Jo Van Bulck (@jovanbulck) 's Twitter Profile
Jo Van Bulck

@jovanbulck

Postdoc @KU_Leuven | Trusted Computing & Side-Channel Attacks | #IntelSGX #Foreshadow #ZombieLoad #LVI #SGXStep

ID: 968515235278618624

linkhttps://jovanbulck.github.io/ calendar_today27-02-2018 15:56:41

300 Tweet

1,1K Followers

101 Following

DistriNet (@distrinet) 's Twitter Profile Photo

KU Leuven is launching a new Master of Cybersecurity programme, this one-year programme is a joint effort #COSIC and #DistriNet. Admissions for fall 2022 are open. distrinet.cs.kuleuven.be/news/2022/MaCY… #msc #cybersecurity #kuleuven

KU Leuven is launching a new Master of Cybersecurity programme, this one-year programme is a joint effort #COSIC and #DistriNet. Admissions for fall 2022 are open. distrinet.cs.kuleuven.be/news/2022/MaCY… #msc #cybersecurity #kuleuven
Enarx (@enarxproject) 's Twitter Profile Photo

Enarx v0.2.1 released with SGX attestation and a security update! Thank you Jo Van Bulck for your first (and very important) contribution: github.com/enarx/enarx/re…

Enarx v0.2.1 released with SGX attestation and a security update! Thank you <a href="/jovanbulck/">Jo Van Bulck</a> for your first (and very important) contribution:

github.com/enarx/enarx/re…
marton bognar (@martonbognar) 's Twitter Profile Photo

Check out our paper with Jo Van Bulck and Frank Piessens, 'Mind the Gap' (published at IEEE S&P '22), in which we investigated the gap between formal models / proofs of security and real-world implementations! paper: mici.hu/papers/bognar2… repo: github.com/martonbognar/g…

Check out our paper with <a href="/jovanbulck/">Jo Van Bulck</a> and Frank Piessens, 'Mind the Gap' (published at <a href="/IEEESSP/">IEEE S&P</a> '22), in which we investigated the gap between formal models / proofs of security and real-world implementations! 

paper: mici.hu/papers/bognar2…
repo: github.com/martonbognar/g…
DistriNet (@distrinet) 's Twitter Profile Photo

Register for the Summer School on Security and Privacy in the (golden) Age of AI and learn more from leading experts on the state-of-the-art in Security and Privacy and AI/ML. cybersecurity-research.be/summer-school-…

Register for the Summer School on Security and Privacy in the (golden) Age of AI and learn more from leading experts on the state-of-the-art in Security and Privacy and AI/ML.

cybersecurity-research.be/summer-school-…
Jo Van Bulck (@jovanbulck) 's Twitter Profile Photo

Excited to be speaking at the Summer School on Security & Correctness to be held TU Graz Sept 26-30. If you're a PhD student working in this field, registrations are still open: securityweek.at/2022/ Stimulating program with a wide range of relevant topics and hands-on labs 👇

Excited to be speaking at the Summer School on Security &amp; Correctness to be held <a href="/tugraz/">TU Graz</a> Sept 26-30. If you're a PhD student working in this field, registrations are still open: securityweek.at/2022/ Stimulating program with a wide range of relevant topics and hands-on labs 👇
Fritz Alder (@fritzalder) 's Twitter Profile Photo

Together with Jo Van Bulck I am again organizing a confidential computing devroom FOSDEM @[email protected] . Submit talks on open source topics by December 2 2022 and come to Brussels on February 5 2023 or watch the livestream. Looking forward! falder.org/fosdem23-cfp

\/era🌻 (@eramm314) 's Twitter Profile Photo

Doing research on security/privacy and AI and want to follow our PhD school? Check out the program abstract and apply for an enlightening week in a beautiful European town! cybersecurity-research.be/summer-school-…

