Jo Van Bulck
@jovanbulck
Postdoc @KU_Leuven | Trusted Computing & Side-Channel Attacks | #IntelSGX #Foreshadow #ZombieLoad #LVI #SGXStep
ID: 968515235278618624
https://jovanbulck.github.io/ 27-02-2018 15:56:41
300 Tweet
1,1K Followers
101 Following
Enarx v0.2.1 released with SGX attestation and a security update! Thank you Jo Van Bulck for your first (and very important) contribution: github.com/enarx/enarx/re…
Together with Jo Van Bulck I am again organizing a confidential computing devroom FOSDEM @[email protected] . Submit talks on open source topics by December 2 2022 and come to Brussels on February 5 2023 or watch the livestream. Looking forward! falder.org/fosdem23-cfp
Together with Jo Van Bulck and Fabiano Fidêncio, I am again organizing a confidential computing devroom FOSDEM @[email protected]. Submit talks on open source topics by December 1 2023 and join us in Brussels on February 4 2024. Looking forward to see you there! CfP: falder.org/fosdem24-cfp
Excited to announce the CFP for #systex24 co-located with IEEE European Symposium on Security and Privacy in Vienna. A great place to meet and discuss work (in progress) and ideas on system software attacks/defenses for trusted execution! Submission deadline March 14, 2024. 🧑🔬🌍👇 systex24.github.io
Working in the area of trusted execution? Consider submitting your work (in progress), research statements, or cool new open-source enclave tools to #systex24 and join us IEEE European Symposium on Security and Privacy in Vienna! Submission deadline has been extended to March 26 AoE 👉 systex24.github.io
Check out our security analysis (USENIX Security) of TI's Intellectual Property Encapsulation! We uncovered multiple vulnerabilities and proposed a software framework to mitigate the most serious ones, see 🧵. paper: mici.hu/papers/bognar2… repository: github.com/martonbognar/i…