David Oswald's Avatar

David Oswald

@sublevado.bsky.social

Live as if today's yesterday was the day after yesterday's tomorrow.

69 Followers  |  116 Following  |  3 Posts  |  Joined: 17.11.2024  |  1.4274

Latest posts by sublevado.bsky.social on Bluesky

Preview
Cryptographers Held an Election. They Canโ€™t Decrypt the Results.

The International Association for Cryptologic Research has used heliosvoting.org โ€“ my online voting system โ€“ for a number of years.

This year, a trustee lost their secret key. The election has to be re-run.

Below, a few thoughts that didn't fit in the NYT piece.

www.nytimes.com/2025/11/21/w...

22.11.2025 02:40 โ€” ๐Ÿ‘ 121    ๐Ÿ” 40    ๐Ÿ’ฌ 3    ๐Ÿ“Œ 3

This paper is about fault injection on real Intel CPUs, resulting in interesting primitives such as instruction skip. Read the uasc.cc/proceedings2... and/or attend uASC in Leuven to learn more!

04.10.2025 10:34 โ€” ๐Ÿ‘ 1    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

uASC 2026 will take place on February 3, 2026, in Leuven, Belgium, hosted by KU Leuven. Have you submitted your paper yet? ๐Ÿค”

Cycle 2 Paper Submission Deadline is November 4, 2025!
๐Ÿ‘‰ uasc.cc #uasc26

04.10.2025 10:41 โ€” ๐Ÿ‘ 1    ๐Ÿ” 3    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Possible End to End to End Encryption: Come Help - Bert Hubert tl;dr: The European Commission is honestly asking for experts to advise them on ways to institute โ€œeffective and lawful access to data for law enforcementโ€. If you are an expert, I urge you to apply t...

Europeans with credible expertise in cryptography and/or computer security should participate in this call by the ๐Ÿ‡ช๐Ÿ‡บ Commission to explain to them, in terms that politicians can understand, why providing access to communications data to law enforcement โ€ฆ berthub.eu/articles/pos...

05.07.2025 19:37 โ€” ๐Ÿ‘ 14    ๐Ÿ” 12    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0

So What Do We Know QC To Be Good For?
- Simulating quantum physics and chemistry
- Breaking current public-key encryption (RSA, DH, ECC)
- Eventually, modest (square-root) speedups from Grover
- Weโ€™ll have to get lucky for most other applications!
(The world has been systemically lied to about this)

29.06.2025 09:25 โ€” ๐Ÿ‘ 37    ๐Ÿ” 18    ๐Ÿ’ฌ 4    ๐Ÿ“Œ 1
EEVblog 1534 - Solar Freakin' RAILways! Sun-Ways DEBUNKED
YouTube video by EEVblog EEVblog 1534 - Solar Freakin' RAILways! Sun-Ways DEBUNKED

This seems like a good idea until you think it through - there are many reasons solar panels go on roofs at an angle, and not flat on the ground, with plenty of dirt, vegetation, mechanical stress, โ€ฆ So less flashy but more practical would be to eg use station roofs. See also youtu.be/7vItnxhWRqw

26.06.2025 05:46 โ€” ๐Ÿ‘ 1    ๐Ÿ” 0    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Thoughts dereferenced from the scratchpad noise. | Research of RAM data remanence times

and for DDR4/5: blog.3mdeb.com/2024/2024-12...

24.06.2025 19:36 โ€” ๐Ÿ‘ 5    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
CSDL | IEEE Computer Society

There is this relatively recent paper (2023) that does somethinf along these lines up to DDR3: www.computer.org/csdl/proceed...

24.06.2025 19:34 โ€” ๐Ÿ‘ 5    ๐Ÿ” 1    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 0
Post image

uASC 2026 will take place on February 3, 2026, in Leuven, Belgium, hosted by KU Leuven. We can't wait to see you next year!

