PhD candidate @KU_Leuven | Trusted Computing #IntelSGX #Sancus

Joined November 2019
Fritz Alder retweeted
Please join us Thursday (30/9) at 2pm BST for Fritz Alder, KU Leuven, online talk "Aion: Enabling Open Systems through Strong Availability Guarantees for Enclaves" lsds.doc.ic.ac.uk/content/ai…
0
1
0
3
Check out what I've been working on over the past ~1.5 years and what is now my first CCS paper. Awesome to work with @jovanbulck @jtmuehlberg and Frank Piessens
Our CCS 2021 paper "Aion: : Enabling Open Systems through Strong Availability Guarantees for Enclaves" is online. With @FritzAlder, @jovanbulck, Frank Piessens, @DistriNet. Aion extends a light-weight TEE towards a configurable security architecture that provides a notion of 1/6
Show this thread
1
4
0
35
Fritz Alder retweeted
Looking for postdocs again. If you know of talented researchers interested in a postdoctoral stint in Canada, please nudge them. I am looking broadly in systems security, particularly in platform security and ML security/privacy. Thanks for amplifying! asokan.org/asokan/research/S…
0
17
0
10
Fritz Alder retweeted
In this talk, @FritzAlder , will present technology that extends an Embedded Trusted Execution Environments with preemptive multitasking and restricted atomicity on top of strong software isolation and software attestation. Need to know more? 👉 safety.qatest.org/fritz-alde…
0
7
0
3
I'm happy to announce our paper at #ACSAC2020 . Join us in the System and Hardware Security track on Thursday, December 10th!
Don't miss @FritzAlder presenting our latest work "Faulty Point Unit: ABI Poisoning Attacks on Intel SGX" at the upcoming @ACSAC_Conf 📄preprint: jovanbulck.github.io/files/a… 🧑‍💻artifacts: github.com/fritzalder/faulty… cc: @sublevado, Frank Piessens 1/
Show this thread
0
0
0
9
Fritz Alder retweeted
We present Load Value Injection #LVI: a new transient-execution attack class; defeats defenses; turns around #Meltdown #Foreshadow #ZombieLoad #RIDL #Fallout to *inject* attacker data into victim loads. lviattack.eu cc @danielmgmi @mlqxyz @misc0110 @lavados @IEEESSP
6
157
24
269
Show this thread
Signal is introducing secure value recovery based on SGX and are taking steps such as disabling hyperthreading and internal GPU, and adding LFENCEs before conditional branches. Quite interesting is also the guess counter distribution! signal.org/blog/secure-value…
1
1
0
5
Especially the guess counters remind me of earlier discussions you had about SafeKeeper @ajpaverd @nasokan @krawiecka_kl
0
0
0
2