yt vusec - sfeed_tests - sfeed tests and RSS and Atom files
(HTM) git clone git://git.codemadness.org/sfeed_tests
(DIR) Log
(DIR) Files
(DIR) Refs
(DIR) README
(DIR) LICENSE
---
yt vusec (20811B)
---
1 <?xml version="1.0" encoding="UTF-8"?>
2 <feed xmlns:yt="http://www.youtube.com/xml/schemas/2015" xmlns:media="http://search.yahoo.com/mrss/" xmlns="http://www.w3.org/2005/Atom">
3 <link rel="self" href="http://www.youtube.com/feeds/videos.xml?channel_id=UC9WimJoKklmni4feJD9bdhw"/>
4 <id>yt:channel:UC9WimJoKklmni4feJD9bdhw</id>
5 <yt:channelId>UC9WimJoKklmni4feJD9bdhw</yt:channelId>
6 <title>VUSec</title>
7 <link rel="alternate" href="https://www.youtube.com/channel/UC9WimJoKklmni4feJD9bdhw"/>
8 <author>
9 <name>VUSec</name>
10 <uri>https://www.youtube.com/channel/UC9WimJoKklmni4feJD9bdhw</uri>
11 </author>
12 <published>2016-02-09T18:07:13+00:00</published>
13 <entry>
14 <id>yt:video:m-FUIZiRN5o</id>
15 <yt:videoId>m-FUIZiRN5o</yt:videoId>
16 <yt:channelId>UC9WimJoKklmni4feJD9bdhw</yt:channelId>
17 <title>BlindSide - Exploit 1: Breaking KASLR with speculative probing to mount a kernel ROP exploit</title>
18 <link rel="alternate" href="https://www.youtube.com/watch?v=m-FUIZiRN5o"/>
19 <author>
20 <name>VUSec</name>
21 <uri>https://www.youtube.com/channel/UC9WimJoKklmni4feJD9bdhw</uri>
22 </author>
23 <published>2020-09-09T16:09:38+00:00</published>
24 <updated>2020-09-10T21:08:34+00:00</updated>
25 <media:group>
26 <media:title>BlindSide - Exploit 1: Breaking KASLR with speculative probing to mount a kernel ROP exploit</media:title>
27 <media:content url="https://www.youtube.com/v/m-FUIZiRN5o?version=3" type="application/x-shockwave-flash" width="640" height="390"/>
28 <media:thumbnail url="https://i2.ytimg.com/vi/m-FUIZiRN5o/hqdefault.jpg" width="480" height="360"/>
29 <media:description>See https://www.vusec.net/projects/blindside for more information on BlindSide (aka hacking blind in the Spectre era).</media:description>
30 <media:community>
31 <media:starRating count="48" average="4.83" min="1" max="5"/>
32 <media:statistics views="4189"/>
33 </media:community>
34 </media:group>
35 </entry>
36 <entry>
37 <id>yt:video:QkD_DfBCJDg</id>
38 <yt:videoId>QkD_DfBCJDg</yt:videoId>
39 <yt:channelId>UC9WimJoKklmni4feJD9bdhw</yt:channelId>
40 <title>SecurePay talk at EuroS&P 2020</title>
41 <link rel="alternate" href="https://www.youtube.com/watch?v=QkD_DfBCJDg"/>
42 <author>
43 <name>VUSec</name>
44 <uri>https://www.youtube.com/channel/UC9WimJoKklmni4feJD9bdhw</uri>
45 </author>
46 <published>2020-08-26T12:15:03+00:00</published>
47 <updated>2020-08-28T06:23:35+00:00</updated>
48 <media:group>
49 <media:title>SecurePay talk at EuroS&P 2020</media:title>
50 <media:content url="https://www.youtube.com/v/QkD_DfBCJDg?version=3" type="application/x-shockwave-flash" width="640" height="390"/>
51 <media:thumbnail url="https://i2.ytimg.com/vi/QkD_DfBCJDg/hqdefault.jpg" width="480" height="360"/>
52 <media:description>Secure transactions on the Internet often rely on two-factor authentication (2FA) using mobile phones. In most existing schemes, the separation between the factors is weak and a compromised phone may be enough to break 2FA. In this paper, we identify the basic principles for securing any transaction using mobile-based 2FA. In particular, we argue that the computing system should not only provide isolation between the two factors, but also the integrity of the transaction, while involving the user in confirming the authenticity of the transaction. We show for the first time how these properties can be provided on commodity mobile phones, securing 2FA protected transactions even when the operating system on the phone is fully compromised. We explore the challenges in the design and implementation of SecurePay, and evaluate the first formally-verified solution that utilizes the ARM TrustZone technology to provide the necessary integrity and authenticity guarantees for mobilebased 2FA. For our evaluation, we integrated SecurePay in ten existing apps, all of which required minimal changes and less than 30 minutes of work. Moreover, if code modifications
53 are not an option, SecurePay can still be used as a secure drop-in replacement for existing (insecure) SMS-based 2FA solutions.
