| Website | https://faculty.cc.gatech.edu/~genkin/ |
| Website | https://faculty.cc.gatech.edu/~genkin/ |
Have an Apple device from the last few years? We have a new side channel attack for you. Checkout our work at https://predictors.fail
Joint work with Jason Kim, Jalen Chuang and Yuval Yarom (@YuvalYarom). Could not have asked for a better team!
Ever wondered what happens when side-channel resistant code meets a fancy prefetcher? Checkout our paper breaking constant time crypto on Apple CPUs.
Joint work with Boru Chen, @yingchenwang96, @PradyumnaShome, Chris Fletcher, @dkohlbre, @ricpacca
Microarchitectural unboxing: check out our new demo for breaking two factor authentication using iLeakage. Yes you heard it, speculative execution attacks on Apple’s M3 Macs and latest Safari that defeat Facebook’s 2FA over SMS.
Google has removed a video posted by academic researchers demonstrating how a newly discovered side channel in Apple's A- and M-series CPUs can be used to steal a password.
I thought for sure the removal was a mistake, but a Google representative told me the video was removed for violating a term of service barring "demonstrating how to use computers or information technology to steal credentials, compromise personal data, or cause serious harm to others."
The video, demonstrating important research by @genkin, @YuvalYarom , @themadstephan and jason kim, is here:
Just to underscore how arbitrary and patently asinine Google's ToS enforcement is here, two additional videos the researchers posted demonstrating the same side channel remain available.
I wonder how researchers from #projectzero feel about this. Is there any chance any of them can intervene?