Cycle 1 Paper Submission Deadline is July 15, 2025!
๐Ÿ‘‰ uasc.cc #uasc26

19.05.2025 15:58 โ€” ๐Ÿ‘ 10    ๐Ÿ” 9    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Security Week Graz 2025 โ€“ Summer School for Cybersecurity

Join the Graz Security Week from Sep 1 to 5! with @sahar-abdelnabi.bsky.social, Jo Van Bulck, Maria Eichlseder, Georg Fuchsbauer, @sublevado.bsky.social, @fbpierazzi.bsky.social, Kaveh Razavi, Christian Rossow, Yang Zhang securityweek.at (system security, side channels, AI security, & cryptography)

16.06.2025 09:51 โ€” ๐Ÿ‘ 10    ๐Ÿ” 5    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0

Reminder that the MSCA postdoctoral program exists. If you have a PhD and want to work in a European lab, you have until September to apply. Just contact them now.

ec.europa.eu/info/funding...

06.06.2025 17:47 โ€” ๐Ÿ‘ 30    ๐Ÿ” 24    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
Bid to host SaTML 2026 Thank you for considering to host SaTML! SaTML has been organized as a 3 day conference so far. We are looking for volunteers interested in finding a venue to host the conference in 2026. By submitti...

๐ŸŒ Help shape the future of SaTML!

We are on the hunt for a 2026 host city - and you could lead the way. Submit a bid to become General Chair of the conference:

forms.gle/vozsaXjCoPzc...

12.05.2025 12:15 โ€” ๐Ÿ‘ 6    ๐Ÿ” 8    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
PhDs / PostDocs in Cryptographic Engineering

If you are looking for a PhD or PostDoc position in Cryptographic Engineering, please check the openings of Michael Hutter at our Research Institute CODE here in beautiful Munich. Please consider and help spread the word: iacr.org/jobs/item/3908

24.02.2025 17:20 โ€” ๐Ÿ‘ 11    ๐Ÿ” 12    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 1
Preview
Undergraduate Upends a 40-Year-Old Data Science Conjecture | Quanta Magazine A young computer scientist and two colleagues show that searches within data structures called hash tables can be much faster than previously deemed possible.

Without setting out to do so, Andrew Krapivin recently upended the common thinking around hash tables โ€” one of the best-studied tools in computer science. Steve Nadis reports:
www.quantamagazine.org/undergraduat...

10.02.2025 15:22 โ€” ๐Ÿ‘ 75    ๐Ÿ” 24    ๐Ÿ’ฌ 1    ๐Ÿ“Œ 4
Preview
security-research/pocs/cpus/entrysign at 5952723423260f0c6932408da3cbe6b3b708373d ยท google/security-research This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code. - google/security-research

oh hello there: github.com/google/secur...

04.02.2025 00:08 โ€” ๐Ÿ‘ 34    ๐Ÿ” 5    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 2
1st Microarchitecture Security Conference (uASC '25)

We updated the uASC deadline: it is **January 28 AoE**, which is 1 day after the DIMVA notification.
Take a look at our CFP. Any insights around microarchitecture security are interesting.

uasc.cc

26.01.2025 12:54 โ€” ๐Ÿ‘ 1    ๐Ÿ” 2    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Preview
AMDโ€™s trusted execution environment blown wide open by new BadRAM attack Attack bypasses AMD protection promising security, even when a server is compromised.

AMDโ€™s trusted execution environment blown wide open by new BadRAM attack #BadRAM #AMD arstechnica.com/information-...

10.12.2024 18:40 โ€” ๐Ÿ‘ 2    ๐Ÿ” 1    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
Post image

#BadRAM just went public: Tampering with DRAM modules allows attackers to bypass SEV-SNP's write protection and forging attestation reports, breaking all trust in #SEV-SNP.
Joint work with Jesse De Meulemeester, Luca Wilke, @sublevado.bsky.social, Ingrid Verbauwhede and Jo Van Bulck
badram.eu

10.12.2024 19:50 โ€” ๐Ÿ‘ 12    ๐Ÿ” 8    ๐Ÿ’ฌ 0    ๐Ÿ“Œ 0
1st Microarchitecture Security Conference (uASC '25)

Got some negative or unrealistic threat model results that still bring interesting insights? A side channel that requires root to leak something from the kernel? Reproducing prior work? Somewhat related to microarchitecture? Here's your venue: uasc.cc

01.12.2024 16:03 โ€” ๐Ÿ‘ 14    ๐Ÿ” 6    ๐Ÿ’ฌ 2    ๐Ÿ“Œ 0

@sublevado is following 20 prominent accounts