54
55 Full paper available at: https://download.vusec.net/papers/securepay_eurosp20.pdf</media:description>
56 <media:community>
57 <media:starRating count="3" average="5.00" min="1" max="5"/>
58 <media:statistics views="59"/>
59 </media:community>
60 </media:group>
61 </entry>
62 <entry>
63 <id>yt:video:7tba2ayE3cI</id>
64 <yt:videoId>7tba2ayE3cI</yt:videoId>
65 <yt:channelId>UC9WimJoKklmni4feJD9bdhw</yt:channelId>
66 <title>CrossTalk (SRBDS) leaking SGX key across CPU cores in 1 second</title>
67 <link rel="alternate" href="https://www.youtube.com/watch?v=7tba2ayE3cI"/>
68 <author>
69 <name>VUSec</name>
70 <uri>https://www.youtube.com/channel/UC9WimJoKklmni4feJD9bdhw</uri>
71 </author>
72 <published>2020-06-09T16:50:48+00:00</published>
73 <updated>2020-08-22T01:59:33+00:00</updated>
74 <media:group>
75 <media:title>CrossTalk (SRBDS) leaking SGX key across CPU cores in 1 second</media:title>
76 <media:content url="https://www.youtube.com/v/7tba2ayE3cI?version=3" type="application/x-shockwave-flash" width="640" height="390"/>
77 <media:thumbnail url="https://i4.ytimg.com/vi/7tba2ayE3cI/hqdefault.jpg" width="480" height="360"/>
78 <media:description>See https://www.vusec.net/projects/crosstalk for more information on CrossTalk (SRBDS) and https://mdsattacks.com for more information on MDS attacks in general.</media:description>
79 <media:community>
80 <media:starRating count="20" average="4.80" min="1" max="5"/>
81 <media:statistics views="3946"/>
82 </media:community>
83 </media:group>
84 </entry>
85 <entry>
86 <id>yt:video:4DQAcCfg3b8</id>
87 <yt:videoId>4DQAcCfg3b8</yt:videoId>
88 <yt:channelId>UC9WimJoKklmni4feJD9bdhw</yt:channelId>
89 <title>RIDL leaking root entry in /etc/shadow in 4 seconds</title>
90 <link rel="alternate" href="https://www.youtube.com/watch?v=4DQAcCfg3b8"/>
91 <author>
92 <name>VUSec</name>
93 <uri>https://www.youtube.com/channel/UC9WimJoKklmni4feJD9bdhw</uri>
94 </author>
95 <published>2020-01-27T17:44:30+00:00</published>
96 <updated>2020-04-29T01:56:08+00:00</updated>
97 <media:group>
98 <media:title>RIDL leaking root entry in /etc/shadow in 4 seconds</media:title>
99 <media:content url="https://www.youtube.com/v/4DQAcCfg3b8?version=3" type="application/x-shockwave-flash" width="640" height="390"/>
100 <media:thumbnail url="https://i1.ytimg.com/vi/4DQAcCfg3b8/hqdefault.jpg" width="480" height="360"/>
101 <media:description>This version of RIDL-TAA SSH exploit makes use of certain optimizations to quickly leak the contents of /etc/shadow file. The exploit is written by Finn de Ridder as part of the Hardware Security master course at VU Amsterdam.</media:description>
102 <media:community>
103 <media:starRating count="21" average="4.81" min="1" max="5"/>
104 <media:statistics views="2885"/>
105 </media:community>
106 </media:group>
107 </entry>
108 <entry>
109 <id>yt:video:zaTxBZXE9pQ</id>
110 <yt:videoId>zaTxBZXE9pQ</yt:videoId>
111 <yt:channelId>UC9WimJoKklmni4feJD9bdhw</yt:channelId>
112 <title>RIDL-TAA leaking full root password hash in seconds</title>
113 <link rel="alternate" href="https://www.youtube.com/watch?v=zaTxBZXE9pQ"/>
114 <author>
115 <name>VUSec</name>
116 <uri>https://www.youtube.com/channel/UC9WimJoKklmni4feJD9bdhw</uri>
117 </author>
118 <published>2019-11-12T16:57:47+00:00</published>
119 <updated>2020-07-26T01:43:38+00:00</updated>
120 <media:group>
121 <media:title>RIDL-TAA leaking full root password hash in seconds</media:title>
