
Riccardo Paccagnella
@ricpacca
Followers
430
Following
74
Media
1
Statuses
30
Joined January 2017
RT @therealurd00m: Our work on page walk side channels was accepted at @IEEESP 2025 (#ieeesp2025)! The full paper is now available at: http….
0
7
0
Join us at #usesec22 at 5pm to learn about how to mount microarchitectural attacks on large server processors *even when known attack vectors inside the cores and caches are closed*, and to gain useful, new insights on how to mitigate these attacks *without hardware changes*!
1
1
26
For more information visit our website (, read our paper (, and come see @YingchenWang96’s and my talk at @USENIXSecurity 2022 (#usesec22)!.
hertzbleed.com
Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86
3
15
74
We found a way to mount *remote timing* attacks on *constant-time* cryptographic code running on modern x86 processors. How is that possible? With #hertzbleed! Here is how it works (with @YingchenWang96).
hertzbleed.com
Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86
17
520
1K
RT @0xjprx: We found a way to defeat pointer authentication (and forge kernel pointers from userspace) on the Apple M1 via a new hardware a….
pacmanattack.com
PACMAN: Attacking ARM Pointer Authentication with Speculative Execution
0
280
0
RT @dkohlbre: We found a way to leak data on Apple Silicon processors that is "at rest": that is, data the core never reads speculatively o….
prefetchers.info
Using Data Memory-Dependent Prefetchers to Leak Data at Rest
0
209
0
RT @TheHackersNews: Researchers demonstrate first microarchitectural side-channel attacks that leverage contention on the CPU ring intercon….
thehackernews.com
Researchers Exploit Ring Interconnect to Develop New Side-Channel Attacks on Intel CPUs
0
91
0
Our work on ring interconnect side channel attacks was accepted at @USENIXSecurity 2021 (#usesec21)! Full paper and source code are now available at:
3
42
100