ridl/" class="more-link">Continue reading <span class="screen-reader-text">Much ado about RIDL</span> <span class="meta-nav">→</span></a></p>
232 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/11/much-ado-about-ridl/">Much ado about RIDL</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
233 ]]></description>
234 <content:encoded><![CDATA[
235 <p>The RIDL saga that started in September 2018 lingers on. A new embargo and a new set of insufficient patches, and it isn’t over yet. Excellent coverage by Kim Zetter in the <a href="https://www.nytimes.com/2019/11/12/technology/intel-chip-fix.html">New York Times</a>.</p>
236
237
238
239 <figure class="wp-block-image size-large"><a href="https://www.nytimes.com/2019/11/12/technology/intel-chip-fix.html"><img loading="lazy" width="1919" height="1129" src="https://www.vusec.net/wp-content/uploads/2019/11/nyt.12.11.2019.Stephan.png" alt="" class="wp-image-1327" srcset="https://www.vusec.net/wp-content/uploads/2019/11/nyt.12.11.2019.Stephan.png 1919w, https://www.vusec.net/wp-content/uploads/2019/11/nyt.12.11.2019.Stephan-768x452.png 768w, https://www.vusec.net/wp-content/uploads/2019/11/nyt.12.11.2019.Stephan-1536x904.png 1536w" sizes="(max-width: 1919px) 100vw, 1919px" /></a></figure>
240
241
242
243 <p>In addition there were many other outlets covering this:</p>
244
245
246
247 <h2>International:</h2>
248
249
250
251 <figure class="wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-the-new-york-times"><div class="wp-block-embed__wrapper">
252 <iframe title="Intel Fixes a Security Flaw It Said Was Repaired 6 Months Ago" class="wp-embedded-content" sandbox="allow-scripts" security="restricted" src="https://www.nytimes.com/svc/oembed/html/?url=https%3A%2F%2Fwww.nytimes.com%2F2019%2F11%2F12%2Ftechnology%2Fintel-chip-fix.html#?secret=pvQ8vgEmbY" data-secret="pvQ8vgEmbY" scrolling="no" frameborder="0"></iframe>
253 </div></figure>
254
255
256
257 <p><a href="https://www.wired.com/story/intel-mds-attack-taa/">https://www.wired.com/story/intel-mds-attack-taa/</a></p>
258
259
260
261 <p><a href="https://www.theverge.com/2019/11/13/20962667/intel-processor-security-vulnerabilities-researchers-disclosure">https://www.theverge.com/2019/11/13/20962667/intel-processor-security-vulnerabilities-researchers-disclosure</a></p>
262
263
264
265 <p><a href="https://www.ft.com/content/d60cda42-7699-11e9-be7d-6d846537acab">https://www.ft.com/content/d60cda42-7699-11e9-be7d-6d846537acab</a></p>
266
267
268
269 <p><a href="https://in.pcmag.com/news/133831/intel-struggles-to-fix-hardware-based-flaws-researchers-say">https://in.pcmag.com/news/133831/intel-struggles-to-fix-hardware-based-flaws-researchers-say</a></p>
270
271
272
273 <p><a href="https://www.tomshardware.com/news/intel-reveals-taa-vulnerabilities-in-cascade-lake-chips-and-a-new-jcc-bug">https://www.tomshardware.com/news/intel-reveals-taa-vulnerabilities-in-cascade-lake-chips-and-a-new-jcc-bug</a></p>
274
275
276
277 <p><a href="https://www.dailymail.co.uk/sciencetech/article-7681917/Intel-failed-fix-dangerous-chip-flaw-affecting-MILLIONS-Apple-Microsoft-Google-devices.html">https://www.dailymail.co.uk/sciencetech/article-7681917/Intel-failed-fix-dangerous-chip-flaw-affecting-MILLIONS-Apple-Microsoft-Google-devices.html</a></p>
278
279
280
281 <p><a href="https://www.engadget.com/2019/11/13/intel-fixes-cpu-security-flaw-for-real/">https://www.engadget.com/2019/11/13/intel-fixes-cpu-security-flaw-for-real/</a></p>