122 <media:content url="https://www.youtube.com/v/zaTxBZXE9pQ?version=3" type="application/x-shockwave-flash" width="640" height="390"/>
123 <media:thumbnail url="https://i3.ytimg.com/vi/zaTxBZXE9pQ/hqdefault.jpg" width="480" height="360"/>
124 <media:description>See https://mdsattacks.com for more information on RIDL and TAA.</media:description>
125 <media:community>
126 <media:starRating count="48" average="4.92" min="1" max="5"/>
127 <media:statistics views="13170"/>
128 </media:community>
129 </media:group>
130 </entry>
131 <entry>
132 <id>yt:video:QXut1XBymAk</id>
133 <yt:videoId>QXut1XBymAk</yt:videoId>
134 <yt:channelId>UC9WimJoKklmni4feJD9bdhw</yt:channelId>
135 <title>NetCAT remotely leaking keystrokes from a victim SSH session</title>
136 <link rel="alternate" href="https://www.youtube.com/watch?v=QXut1XBymAk"/>
137 <author>
138 <name>VUSec</name>
139 <uri>https://www.youtube.com/channel/UC9WimJoKklmni4feJD9bdhw</uri>
140 </author>
141 <published>2019-09-10T17:01:33+00:00</published>
142 <updated>2020-08-25T16:33:00+00:00</updated>
143 <media:group>
144 <media:title>NetCAT remotely leaking keystrokes from a victim SSH session</media:title>
145 <media:content url="https://www.youtube.com/v/QXut1XBymAk?version=3" type="application/x-shockwave-flash" width="640" height="390"/>
146 <media:thumbnail url="https://i2.ytimg.com/vi/QXut1XBymAk/hqdefault.jpg" width="480" height="360"/>
147 <media:description></media:description>
148 <media:community>
149 <media:starRating count="118" average="4.90" min="1" max="5"/>
150 <media:statistics views="28806"/>
151 </media:community>
152 </media:group>
153 </entry>
154 <entry>
155 <id>yt:video:UV9GDcOWeeI</id>
156 <yt:videoId>UV9GDcOWeeI</yt:videoId>
157 <yt:channelId>UC9WimJoKklmni4feJD9bdhw</yt:channelId>
158 <title>RIDL leaking Linux kernel data</title>
159 <link rel="alternate" href="https://www.youtube.com/watch?v=UV9GDcOWeeI"/>
160 <author>
161 <name>VUSec</name>
162 <uri>https://www.youtube.com/channel/UC9WimJoKklmni4feJD9bdhw</uri>
163 </author>
164 <published>2019-05-14T17:06:16+00:00</published>
165 <updated>2020-08-26T05:15:23+00:00</updated>
166 <media:group>
167 <media:title>RIDL leaking Linux kernel data</media:title>
168 <media:content url="https://www.youtube.com/v/UV9GDcOWeeI?version=3" type="application/x-shockwave-flash" width="640" height="390"/>
169 <media:thumbnail url="https://i2.ytimg.com/vi/UV9GDcOWeeI/hqdefault.jpg" width="480" height="360"/>
170 <media:description>We showcase how to leak recent kernel data using RIDL. This demo first reads 0 bytes from /proc/version, whereafter we are able to leak the full contents of /proc/version without the data ever being present in userspace.</media:description>
171 <media:community>
172 <media:starRating count="52" average="4.38" min="1" max="5"/>
173 <media:statistics views="11397"/>
174 </media:community>
175 </media:group>
176 </entry>
177 <entry>
178 <id>yt:video:JXPebaGY8RA</id>
179 <yt:videoId>JXPebaGY8RA</yt:videoId>
180 <yt:channelId>UC9WimJoKklmni4feJD9bdhw</yt:channelId>
181 <title>RIDL leaking root password hash</title>
182 <link rel="alternate" href="https://www.youtube.com/watch?v=JXPebaGY8RA"/>
183 <author>
184 <name>VUSec</name>
185 <uri>https://www.youtube.com/channel/UC9WimJoKklmni4feJD9bdhw</uri>
186 </author>
187 <published>2019-05-14T17:06:11+00:00</published>
188 <updated>2019-05-16T18:59:03+00:00</updated>
189 <media:group>
