
Tamara Rezk
@TamaraRezk
Followers
284
Following
813
Media
4
Statuses
197
Researcher in Computer Security @Inria
Joined April 2020
Interested in hardware security? Check out our @USENIXSecurity formal processor model to prevent Spectre, LVI attacks, and more, and its open-source RISC-V prototype! With @LeslyAnnDaniel1 @martonbognar Job Noorman Sébastien Bardin Frank Piessens.
arxiv.org
We propose ProSpeCT, a generic formal processor model providing provably secure speculation for the constant-time policy. For constant-time programs under a non-speculative semantics, ProSpeCT...
1
9
73
RT @0xTib3rius: BREAKING. From a reliable source. MITRE support for the CVE program is due to expire tomorrow. The attached letter was sen….
0
743
0
RT @BinsecTool: The purpose of the secret-erasure checker is to ensure that it did not happen and that no secret data remains in memory aft….
0
1
0
RT @slekies: Today, we announced the official release of OSV-SCALIBR, Google's software composition analysis library. If you are working in….
security.googleblog.com
Posted by Erik Varga, Vulnerability Management, and Rex Pan, Open Source Security Team In December 2022, we announced OSV-Scanner , a tool t...
0
75
0
RT @Seb_Bardin: Looking for a nice retreat in the French central mountains, speaking about formal methods and security, walking around and….
0
3
0
RT @linkersec: KernelSnitch: Side-Channel Attacks on Kernel Data Structures. Paper by Lukas Maar et al. about using a timing side-channel f….
0
73
0
RT @dinodaizovi: The entire 3rd-edition of @rossjanderson's "Security Engineering" is available free as PDFs now!.
0
122
0
RT @musardballiu: Big congrats to Mikhail Shcherbakov @yu5k3 on his PhD thesis defense. Mikhail did great work on code reuse attacks in t….
0
2
0
RT @martonbognar: Our paper with @HansWinderix, @LeslyAnnDaniel1, and Frank Piessens received the distinguished paper award at @acm_ccs!.If….
0
8
0
RT @Rhynorater: Absolutely stunning work from @pspaul95 on this CSS Injection - > text node exfil technique.
blog.pspaul.de
Some time ago, while reading up on new CSS features, I asked myself: Is it possible to leak the entire content of an HTML text node only using CSS?
0
58
0
RT @mboehme_: Excited to be part of the team receiving the ACM SIGSAC Distinguished Paper Award 🏆. Congrats @MarcoGuarnier1, @SCauligi, @….
0
12
0
RT @wiknerj: The first ever end-to-end cross-process Spectre exploit? I worked on this during an internship with @grsecurity! An in-depth w….
0
55
0
RT @kavehrazavi: Guess what? #IBPB (the speculation barrier) was broken in microcode for return instructions on the latest Intel CPUs. Linu….
0
12
0
RT @quarkslab: We are proud to sponsor the 1st edition of the HackHer Challenge, a CTF competition dedicated to female students and profess….
0
9
0
Interested in Kernel Safety, KASLR, or formal methods in the Spectre Era? Don't miss the talk by my student, Davide Davoli, at @acm_ccs on October 15th, 16:15 in the Grand Ballroom, Salons A, B, C.
0
0
25
RT @c_cadar: I have a postdoc position in my group to work on an exciting project at the intersection of program analysis and GenAI:.https:….
srg.doc.ic.ac.uk
Fixed term appointment for 24 months Applications are invited for a postdoctoral position in the Software Reliability Group, under the direction of Prof. Cristian Cadar.
0
17
0
RT @AndrewCMyers: Instead of researching how to make unsafe languages run faster, how about we focus on making type-safe and memory-safe la….
0
3
0
RT @yu5k3: Today I sent my PhD thesis for printing! 🎉 In my research, I classified code-reuse attacks and wrote some curious JS examples to….
0
6
0
RT @asabelfeld: Become a PhD student with us at Chalmers @chalmersuniv @ChalmersICT and join the Chalmers Security & Privacy Lab https://t.….
0
8
0
RT @aurelsec: An Assistant Professor position in the S3 group -(@s3eurecom) at @EURECOM in vulnerability detection, analysis, exploitation….
0
24
0
TEST OF TIME AWARD! An honor to receive the @CSFSymposium award with my awesome coauthors Gilles Barthe and @pedro_dargenio for the work we did 20y ago on **Self Composition** for security verification.
8
6
69