wiknerj Profile Banner
johannes Profile
johannes

@wiknerj

Followers
328
Following
1K
Media
14
Statuses
165

retweets are my not own 😺 occasionally dyhszlkehktikc

Joined September 2014
Don't wanna be here? Send us removal request.
@wiknerj
johannes
11 days
RT @spendergrsec: Huh, I didn't realize that the vibe-coded vulns inserted into 5 LTS kernels that still aren't fixed 22 days later haven't….
0
84
0
@wiknerj
johannes
2 months
RT @kavehrazavi: Happy to announce that the paper about IBPB problems that included the first real cross-process Spectre exploit just got a….
0
2
0
@wiknerj
johannes
2 months
Branch Race Conditions Predictor causes recent predictions to be added after more recent privilege switches (→ wrong privilege, eIBRS💥) prediction flushes (→ retained valid, IBPB💥) finish. @sparchatus eventually figured it out 🙌.
@sparchatus
Sandro
2 months
Disclosing Branch Predictor Race Conditions (BPRC), a new class of vulnerabilities where asynchronous branch predictor operations violate hardware-enforced privilege and context separation in virtually all recent Intel CPUs. @wiknerj @kavehrazavi :
Tweet media one
0
4
22
@wiknerj
johannes
2 months
RT @vu5ec: Spectre v2 is back again! Disclosing "Training Solo": 3 new self-training attack classes, 2 end-to-end exploits, and 2 new hardw….
0
28
0
@wiknerj
johannes
3 months
RT @pjattke: 🔨 Posthammer (USENIX Sec '25) brings Rowhammer back in the browser! . What if visiting a website was enough to trigger a Rowha….
0
5
0
@wiknerj
johannes
7 months
RT @netspooky: The @phrack 72 CFP horny emojipasta has hit the chats
Tweet media one
0
13
0
@wiknerj
johannes
7 months
Thanks for the 21st @h2hconference! Always a joy to meet the mix of researchers, enthusiasts, academics, hackers. Special thanks to the organizers and yes the 🚌 trip to Rio went smoothly @bsdaemon @gabrielnb 😄 has a moment to enjoy this very special zine on the journey.
Tweet media one
3
0
15
@wiknerj
johannes
8 months
0
3
0
@wiknerj
johannes
9 months
The first ever end-to-end cross-process Spectre exploit? I worked on this during an internship with @grsecurity! An in-depth write-up here:.
0
55
124
@wiknerj
johannes
9 months
And of course we fix the problems we cause (unless they're in microcode. ).
0
1
11
@wiknerj
johannes
9 months
My and @kavehrazavi's paper has been accepted for S&P 2025.
1
0
3
@wiknerj
johannes
9 months
HW defenses against Spectre are tricky: they need to be applied correctly by the SW, and we need to trust that the HW does what its supposed to. Our latest work "Breaking the Barrier" exploits loopholes in both of these issues on Intel and AMD parts.
2
33
115
@wiknerj
johannes
9 months
Curious about this. .
@bsdaemon
Rodrigo Branco
9 months
I've just presented at IEEE SecDev our work on reversing the eIBRS HW mitigation. TLDR: use retpoline or stibp+ibpb ;) The mitigation relies on an automatic flush of the predictor to prevent brute-force. But it is not frequent enough (thus, it relies on obscurity really).
0
0
3
@wiknerj
johannes
1 year
RT @bsdaemon: Call for Papers officially open! 21 years of @h2hconference #H2HC2024.
0
20
0
@wiknerj
johannes
1 year
RT @marazzi_michele: With RISC-H, we demonstrate the first Rowhammer bit flips on a high-end RISC-V CPU!. We had to devise a novel method t….
0
24
0
@wiknerj
johannes
1 year
RT @marazzi_michele: For the first time, we imaged and reverse engineered 6 modern DDR4/5 DRAM chips (. Due to the….
0
54
0
@wiknerj
johannes
1 year
RT @pjattke: Our latest work, #ZenHammer 🔨, shows that #AMD Zen 2/3/4 systems are equally vulnerable to frequency-based #Rowhammer as #Inte….
0
20
0
@wiknerj
johannes
2 years
RT @kavehrazavi: Phantom just won a best paper award at @MicroArchConf! Phantom shows the security implications of pre-decode speculation t….
0
6
0
@wiknerj
johannes
2 years
Funny: AMD's SuppressBPOnNonBr does NOT suppress branch prediction, still really wanted the Linux community to use this name
0
2
9
@wiknerj
johannes
2 years
This might be the most outrageous transient execution attack ever :).
@thedantrujillo
Daniël Trujillo
2 years
Dreams don't affect reality, but they may influence your actions. Turns out this applies to AMD CPUs too! After a long embargo, we can now present Inception, a new transient exec. attack that leaks data on all AMD Zen CPUs. With @wiknerj and @kavehrazavi.
1
3
11