Secure Enclaves, TPM, Hardware Wallets, Side-Channel Attacks
Faculty and Students Present at USENIX Security Symposium
cylab.cmu.eduยท17h
System Register Hijacking: Compromising Kernel Integrity By Turning System Registers Against the System
usenix.orgยท1d
AMD and Intel plug numerous security holes
heise.deยท14h
Navigating the modern security stack
techradar.comยท3h
The Critical Role of Pre-Silicon Security Verification with Secure-ICโs Laboryzrโข Platform
semiwiki.comยท2d
The WETC Double-Spend
blog.verichains.ioยท1d
Heracles: Chosen Plaintext Attack on AMD SEV-SNP
packetstorm.newsยท1d
The Root(ing) Of All Evil: Security Holes That Could Compromise Your Mobile Device
zimperium.comยท20h
Atomic I/O letters column #139
dansdata.comยท1d
Intriguing Properties of gpt-oss Jailbreaks
lesswrong.comยท14h
Loading...Loading more...