190 <media:title>RIDL leaking root password hash</media:title>
191 <media:content url="https://www.youtube.com/v/JXPebaGY8RA?version=3" type="application/x-shockwave-flash" width="640" height="390"/>
192 <media:thumbnail url="https://i3.ytimg.com/vi/JXPebaGY8RA/hqdefault.jpg" width="480" height="360"/>
193 <media:description>We leaks the /etc/shadow file by repeatedly trying to authenticate a user with the passwd utility. The animation is sped up for the latter part of the video, the total process takes about 24 hours at the moment. A similar attack can leak the /etc/shadow of a cloud co-tenant by repeatedly opening an SSH connection.</media:description>
194 <media:community>
195 <media:starRating count="102" average="4.61" min="1" max="5"/>
196 <media:statistics views="28499"/>
197 </media:community>
198 </media:group>
199 </entry>
200 <entry>
201 <id>yt:video:KAgoDQmod1Y</id>
202 <yt:videoId>KAgoDQmod1Y</yt:videoId>
203 <yt:channelId>UC9WimJoKklmni4feJD9bdhw</yt:channelId>
204 <title>RIDL from JavaScript</title>
205 <link rel="alternate" href="https://www.youtube.com/watch?v=KAgoDQmod1Y"/>
206 <author>
207 <name>VUSec</name>
208 <uri>https://www.youtube.com/channel/UC9WimJoKklmni4feJD9bdhw</uri>
209 </author>
210 <published>2019-05-14T17:06:06+00:00</published>
211 <updated>2020-04-29T05:20:50+00:00</updated>
212 <media:group>
213 <media:title>RIDL from JavaScript</media:title>
214 <media:content url="https://www.youtube.com/v/KAgoDQmod1Y?version=3" type="application/x-shockwave-flash" width="640" height="390"/>
215 <media:thumbnail url="https://i4.ytimg.com/vi/KAgoDQmod1Y/hqdefault.jpg" width="480" height="360"/>
216 <media:description>We leak a string from another process using Javascript and WebAssembly in the SpiderMonkey engine.</media:description>
217 <media:community>
218 <media:starRating count="52" average="5.00" min="1" max="5"/>
219 <media:statistics views="17200"/>
220 </media:community>
221 </media:group>
222 </entry>
223 <entry>
224 <id>yt:video:vAbMrz4PYWY</id>
225 <yt:videoId>vAbMrz4PYWY</yt:videoId>
226 <yt:channelId>UC9WimJoKklmni4feJD9bdhw</yt:channelId>
227 <title>ASPLOS'19 lightning talk - kMVX: Detecting Kernel Information Leaks with Multi-variant Execution</title>
228 <link rel="alternate" href="https://www.youtube.com/watch?v=vAbMrz4PYWY"/>
229 <author>
230 <name>VUSec</name>
231 <uri>https://www.youtube.com/channel/UC9WimJoKklmni4feJD9bdhw</uri>
232 </author>
233 <published>2019-02-28T19:39:37+00:00</published>
234 <updated>2020-08-20T17:12:43+00:00</updated>
235 <media:group>
236 <media:title>ASPLOS'19 lightning talk - kMVX: Detecting Kernel Information Leaks with Multi-variant Execution</media:title>
237 <media:content url="https://www.youtube.com/v/vAbMrz4PYWY?version=3" type="application/x-shockwave-flash" width="640" height="390"/>
238 <media:thumbnail url="https://i3.ytimg.com/vi/vAbMrz4PYWY/hqdefault.jpg" width="480" height="360"/>
239 <media:description>kMVX: Detecting Kernel Information Leaks with Multi-variant Execution
240
241 Paper available at: https://www.cs.vu.nl/~herbertb/download/papers/kmvx_asplos19.pdf</media:description>
242 <media:community>
243 <media:starRating count="0" average="0.00" min="1" max="5"/>
244 <media:statistics views="217"/>
245 </media:community>
246 </media:group>
247 </entry>
248 <entry>
249 <id>yt:video:td6nCCNSn-s</id>
250 <yt:videoId>td6nCCNSn-s</yt:videoId>
251 <yt:channelId>UC9WimJoKklmni4feJD9bdhw</yt:channelId>
252 <title>XLATE + PROBE (text)</title>
