Daniel Genkin

225 Followers
112 Following
50 Posts
Associate Professor at Georgia Tech. Security, systems, side channels, cryptography.
Websitehttps://faculty.cc.gatech.edu/~genkin/
More interposer fun, this time with DDR5 memory. Breaking TDX, SGX, SEV and even Nvidia TEEs. Checkout our work at https://tee.fail
Want to know what happens when commercial TEEs meet improvised DRAM memory interposers? SGX mayhem including attestation key extraction. Please DO try that at home 😉. Check out our work at https://wiretap.fail

Have an Apple device from the last few years? We have a new side channel attack for you. Checkout our work at https://predictors.fail

Joint work with Jason Kim, Jalen Chuang and Yuval Yarom (@YuvalYarom). Could not have asked for a better team!

SLAP and FLOP

The SLAP and FLOP Address and Value Prediction Attacks

Microarchitectural unboxing: check out our new demo for breaking two factor authentication using iLeakage. Yes you heard it, speculative execution attacks on Apple’s M3 Macs and latest Safari that defeat Facebook’s 2FA over SMS.

https://ileakage.com

iLeakage

For those wondering if Apple’s iOS/iPadOS 17.1 and macOS 14.1 released yesterday protect against https://ileakage.com/? We took a look for you, the answer is no. Devices are still vulnerable.
iLeakage

After more than a year of embargo we can now show you how speculative attacks can extract sensitive information from Safari on @Apple platforms. Check out our latest paper https://ileakage.com/. Great work by Jason Kim, Stephan van Schaik and @YuvalYarom. Also we now have a group website https://architecture.fail/
iLeakage