HOSEIN. YAVARZADEH (@hosein_yz) 's Twitter Profile
HOSEIN. YAVARZADEH

@hosein_yz

PhD Candidate @ucsd_cse | Research Intern @Google | Microarchitecture Security, Side Channels, Computer Architecture | Previously Research Intern @Qualcomm

ID: 1039853046354853890

linkhttp://cpusec.org/ calendar_today12-09-2018 12:27:40

94 Tweet

452 Followers

1,1K Following

Hany Ragab (@hanyrax) 's Twitter Profile Photo

Check out my latest work #GhostRace, where we microarchitecturally bypass all sync primitives by speculatively executing critical regions that are concurrently being architecturally executed by other threads, turning all race-free critical regions into Speculative Race Conditions

Tavis Ormandy (@taviso) 's Twitter Profile Photo

This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... 🧵1/n

This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... 🧵1/n
HOSEIN. YAVARZADEH (@hosein_yz) 's Twitter Profile Photo

I'll be attending the amazing USENIX Security 2024 USENIX Security. Let me know if you're planning to attend so that we can say Hi! 👋 Luyi (Luyi Li) will present our Indirector paper, which for the first time reveals the structure of Intel's Indirect Branch Predictor!

UCSD Engineering (@ucsdjacobs) 's Twitter Profile Photo

A security protocol for routers, switches & mobile roaming gear is vulnerable to attacks, says a team led by UC San Diego computer scientists: today.ucsd.edu/story/computer… #CyberSecurity UCSD CSE

Mark Ermolov (@_markel___) 's Twitter Profile Photo

Intel HW is too complex to be absolutely secure! After years of research we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX. Here's the key from a genuine Intel CPU😀

Intel HW is too complex to be absolutely secure! After years of research we finally extracted Intel SGX Fuse Key0, AKA Root Provisioning Key. Together with FK1 or Root Sealing Key (also compromised), it represents Root of Trust for SGX. Here's the key from a genuine Intel CPU😀
Daniel Moghimi (@flowyroll) 's Twitter Profile Photo

I wrote a piece on SIGARCH blog about the state of hardware and architecture security. "Secure Computer Architecture in the Post-Meltdown World: A Long Road Ahead" sigarch.org/secure-compute…

HOSEIN. YAVARZADEH (@hosein_yz) 's Twitter Profile Photo

NotebookLM by @google is just awesome! Uploaded my paper, and it turned it into a podcast—so sick! Podcast link: notebooklm.google.com/notebook/92bd7…

Google Public Policy (@googlepubpolicy) 's Twitter Profile Photo

Today Google Project Zero and Google DeepMind shared how they’ve used an LLM to catch vulnerabilities in real world code with their project “Big Sleep.” This is a huge step for using AI to assist today’s cyber defenders. googleprojectzero.blogspot.com/2024/10/from-n…

José Cano (@jcanore) 's Twitter Profile Photo

📢Interested in doing a PhD in #EdgeAI focusing on #ComputerArchitecture and/or #Compilers in Glasgow Glasgow Intelligent Computing Lab (gicLAB)? 👉There is an information session UofG Computing Science this Wednesday 6 November at 10 am (UK time). Please, register here: shorturl.at/f4HjM

Joachim Neu (@jneu_net) 's Twitter Profile Photo

Want to know about upcoming deadlines to publish your blockchain research? 🧑‍🔬 Check out blockchain-deadlines.github.io ! Contributions welcome! github.com/blockchain-dea… 🧑‍💻 The latest update was done automatically with AI (and human inspection to avoid errors) -- here is how! 👉🧵

Jerry Bryant (@jerry_intel) 's Twitter Profile Photo

Anders Fogh and I chat about the proactive efforts behind the internal discovery and mitigation of all of the hardware vulnerabilities Intel disclosed in 2024 (intel.com/securityreport). Blog: intel.ly/4iCUeAf Video: youtu.be/hnyKOJiqqsw

HOSEIN. YAVARZADEH (@hosein_yz) 's Twitter Profile Photo

Shravan (Shravan Ravi Narayan (Archived. Msg on mastodon)) and Taehyun shared insights about their recent work on ARM MTE at Qualcomm Product Security Summit 2025. Fascinating stuff—turns out MTE can hit some serious overhead cliffs, many programs have good perf tho. #qpss25

Shravan (<a href="/ShrNarayan/">Shravan Ravi Narayan (Archived. Msg on mastodon)</a>) and Taehyun shared insights about their recent work on ARM MTE at <a href="/Qualcomm/">Qualcomm</a> Product Security Summit 2025. 

Fascinating stuff—turns out MTE can hit some serious overhead cliffs, many programs have good perf tho. 

#qpss25