DanielGenkin Profile Banner
Daniel Genkin Profile
Daniel Genkin

@DanielGenkin

Followers
514
Following
2
Media
6
Statuses
14

Associate Professor at Georgia Tech. Security, systems, side channels, cryptography.

Atlanta, GA
Joined August 2018
Don't wanna be here? Send us removal request.
@DanielGenkin
Daniel Genkin
11 days
Want to know what happens when commercial TEEs meet improvised DRAM memory interposers? SGX mayhem including attestation key extraction. Please DO try that at home😉. Check out our work at https://t.co/JyvHP48nez
7
60
190
@DanielGenkin
Daniel Genkin
9 months
Have an Apple device from the last few years? We have a new side channel attack for you. Checkout our work at https://t.co/7absarR2DO Joint work with Jason Kim, Jalen Chuang and Yuval Yarom (@yuvalyarom). Could not have asked for a better team!
1
29
78
@therealurd00m
Alan Wang
10 months
Our work on page walk side channels was accepted at @IEEESP 2025 (#ieeesp2025)! The full paper is now available at: https://t.co/15cICFDfpn and our code is available at: https://t.co/cz5j6JPRYb
1
7
26
@hosein_yz
HOSEIN YAVARZADEH
1 year
Excited to present "Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor" at @ASPLOSConf with Archit Agarwal, Max Christman, @CryptoGPS, @DanielGenkin, Andrew Kwong, @flowyroll, @deiandelmars, @mktaram and Dean Tullsen. (1/4)🧵
3
11
52
@DanielGenkin
Daniel Genkin
2 years
https://t.co/OmHFQbmyVk happening now @RealWorldCrypto. Come see Boru Chen (@blue75525366) talking about breaking constant time crypto using fancy prefetchers on Apple CPUs
0
5
21
@DanielGenkin
Daniel Genkin
2 years
Ever wondered what happens when side-channel resistant code meets a fancy prefetcher? Checkout our paper breaking constant time crypto on Apple CPUs. https://t.co/PFKOMkBDDV Joint work with Boru Chen, @YingchenWang96, @PradyumnaShome, Chris Fletcher, @dkohlbre, @ricpacca
gofetch.fail
A new microarchitectural side-channel attack exploiting data memory-dependent prefetchers in Apple silicons.
2
31
86
@DanielGenkin
Daniel Genkin
2 years
I'm very thankful to the @SloanFoundation for recognizing my research. Could not have done it without my awesome students, great collaborators, and wonderful mentors. Checkout our research group that made this possible at
architecture.fail
Research in secure hardware design, microarchitectural side-channel attacks, and applied cryptography, at Georgia Institute of Technology.
@SloanFoundation
Sloan Foundation
2 years
We have today announced the names of the 2024 Sloan Research Fellows! Congratulations to these 126 outstanding early-career researchers: https://t.co/hmIwpwLcsb
5
3
27
@DanielGenkin
Daniel Genkin
2 years
Microarchitectural unboxing: check out our new demo for breaking two factor authentication using iLeakage. Yes you heard it, speculative execution attacks on Apple’s M3 Macs and latest Safari that defeat Facebook’s 2FA over SMS. https://t.co/R0n2LareR3
0
14
34
@adamdoupe
Adam Doupé
2 years
Goodbye WOOT the Workshop, hello WOOT the Conference! Excited to be a part of this legacy and this new beginning.
@wootsecurity
USENIX WOOT Conference on Offensive Technologies
2 years
WOOT! Big news! Starting 2024 WOOT will be @USENIX WOOT Conference on Offensive Technologies! WOOT '24 will be on August 12-13 2024, colocated with USENIX Security WOOT '24 will be co-chaired by @noopwafel (@intel) and @adamdoupe (@uarizona) https://t.co/ggdyXs40Ck
2
8
76
@wootsecurity
USENIX WOOT Conference on Offensive Technologies
2 years
WOOT! Big news! Starting 2024 WOOT will be @USENIX WOOT Conference on Offensive Technologies! WOOT '24 will be on August 12-13 2024, colocated with USENIX Security WOOT '24 will be co-chaired by @noopwafel (@intel) and @adamdoupe (@ASU <= corrected!) https://t.co/ggdyXs40Ck
1
17
51
@DanielGenkin
Daniel Genkin
2 years
For those wondering if Apple’s iOS/iPadOS 17.1 and macOS 14.1 released yesterday protect against https://t.co/R0n2LareR3? We took a look for you, the answer is no. Devices are still vulnerable.
2
20
27
@moo9000
Mikko Ohtamaa
2 years
iLeakage: Speculative execution attack on Safari, iPhone, iPad and Mac, allowing a hostile website to extract your passwords and other secrets. https://t.co/LYApQf1YD4 The only way to be safe is to stop using Safari: At the time of public release, Apple has implemented a
10
88
165
@DanielGenkin
Daniel Genkin
2 years
After more than a year of embargo we can now show you how speculative attacks can extract sensitive information from the Safari browser on @Apple platforms. Check out our latest paper https://t.co/R0n2LareR3. Great work by Jason Kim, @themadstephan and @yuvalyarom.
3
58
136