282
283
284
285 <p><a href="https://gizmodo.com/intel-reportedly-warned-of-critical-chip-security-flaws-1839807262">https://gizmodo.com/intel-reportedly-warned-of-critical-chip-security-flaws-1839807262</a></p>
286
287
288
289 <h2>Dutch:</h2>
290
291
292
293 <p><a href="https://www.nu.nl/tech/6010595/onderzoekers-vrije-universiteit-intel-is-niet-eerlijk-over-processorlek.html">https://www.nu.nl/tech/6010595/onderzoekers-vrije-universiteit-intel-is-niet-eerlijk-over-processorlek.html</a></p>
294
295
296
297 <p><a href="https://www.nporadio1.nl/nieuws-en-co/onderwerpen/519738-processorchips-intel-nog-steeds-kwetsbaar">https://www.nporadio1.nl/nieuws-en-co/onderwerpen/519738-processorchips-intel-nog-steeds-kwetsbaar</a></p>
298
299
300
301 <p><a href="https://nos.nl/artikel/2310247-onderzoekers-intel-neemt-beveiligingslek-niet-serieus.html">https://nos.nl/artikel/2310247-onderzoekers-intel-neemt-beveiligingslek-niet-serieus.html</a></p>
302
303
304
305 <p><a href="https://www.ad.nl/tech/onderzoekers-vu-intel-loog-over-oplossen-lek-in-chips~acb207e0/">https://www.ad.nl/tech/onderzoekers-vu-intel-loog-over-oplossen-lek-in-chips~acb207e0/</a></p>
306
307
308
309 <p><a href="https://tweakers.net/nieuws/159826/vu-onderzoekers-intel-heeft-ridl-kwetsbaarheid-nog-niet-volledig-opgelost.html">https://tweakers.net/nieuws/159826/vu-onderzoekers-intel-heeft-ridl-kwetsbaarheid-nog-niet-volledig-opgelost.html</a></p>
310
311
312
313 <p><a href="https://www.computable.nl/artikel/nieuws/cloud-computing/6834006/250449/oproep-vu-zet-hyperthreading-in-intel-processor-uit.html">https://www.computable.nl/artikel/nieuws/cloud-computing/6834006/250449/oproep-vu-zet-hyperthreading-in-intel-processor-uit.html</a></p>
314
315
316
317 <p><a href="https://radar.avrotros.nl/nieuws/item/processorchips-van-intel-nog-steeds-kwetsbaar/">https://radar.avrotros.nl/nieuws/item/processorchips-van-intel-nog-steeds-kwetsbaar/</a></p>
318
319
320
321 <p><a href="https://www.noordhollandsdagblad.nl/cnt/dmf20191113_36194155/vu-studie-intel-chips-nog-steeds-kwetsbaar">https://www.noordhollandsdagblad.nl/cnt/dmf20191113_36194155/vu-studie-intel-chips-nog-steeds-kwetsbaar</a></p>
322
323
324
325 <p><a href="https://www.security.nl/posting/631293/VU-onderzoekers+onthullen+%22nieuwe%22+aanval+op+Intel-processors">https://www.security.nl/posting/631293/VU-onderzoekers+onthullen+%22nieuwe%22+aanval+op+Intel-processors</a></p>
326
327
328
329 <h3>Tabloids:</h3>
330
331
332
333 <p><a href="https://www.telegraaf.nl/nieuws/348361583/vu-studie-intel-chips-nog-steeds-kwetsbaar">https://www.telegraaf.nl/nieuws/348361583/vu-studie-intel-chips-nog-steeds-kwetsbaar</a></p>
334 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/11/much-ado-about-ridl/">Much ado about RIDL</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
335 ]]></content:encoded>
336
337
338
339 </item>
340 <item>
341 <title>ECCPloit wins distinguished paper award at IEEE S&P 2019</title>
342 <link>https://www.vusec.net/2019/05/eccploit-wins-distinguished-paper-award/</link>
343
344 <dc:creator><![CDATA[Cristiano Giuffrida]]></dc:creator>
345 <pubDate>Tue, 28 May 2019 11:10:00 +0000</pubDate>
346 <category><![CDATA[award]]></category>
347 <guid isPermaLink="false">https://www.vusec.net/?p=1150</guid>
348
