yingchen wang
@yingchenwang96
PhD student at UTAustin, working in applied cryptography and hardware security. [email protected]
ID: 1536100188011515905
https://www.cs.utexas.edu/~yingchen/ 12-06-2022 21:36:43
22 Tweet
386 Followers
181 Following
We found a way to mount *remote timing* attacks on *constant-time* cryptographic code running on modern x86 processors. How is that possible? With #hertzbleed! Here is how it works (with yingchen wang). hertzbleed.com
We would like to thank the collaboration with Cloudflare and Microsoft Research. Especially the mitigation of SIKE from Armando Faz 🌵 and Patrick Longa
A team of researchers, including yingchen wang & @Hovav Shacham of Computer Science at UT Austin, found that a common feature of modern computer processors can make even carefully written encryption software reveal its secrets when probed by an attacker. #Hertzbleed cns.utexas.edu/news/attackers…
You may have seen the Hertzbleed Attack logo on your screen a couple weeks ago but didn't look into it deeper. Now's your time! Check out our approachable explainer by yingchen wang (co-discoverer and Cloudflare intern) and Armando Faz 🌵 (research engineer). blog.cloudflare.com/hertzbleed-exp…
I am happy to announce that Collide+Power, our new and generic software-based power side-channel technique, has been accepted at USENIX Security 2023 #usesec23. collidepower.com
Ever wondered what happens when side-channel resistant code meets a fancy prefetcher? Checkout our paper breaking constant time crypto on Apple CPUs. gofetch.fail Joint work with Boru Chen, yingchen wang, Pradyumna Shome (pradyumna.bsky.social), Chris Fletcher, David Kohlbrenner, Riccardo Paccagnella