Jo Van Bulck (@jovanbulck) 's Twitter Profile Photo

Registration still open for the 2nd Summer School on Security and Privacy in the Age of AI to be held 19 – 20 – 21 – 22 September 2023 DistriNet Leuven, Belgium. Check out the exciting line up of speakers and apply via the link below👇 cybersecurity-research.be/summerschool-o…

Fritz Alder (@fritzalder) 's Twitter Profile Photo

Together with Jo Van Bulck and Fabiano Fidêncio, I am again organizing a confidential computing devroom FOSDEM @[email protected]. Submit talks on open source topics by December 1 2023 and join us in Brussels on February 4 2024. Looking forward to see you there! CfP: falder.org/fosdem24-cfp

Jo Van Bulck (@jovanbulck) 's Twitter Profile Photo

Excited to announce the CFP for #systex24 co-located with IEEE European Symposium on Security and Privacy in Vienna. A great place to meet and discuss work (in progress) and ideas on system software attacks/defenses for trusted execution! Submission deadline March 14, 2024. 🧑‍🔬🌍👇 systex24.github.io

Excited to announce the CFP for #systex24 co-located with <a href="/IEEEEUROSP/">IEEE European Symposium on Security and Privacy</a> in Vienna. A great place to meet and discuss work (in progress) and ideas on system software attacks/defenses for trusted execution! Submission deadline March 14, 2024. 🧑‍🔬🌍👇
systex24.github.io
Jo Van Bulck (@jovanbulck) 's Twitter Profile Photo

Working in the area of trusted execution? Consider submitting your work (in progress), research statements, or cool new open-source enclave tools to #systex24 and join us IEEE European Symposium on Security and Privacy in Vienna! Submission deadline has been extended to March 26 AoE 👉 systex24.github.io

Working in the area of trusted execution? Consider submitting your work (in progress), research statements, or cool new open-source enclave tools to #systex24 and join us <a href="/IEEEEUROSP/">IEEE European Symposium on Security and Privacy</a>  in Vienna! Submission deadline has been extended to March 26 AoE 👉 systex24.github.io
\/era🌻 (@eramm314) 's Twitter Profile Photo

📅Save the date! On September 10-13, we're repeating our captivating Summer School on Security, Privacy and AI. Looking forward to coming together again and unraveling the intricacies 🧶of this rapidly evolving field 🏎️🤖

marton bognar (@martonbognar) 's Twitter Profile Photo

Check out our security analysis (USENIX Security) of TI's Intellectual Property Encapsulation! We uncovered multiple vulnerabilities and proposed a software framework to mitigate the most serious ones, see 🧵. paper: mici.hu/papers/bognar2… repository: github.com/martonbognar/i…

Check out our security analysis (<a href="/USENIXSecurity/">USENIX Security</a>) of TI's Intellectual Property Encapsulation! We uncovered multiple vulnerabilities and proposed a software framework to mitigate the most serious ones, see 🧵.

paper: mici.hu/papers/bognar2…
repository: github.com/martonbognar/i…
marton bognar (@martonbognar) 's Twitter Profile Photo

We applied multiple attacks from the TEE literature to this technology and also found a novel "controlled call corruption" primitive that injects controlled code or data in the encapsulated region by abusing a "call" assembly instruction that writes its return value on the stack.

We applied multiple attacks from the TEE literature to this technology and also found a novel "controlled call corruption" primitive that injects controlled code or data in the encapsulated region by abusing a "call" assembly instruction that writes its return value on the stack.
marton bognar (@martonbognar) 's Twitter Profile Photo

In addition to suggesting hardware changes, we developed a lightweight software framework that can transparently reduce information leakage of IPE software and mitigates our architectural attack primitives on vulnerable devices by repurposing the onboard memory protection unit.

In addition to suggesting hardware changes, we developed a lightweight software framework that can transparently reduce information leakage of IPE software and mitigates our architectural attack primitives on vulnerable devices by repurposing the onboard memory protection unit.