Profile cover photo
Profile photo
Anders Fogh
15 followers
15 followers
About
Posts

Post has attachment
BlackHat 2016: The Wish list
This blog is no longer where my technical stuff is blogged. It is purely my private thoughts. My technical stuff is blogged here;  https://cyber.wtf I’ve been
honered by being chosen to speak at black hat for the second year in a row.
Beyond speaking I hope...
Add a comment...

Post has attachment
You've not heard the last of me
What a month May was. First I had the opportunity to
meet with some infosec people I havn't seen in a very long time and also met
some people in the business that I’d not met before. Then I got selected to
speak at Black Hat USA 2016. The second year in a r...
Add a comment...

Post has attachment
Row hammer the short summary
Introduction I resonantly
realized how much stuff was published on the row hammer and how much I was
missing a short summary. So I wrote one and you are now reading the result. The
summary is moderately technical and is kept short with intend. I may or may ...
Add a comment...

Post has attachment
Anvil& next generation row hammer attacks
My ramblings No technical
stuff in here. If you are here for the tech skip to introduction. First up the
KASRL blog part 2 is in progress. It might take a while because there is a bit
more meat on that bone than I’d expected and I want to do it right. But f...
Add a comment...

Post has attachment
Breaking KASRL with micro architecture Part 1
Hack in the box & stuff Skip to
Introduction if you are here for the techstuff. I submitted a CFP to “Hack In
the Box” in Amsterdam end of may and the talk has been accepted. So I’ll be
spending part of my vacation this year presenting some of my research o...
Add a comment...

Post has attachment
Breaking KASRL with micro architecture Part 1
Hack in the box & stuff Skip to
Introduction if you are here for the techstuff. I submitted a CFP to “Hack In
the Box” in Amsterdam end of may and the talk has been accepted. So I’ll be
spending part of my vacation this year presenting some of my research o...
Add a comment...

Post has attachment
Comments on CATalyst the first use of CAT to mitigate Cache Side Channel Attacks
Resonately
[1] Lui et al.(2016) released a new very interesting paper. This paper will be
the topic of this blog post. In my “Rowbuffer side channel attacks“. I
speculated that CAT would be interesting as mitigation for cache side channel
attacks. It turns ...
Add a comment...

Post has attachment
Row hammer, java script and MESI
Ramblings There is no tech info here. If you don't care abot my ramblings skip to intro. It's been a while since my last blog post. With 22 blog post of varying quality in my first year of blogging it was time to see to it that I got around to my other hobb...
Add a comment...

Post has attachment
Rowbuffer side channel attacks
Introduction Cache side
channel attacks has resonantly had a renaissance in the literature due to the
emergence of a 3rd Level cache that is shared between cores on a system.
However since the dawn of time a feature of DRAM has been available for side
chann...
Add a comment...

Post has attachment
Detecting stealth mode cache attacks: Flush+Flush
Introduction In my
previous works, I described the how Cache side channel attacks work, why I
consider them a serious threat and spend a lot of time on mitigation methods
and detection. Resonately a new paper was published that avoid the detection
methods t...
Add a comment...
Wait while more posts are being loaded