What Stone dream about

Malware, low level coding and statistical methods for malware analysis

Monday, August 1, 2016

BlackHat 2016: The Wish list

›
This blog is no longer where my technical stuff is blogged. It is purely my private thoughts. My technical stuff is blogged here;  https:/...
293 comments:
Thursday, June 16, 2016

You've not heard the last of me

›
What a month May was. First I had the opportunity to meet with some infosec people I havn't seen in a very long time and also met some...
Friday, May 6, 2016

Row hammer the short summary

›
Introduction I resonantly realized how much stuff was published on the row hammer and how much I was missing a short summary. So I wrote...
Wednesday, March 9, 2016

Anvil& next generation row hammer attacks

›
My ramblings No technical stuff in here. If you are here for the tech skip to introduction. First up the KASRL blog part 2 is in pro...
1 comment:
Saturday, February 20, 2016

Breaking KASRL with micro architecture Part 1

›
Hack in the box & stuff Skip to Introduction if you are here for the techstuff. I submitted a CFP to “Hack In the Box” in Amsterda...
1 comment:
Sunday, February 7, 2016

Comments on CATalyst the first use of CAT to mitigate Cache Side Channel Attacks

›
Recently Lui et al.[1]  released a new very interesting paper. This paper will be the topic of this blog post. In my “Rowbuffer side chann...
1 comment:
Monday, February 1, 2016

Row hammer, java script and MESI

›
Ramblings There is no tech info here. If you don't care abot my ramblings skip to intro. It's been a while since my last blog po...
2 comments:
›
Home
View web version

About me

Unknown
View my complete profile
Powered by Blogger.