alvise
@hbitmasks
PhD Student @vu5ec (Systems Security). Previously: decompilers @_revng, rockets @skyward_er
ID: 1037869000410189824
07-09-2018 01:03:47
51 Tweet
185 Followers
251 Following
I am at ACM CCS 2025 , where alvise is about to present "Canflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks". Thanks to all coauthors: alvise, Stefano Longari, Michele Carminati, Stefano Zanero Full paper: dl.acm.org/doi/pdf/10.114…
Great talk by Floris Gorter about his project DangZero at ACM CCS 2025! Featuring also a nice little meme about Greg K-H approving the work :) gg
What a blast! Thanks to all my incredible co-authors Stefano Longari JinBlack (Mario Polino) Michele Carminati Stefano Zanero
Disclosing CHOP, aka how attackers can bypass commodity return address protections such as stack cookies by hijacking the exception handling process. Paper to appear NDSS Symposium: download.vusec.net/papers/chop_nd…. Joint work by Duta Victor Fabian Freyer Fabio Pagani nSinus-R (@[email protected]) Cristiano Giuffrida
I'm thrilled to announce that our paper "Speculation@Fault" USENIX Security is online! Read about how we automatically find information leakages arising from CPU exceptions by fuzzing against speculative contracts.
Disclosing #SLAM, aka how to combine Spectre and Intel LAM (& co.) to leak kernel memory on future CPUs (demo below). Thousands of exploitable "unmasked" (or pointer chasing) gadgets in the Linux kernel. Joint work by Mathé Hertogh Sander Wiebing Cristiano Giuffrida: vusec.net/projects/slam
If you ever happen to look for Spectre gadgets manually and feel pain and loneliness, you should check github.com/vusec/inspectr… ... It's been a wild ride, but working with Sander Wiebing was the best thing ever :) Also, BHI is back baby
The Spectre exploit chef Sander Wiebing just gave an impeccable talk at USENIX Security about our work on Spectre gadgets analysis and native BHI exploitation. Very happy - and proud of the Distinguished Paper award too :)