253 <link rel="alternate" href="https://www.youtube.com/watch?v=td6nCCNSn-s"/>
254 <author>
255 <name>VUSec</name>
256 <uri>https://www.youtube.com/channel/UC9WimJoKklmni4feJD9bdhw</uri>
257 </author>
258 <published>2018-08-17T15:52:52+00:00</published>
259 <updated>2018-08-17T15:53:41+00:00</updated>
260 <media:group>
261 <media:title>XLATE + PROBE (text)</media:title>
262 <media:content url="https://www.youtube.com/v/td6nCCNSn-s?version=3" type="application/x-shockwave-flash" width="640" height="390"/>
263 <media:thumbnail url="https://i1.ytimg.com/vi/td6nCCNSn-s/hqdefault.jpg" width="480" height="360"/>
264 <media:description>Two programs are running on their own CPU core and use the cache as a covert channel to communicate with each other. The sender repeatedly sends "Hello, this is the covert channel speaking.". The receiver then receives this message using XLATE + PROBE. Before the communication can take place, the receiver first has to find eviction sets for each cache line to monitor activity.</media:description>
265 <media:community>
266 <media:starRating count="0" average="0.00" min="1" max="5"/>
267 <media:statistics views="43"/>
268 </media:community>
269 </media:group>
270 </entry>
271 <entry>
272 <id>yt:video:CTqtNQ9Ov3M</id>
273 <yt:videoId>CTqtNQ9Ov3M</yt:videoId>
274 <yt:channelId>UC9WimJoKklmni4feJD9bdhw</yt:channelId>
275 <title>FLUSH + RELOAD (text)</title>
276 <link rel="alternate" href="https://www.youtube.com/watch?v=CTqtNQ9Ov3M"/>
277 <author>
278 <name>VUSec</name>
279 <uri>https://www.youtube.com/channel/UC9WimJoKklmni4feJD9bdhw</uri>
280 </author>
281 <published>2018-08-17T15:52:52+00:00</published>
282 <updated>2020-07-27T01:00:52+00:00</updated>
283 <media:group>
284 <media:title>FLUSH + RELOAD (text)</media:title>
285 <media:content url="https://www.youtube.com/v/CTqtNQ9Ov3M?version=3" type="application/x-shockwave-flash" width="640" height="390"/>
286 <media:thumbnail url="https://i4.ytimg.com/vi/CTqtNQ9Ov3M/hqdefault.jpg" width="480" height="360"/>
287 <media:description>Two programs are running on their own CPU core and use the cache as a covert channel to communicate with each other. The sender repeatedly sends "Hello, this is the covert channel speaking.". The receiver then receives this message using FLUSH + RELOAD.</media:description>
288 <media:community>
289 <media:starRating count="3" average="5.00" min="1" max="5"/>
290 <media:statistics views="339"/>
291 </media:community>
292 </media:group>
293 </entry>
294 <entry>
295 <id>yt:video:h5ahucmqXQQ</id>
296 <yt:videoId>h5ahucmqXQQ</yt:videoId>
297 <yt:channelId>UC9WimJoKklmni4feJD9bdhw</yt:channelId>
298 <title>XLATE + PROBE (counter)</title>
299 <link rel="alternate" href="https://www.youtube.com/watch?v=h5ahucmqXQQ"/>
300 <author>
301 <name>VUSec</name>
302 <uri>https://www.youtube.com/channel/UC9WimJoKklmni4feJD9bdhw</uri>
303 </author>
304 <published>2018-08-17T15:52:52+00:00</published>
305 <updated>2019-02-13T02:23:54+00:00</updated>
306 <media:group>
307 <media:title>XLATE + PROBE (counter)</media:title>
308 <media:content url="https://www.youtube.com/v/h5ahucmqXQQ?version=3" type="application/x-shockwave-flash" width="640" height="390"/>
309 <media:thumbnail url="https://i1.ytimg.com/vi/h5ahucmqXQQ/hqdefault.jpg" width="480" height="360"/>