349 <description><![CDATA[<p>The ECCploit paper by Lucian Cojocar won the Distinguished Practical Paper Award at IEEE Security & Privacy 2019.</p>
350 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/05/eccploit-wins-distinguished-paper-award/">ECCPloit wins distinguished paper award at IEEE S&P 2019</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
351 ]]></description>
352 <content:encoded><![CDATA[
353 <p>The <a href="https://bibbase.org/network/publication/cojocar-razavi-giuffrida-bos-exploitingcorrectingcodesontheeffectivenessofeccmemoryagainstrowhammerattacks-2019">ECCploit</a> paper by Lucian Cojocar won the Distinguished Practical Paper Award at IEEE Security & Privacy 2019.</p>
354
355
356
357 <figure class="wp-block-image"><img loading="lazy" width="1089" height="651" src="https://www.vusec.net/wp-content/uploads/2019/05/image.png" alt="" class="wp-image-1151" srcset="https://www.vusec.net/wp-content/uploads/2019/05/image.png 1089w, https://www.vusec.net/wp-content/uploads/2019/05/image-768x459.png 768w" sizes="(max-width: 1089px) 100vw, 1089px" /></figure>
358 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/05/eccploit-wins-distinguished-paper-award/">ECCPloit wins distinguished paper award at IEEE S&P 2019</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
359 ]]></content:encoded>
360
361
362
363 </item>
364 <item>
365 <title>RIDL featured in the media</title>
366 <link>https://www.vusec.net/2019/05/ridl-featured-in-the-media/</link>
367
368 <dc:creator><![CDATA[Cristiano Giuffrida]]></dc:creator>
369 <pubDate>Mon, 20 May 2019 01:35:24 +0000</pubDate>
370 <category><![CDATA[press]]></category>
371 <guid isPermaLink="false">https://www.vusec.net/?p=1146</guid>
372
373 <description><![CDATA[<p>After a long embargo period of 9 months we made our paper RIDL: Rogue In-Flight Data Load available to the general public. RIDL introduces a new class of speculative execution attacks that can leak any “in-flight” data available in the CPU. More information (including some nice demo videos) are available at https://mdsattacks.com. We have also … <a href="https://www.vusec.net/2019/05/ridl-featured-in-the-media/" class="more-link">Continue reading <span class="screen-reader-text">RIDL featured in the media</span> <span class="meta-nav">→</span></a></p>
374 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/05/ridl-featured-in-the-media/">RIDL featured in the media</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
375 ]]></description>
376 <content:encoded><![CDATA[
377 <p>After a long embargo period of 9 months we made our paper <a href="https://mdsattacks.com/files/ridl.pdf">RIDL: Rogue In-Flight Data Load</a> available to the general public. RIDL introduces a new class of speculative execution attacks that can leak any “in-flight” data available in the CPU.</p>
378
379
380
381 <p>More information (including some nice demo videos) are available at <a href="https://mdsattacks.com">https://mdsattacks.com</a>. We have also released a tool that you can use to see how vulnerable your computer is to different speculative execution attacks.</p>
382 <p>The post <a rel="nofollow" href="https://www.vusec.net/2019/05/ridl-featured-in-the-media/">RIDL featured in the media</a> appeared first on <a rel="nofollow" href="https://www.vusec.net">VUSec</a>.</p>
383 ]]></content:encoded>
384
385
386
387 </item>
388 </channel>
389 </rss>