Kav (@kavehrazavi) 's Twitter Profile
Kav

@kavehrazavi

Dad, scientist, teacher, prof @ETH_en. Hardware/software security at COMSEC: comsec.ethz.ch

ID: 9830342

linkhttps://comsec.ethz.ch/people/kaveh-razavi/ calendar_today31-10-2007 17:23:41

1,1K Tweet

1,1K Followers

281 Following

johannes (@wiknerj) 's Twitter Profile Photo

The first ever end-to-end cross-process Spectre exploit? I worked on this during an internship with grsecurity! An in-depth write-up here: grsecurity.net/cross_process_…

Stefan Saroiu (@tzoompy) 's Twitter Profile Photo

After a long hiatus, it looks like I can finally hire a summer intern. While I have a couple of problems in mind, I always try to stay open to new ideas. (1/4)

hardwear.io (@hardwear_io) 's Twitter Profile Photo

💡 Michele Marazzi found that existing studies could contain errors as high as 175x 😲 estimating the impact of the proposed changes in #DRAM design, highlighting a critical gap in understanding 👉 hardwear.io/netherlands-20… #hw_ioNL2024

💡 <a href="/marazzi_michele/">Michele Marazzi</a> found that existing studies could contain errors as high as 175x 😲 estimating the impact of the proposed changes in #DRAM design, highlighting a critical gap in understanding

👉 hardwear.io/netherlands-20…

#hw_ioNL2024
Kav (@kavehrazavi) 's Twitter Profile Photo

In less significant news, we have an open PhD position in COMSEC at ETH. We like low-level hw/sw with a security twist (think CPU/DRAM/RTL/browser/kernel). If you enjoy collaboration and want to see how deep the rabbit hole goes, send us your application! jobs.ethz.ch/job/view/JOPG_…

Today In Infosec (@todayininfosec) 's Twitter Profile Photo

1996: "Smashing The Stack For Fun And Profit" was published in the hacker zine, Phrack. The article by Elias Levy (aka Aleph One) introduced many to stack buffer overflow vulnerabilities and how to exploit them.

1996: "Smashing The Stack For Fun And Profit" was published in the hacker zine, Phrack. The article by Elias Levy (aka Aleph One) introduced many to stack buffer overflow vulnerabilities and how to exploit them.
Daniel Gruss (@lavados) 's Twitter Profile Photo

Got some negative or unrealistic threat model results that still bring interesting insights? A side channel that requires root to leak something from the kernel? Reproducing prior work? Somewhat related to microarchitecture? Here's your venue: uasc.cc

Tavis Ormandy (@taviso) 's Twitter Profile Photo

welp, it looks like an OEM leaked the patch for "AMD Microcode Signature Verification Vulnerability" 🔥 The patch is not in linux-firmware, so this is the only patch available😡

welp, it looks like an OEM leaked the patch for "AMD Microcode Signature Verification Vulnerability" 🔥 The patch is not in linux-firmware, so this is the only patch available😡
Matteo Rizzo (@_matteorizzo) 's Twitter Profile Photo

github.com/google/securit… Our newest research project is finally public! We can load malicious microcode on Zen1-Zen4 CPUs!

spq (@__spq__) 's Twitter Profile Photo

Here are the details about the AMD Signature verification vulnerability we worked on, Enjoy! bughunters.google.com/blog/542484235…

Patrick (@pjattke) 's Twitter Profile Photo

🔨 Posthammer (USENIX Sec '25) brings Rowhammer back in the browser! What if visiting a website was enough to trigger a Rowhammer attack? Posthammer shows how to bring non-uniform Rowhammer patterns into the browser. More information: 📄comsec.ethz.ch/posthammer

VUSec (@vu5ec) 's Twitter Profile Photo

Spectre v2 is back again! Disclosing "Training Solo": 3 new self-training attack classes, 2 end-to-end exploits, and 2 new hardware issues that break domain isolation even when implemented perfectly. Joint work by Sander Wiebing Cristiano Giuffrida: vusec.net/projects/train…

Spectre v2 is back again! Disclosing "Training Solo": 3 new self-training attack classes, 2 end-to-end exploits, and 2 new hardware issues that break domain isolation even when implemented perfectly. Joint work by <a href="/SanWieb/">Sander Wiebing</a> <a href="/c_giuffrida/">Cristiano Giuffrida</a>: vusec.net/projects/train…
Kav (@kavehrazavi) 's Twitter Profile Photo

Happy to announce that the paper about IBPB problems that included the first real cross-process Spectre exploit just got a distinguished paper award at IEEE S&P! Dr. johannes now has two of these awards in his thesis. What will he do next?!

Kav (@kavehrazavi) 's Twitter Profile Photo

I am chairing the second edition of the microarchitecture security conference (uASC'26). Paper deadline for the first cycle is July 15. Please spread the word, submit, and/or join us in charming Leuven in February 2026! More info: uasc.cc

Patrick (@pjattke) 's Twitter Profile Photo

🚨 New Rowhammer paper 🔨 Our latest work McSee reveals that Intel & AMD CPUs don't use DDR5's RFM cmds 🚫 and Intel uses pTRR on client CPUs 💥 Meet McSee, our oscilloscope-based platform that exposes hidden DDR4/5 behaviors 🧐 👉 comsec.ethz.ch/mcsee #Rowhammer #Security