yingchen wang (@yingchenwang96) 's Twitter Profile
yingchen wang

@yingchenwang96

PhD student at UTAustin, working in applied cryptography and hardware security. [email protected]

ID: 1536100188011515905

linkhttps://www.cs.utexas.edu/~yingchen/ calendar_today12-06-2022 21:36:43

22 Tweet

386 Followers

181 Following

Joseph Ravichandran (@0xjprx) 's Twitter Profile Photo

We found a way to defeat pointer authentication (and forge kernel pointers from userspace) on the Apple M1 via a new hardware attack. Here’s how it works- pacmanattack.com

Riccardo Paccagnella (@ricpacca) 's Twitter Profile Photo

We found a way to mount *remote timing* attacks on *constant-time* cryptographic code running on modern x86 processors. How is that possible? With #hertzbleed! Here is how it works (with yingchen wang). hertzbleed.com

NaturalSciences @ UT (@texasscience) 's Twitter Profile Photo

A team of researchers, including yingchen wang & @Hovav Shacham of Computer Science at UT Austin, found that a common feature of modern computer processors can make even carefully written encryption software reveal its secrets when probed by an attacker. #Hertzbleed cns.utexas.edu/news/attackers…

Nick Sullivan (@grittygrease) 's Twitter Profile Photo

You may have seen the Hertzbleed Attack logo on your screen a couple weeks ago but didn't look into it deeper. Now's your time! Check out our approachable explainer by yingchen wang (co-discoverer and Cloudflare intern) and Armando Faz 🌵 (research engineer). blog.cloudflare.com/hertzbleed-exp…

Andreas Kogler (@0xhilbert) 's Twitter Profile Photo

I am happy to announce that Collide+Power, our new and generic software-based power side-channel technique, has been accepted at USENIX Security 2023 #usesec23. collidepower.com

I am happy to announce that Collide+Power, our new and generic software-based power side-channel technique, has been accepted at <a href="/USENIXSecurity/">USENIX Security</a> 2023 #usesec23. collidepower.com
Daniel Moghimi (@flowyroll) 's Twitter Profile Photo

Dropping #Downfall, exploiting speculative forwarding of 'Gather' instruction to steal data from hardware registers. #MeltdownSequel - Practical to exploit (POC/Demo) - Defeat all isolation boundaries (OS, VM, SGX) - Bypass all Meltdown/MDS mitigations. downfall.page

Daniel Genkin (@danielgenkin) 's Twitter Profile Photo

Ever wondered what happens when side-channel resistant code meets a fancy prefetcher? Checkout our paper breaking constant time crypto on Apple CPUs. gofetch.fail Joint work with Boru Chen, yingchen wang, Pradyumna Shome (pradyumna.bsky.social), Chris Fletcher, David Kohlbrenner, Riccardo Paccagnella