Rayiizzz Profile Banner
Ruiyi Zhang Profile
Ruiyi Zhang

@Rayiizzz

Followers
547
Following
455
Media
5
Statuses
101

Microarchitectural Security | PhD Candidate at CISPA | Ex Research Intern @Google | #StackWarp #CacheWarp

Joined August 2019
Don't wanna be here? Send us removal request.
@Rayiizzz
Ruiyi Zhang
15 days
Today we reveal StackWarp: a new CPU vulnerability exploiting a synchronization bug in AMD’s stack engine across Zen 1–5 CPUs. It enables deterministic manipulation of Confidential VM's stack pointer, allowing RCE and privilege escalation via both control- and data-flow hijacking
18
184
1K
@Rayiizzz
Ruiyi Zhang
14 days
If an SMT sibling disables it, the RSP delta becomes 'frozen' and is only released to a future execution context when the bit is toggled again. While the underlying bug exists across Zen 1-5, it only poses a security risk in specific scenarios, like within confidential computing.
0
0
13
@Rayiizzz
Ruiyi Zhang
14 days
To clear up some confusion: the root cause lies in the stack engine, a CPU frontend optimization that manages the Stack Pointer (RSP) to reduce backend overhead. We discovered that an undocumented MSR bit acts as a toggle for this optimization. (1/2)
@Rayiizzz
Ruiyi Zhang
15 days
Today we reveal StackWarp: a new CPU vulnerability exploiting a synchronization bug in AMD’s stack engine across Zen 1–5 CPUs. It enables deterministic manipulation of Confidential VM's stack pointer, allowing RCE and privilege escalation via both control- and data-flow hijacking
3
4
96
@SecurityWeek
SecurityWeek
15 days
New StackWarp Attack Threatens Confidential VMs on AMD Processors
0
8
5
@Rayiizzz
Ruiyi Zhang
15 days
For more details on the discovery process and our findings, we refer to our research paper, which is published at USENIX Security 2026. paper: https://t.co/Z8ozxKUqIv github: https://t.co/9guHTl8lDu \cc Tristan Hornetz, @weber_daniel, @fth0mas, @misc0110
Tweet card summary image
github.com
Proof-of-concept for the paper "StackWarp: Breaking AMD SEV-SNP Integrity via Deterministic Stack-Pointer Manipulation through the CPU’s Stack Engine" (USENIX Security 2026) - cis...
2
6
56
@kavehrazavi
Kav
18 days
The program for uASC'26 is online https://t.co/HKLjyiNEkl We have some very interesting papers which are already available, so be sure to check them out. Better yet, join us in Leuven next month to listen to the authors! Registration is still open and free but seats are limited.
0
4
4
@shw3ta_shinde
Shweta Shinde
6 months
🔓 Heracles @acm_ccs'25: Breaking AMD’s Confidential Computing! We show that the hypervisor can read and move hardware-encrypted memory on AMD SEV-SNP. We build a chosen-plaintext oracle to leak kernel memory, auth keys, and cookies from "confidential" VMs https://t.co/upHXpLqSeA
Tweet card summary image
heracles-attack.github.io
Breaking AMDs confidential computing solution using a Chosen Plaintext Attack
0
8
33
@kavehrazavi
Kav
9 months
I am chairing the second edition of the microarchitecture security conference (uASC'26). Paper deadline for the first cycle is July 15. Please spread the word, submit, and/or join us in charming Leuven in February 2026! More info:
1
7
15
@kavehrazavi
Kav
9 months
long embargo, but there is a demo with good music at least:
@sparchatus
Sandro
9 months
Disclosing Branch Predictor Race Conditions (BPRC), a new class of vulnerabilities where asynchronous branch predictor operations violate hardware-enforced privilege and context separation in virtually all recent Intel CPUs. @wiknerj @kavehrazavi : https://t.co/sbI0Iqb2PS
1
2
14
@Istvan_A_Seres
Seres István András
9 months
✅ Write constant-time crypto code ☠️ Compiler introduces timing side-channels Do Compilers Break Constant-time Guarantees? https://t.co/x0f0GCmcjC TL;DR: Yes!🥲 👏👏👏Great work @misc0110 & team!
1
7
22
@weber_daniel
Daniel Weber
1 year
Super excited to present our (L. Niemann, @____salmon____, @jan__reineke, @misc0110) newest paper at #ACSAC2024! We show how modern CPU hardware can be leveraged to stop side-channel attacks almost instantly (~200 CPU cycles)! Code/Paper: https://t.co/EEBfQ3uFTC
2
14
59
@0xhilbert
Andreas Kogler
1 year
Excited to announce the release of the Rapid Data Analysis (RDA) framework! RDA streamlines side-channel analysis with plotting, processing, and analysis tools—usable directly from the terminal or in scripts. Check it out: https://t.co/ICGNWGRN1t #SideChannel
1
9
20
@hardwear_io
hardwear.io
1 year
🤔 Want to know how we developed a hardware fuzzer that found the GhostWrite vulnerability? 🔓 This critical hardware flaw bypasses all security isolations on affected CPUs, raising serious concerns for security. 👉 https://t.co/UT5zxJNsxq #rowhammer #hardware #hw_ioNL2024
0
3
10
@Rayiizzz
Ruiyi Zhang
1 year
Congratulations Andi! It's been awesome working with you. Good luck with everything ahead!
@0xhilbert
Andreas Kogler
1 year
I defended my PhD with distinction at @tugraz last friday! 🎉 Thank you to all the friends and folks who made this journey unforgettable. Special shoutout to @lavados, who went above and beyond by designing a game based on a "beer"-idea: Werewolves in the context of academia 🐺🎓
1
0
10
@Rayiizzz
Ruiyi Zhang
1 year
First week as a Research Intern at @Google! Excited to dive into cutting-edge research and solve real-world problems.
1
0
23
@fth0mas
Fabian Thomas
1 year
Want to learn how to get root on the T-Head C910 #RISCV CPU within seconds? Visit our website https://t.co/SSWlMiBI9C covering the #GhostWrite vulnerability. #BlackHat #BHUSA
2
4
9
@fth0mas
Fabian Thomas
1 year
After a long embargo, I'm happy to announce the public launch of our website on our latest finding: GhostWrite. Our research uncovered a critical CPU bug that compromises all security isolations on affected RISC-V hardware. https://t.co/qcVTOZOq4w #GhostWrite #BlackHat #BHUSA
3
57
122
@misc0110
Michael Schwarz
1 year
With the #GhostWrite CPU vulnerability, all isolation boundaries are broken - sandbox/container/VM can't prevent GhostWrite from writing and reading arbitrary physical memory on affected RISC-V CPUs. Deterministic, fast, and reliable - no side channels. https://t.co/qtmosPvuYl
8
159
501