achamayou | 5 years ago | on: More patents disclosing a Sony medium format camera with curved sensor
achamayou's comments
achamayou | 5 years ago | on: Pytest-austin: performance regression testing with no instrumentation
achamayou | 5 years ago | on: Nine in ten adults think buying latest smartphone is waste of money
achamayou | 5 years ago | on: Hermann Hauser: ‘It’s in Nvidia’s Interests to Destroy Arm’
achamayou | 5 years ago | on: Python Generated Sequence Diagrams
achamayou | 6 years ago | on: V0LTpwn: Attacking x86 Processor Integrity from Software
Importantly, a user who does not fully trust the machine administrator can still maintain integrity and confidentiality over their computation.
SGX memory encryption keys are ephemeral, they are generated at boot, and they do not need to be owned by anyone to be useful, on the contrary!
achamayou | 6 years ago | on: V0LTpwn: Attacking x86 Processor Integrity from Software
Code running in an SGX enclave is measured and absolutely known at enclave launch. The fact that enclave memory is encrypted for confidentiality is unrelated.
I don’t understand why you think trusting the hyper visor is helping anything. You are still open to this attack, and to all side channel attacks as soon as you run any untrusted code.
achamayou | 6 years ago | on: Deprecating password authentication in GitHub API
achamayou | 6 years ago | on: V0LTpwn: Attacking x86 Processor Integrity from Software
The scheme you suggest, which isn’t typically how TrustZone is used, gives zero integrity and confidentiality guarantees for applications. I don’t know if it’s “the right way” for some threat model, but for the most typical TEE use cases which are trying to establish strong integrity and confidentiality guarantees in the presence of an untrusted host, it’s absolutely not right nor useful.
achamayou | 6 years ago | on: V0LTpwn: Attacking x86 Processor Integrity from Software
achamayou | 6 years ago | on: V0LTpwn: Attacking x86 Processor Integrity from Software
achamayou | 6 years ago | on: V0LTpwn: Attacking x86 Processor Integrity from Software
achamayou | 6 years ago | on: Too Much Food in the Wrong Places
achamayou | 6 years ago | on: Tired Mountain Syndrome
achamayou | 6 years ago | on: EU Commission to staff: Switch to Signal messaging app
achamayou | 6 years ago | on: Past Time to Tell the Public:It Will Probably Go Pandemic, We Should Prepare Now
achamayou | 6 years ago | on: France fines Apple €25M for iOS software that slowed down older iPhones
achamayou | 6 years ago | on: Cryptic Rumblings Ahead of First 2020 Patch Tuesday
achamayou | 6 years ago | on: Open letter concerning Facebook's proposals to apply end-to-end encryption
achamayou | 6 years ago | on: “Rule the Waves”: a game of naval strategy (2016)