310 <media:description>Two programs are running on their own CPU core and use the cache as a covert channel to communicate with each other. Both the sender and the receiver maintain their own 8-bit counter to verify this communication channel. The sender sends the current value and increments the counter each time. The receiver then receives this value using XLATE + PROBE and verifies it against its own counter. Before the communication can take place, the receiver first has to find eviction sets for each cache line to monitor activity.</media:description>
311 <media:community>
312 <media:starRating count="1" average="5.00" min="1" max="5"/>
313 <media:statistics views="176"/>
314 </media:community>
315 </media:group>
316 </entry>
317 <entry>
318 <id>yt:video:UiEgn0bi_GU</id>
319 <yt:videoId>UiEgn0bi_GU</yt:videoId>
320 <yt:channelId>UC9WimJoKklmni4feJD9bdhw</yt:channelId>
321 <title>FLUSH + FLUSH (counter)</title>
322 <link rel="alternate" href="https://www.youtube.com/watch?v=UiEgn0bi_GU"/>
323 <author>
324 <name>VUSec</name>
325 <uri>https://www.youtube.com/channel/UC9WimJoKklmni4feJD9bdhw</uri>
326 </author>
327 <published>2018-08-17T15:52:52+00:00</published>
328 <updated>2020-04-29T02:47:08+00:00</updated>
329 <media:group>
330 <media:title>FLUSH + FLUSH (counter)</media:title>
331 <media:content url="https://www.youtube.com/v/UiEgn0bi_GU?version=3" type="application/x-shockwave-flash" width="640" height="390"/>
332 <media:thumbnail url="https://i2.ytimg.com/vi/UiEgn0bi_GU/hqdefault.jpg" width="480" height="360"/>
333 <media:description>Two programs are running on their own CPU core and use the cache as a covert channel to communicate with each other. Both the sender and the receiver maintain their own 8-bit counter to verify this communication channel. The sender sends the current value and increments the counter each time. The receiver then receives this value using FLUSH + FLUSH and verifies it against its own counter.</media:description>
334 <media:community>
335 <media:starRating count="0" average="0.00" min="1" max="5"/>
336 <media:statistics views="55"/>
337 </media:community>
338 </media:group>
339 </entry>
340 <entry>
341 <id>yt:video:0dQF4CT3Arg</id>
342 <yt:videoId>0dQF4CT3Arg</yt:videoId>
343 <yt:channelId>UC9WimJoKklmni4feJD9bdhw</yt:channelId>
344 <title>PRIME + PROBE (text)</title>
345 <link rel="alternate" href="https://www.youtube.com/watch?v=0dQF4CT3Arg"/>
346 <author>
347 <name>VUSec</name>
348 <uri>https://www.youtube.com/channel/UC9WimJoKklmni4feJD9bdhw</uri>
349 </author>
350 <published>2018-08-17T15:52:52+00:00</published>
351 <updated>2020-07-24T15:40:33+00:00</updated>
352 <media:group>
353 <media:title>PRIME + PROBE (text)</media:title>
354 <media:content url="https://www.youtube.com/v/0dQF4CT3Arg?version=3" type="application/x-shockwave-flash" width="640" height="390"/>
355 <media:thumbnail url="https://i1.ytimg.com/vi/0dQF4CT3Arg/hqdefault.jpg" width="480" height="360"/>
356 <media:description>Two programs are running on their own CPU core and use the cache as a covert channel to communicate with each other. The sender repeatedly sends "Hello, this is the covert channel speaking.". The receiver then receives this message using PRIME + PROBE. Before the communication can take place, the receiver first has to find eviction sets for each cache line to monitor activity.</media:description>
357 <media:community>
358 <media:starRating count="4" average="4.00" min="1" max="5"/>
359 <media:statistics views="146"/>
360 </media:community>
361 </media:group>
362 </entry>
363 </feed>