![]() In December 2017, Kocher notified Intel of their findings. It was then that the enormity of the chip vulnerability hit them. Genkin, who is a post-doctoral fellow at the University of Pennsylvania and University of Maryland, Yarom and Hamburg met Paul Kocher, a well-respected cryptographer. It wasn’t until the following year’s cryptography conference - held this time in Taiwan - that things began to gel. “None of us knew of the implications back in 2016.” “It was just an idea floating around,” Genkin said. During conversations about the work they were doing, they got the idea that the particular way computer chips were designed might be exploited by hackers. In the fall of 2016, two Israeli researchers doing work in cryptography and computer security - longtime pals Daniel Genkin and Yuval Yarom - met fellow cryptographer Mike Hamburg at a conference in Santa Barbara, Calif. ![]() Northeastern's Andrea Matwyshyn and Notre Dame's Mike Chapple discuss the Spectre and Meltdown chip flaws.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |