<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Hacker News: hovav</title><link>https://news.ycombinator.com/user?id=hovav</link><description>Hacker News RSS</description><docs>https://hnrss.org/</docs><generator>hnrss v2.1.1</generator><lastBuildDate>Thu, 30 Apr 2026 04:23:11 +0000</lastBuildDate><atom:link href="https://hnrss.org/user?id=hovav" rel="self" type="application/rss+xml"></atom:link><item><title><![CDATA[New comment by hovav in "Hackers can steal 2FA codes and private messages from Android phones"]]></title><description><![CDATA[
<p>> has already been patched against<p>... has not been (effectively) patched against, as it happens.  Maybe in December!</p>
]]></description><pubDate>Tue, 14 Oct 2025 03:31:50 +0000</pubDate><link>https://news.ycombinator.com/item?id=45575969</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=45575969</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=45575969</guid></item><item><title><![CDATA[New comment by hovav in "Max severity RCE flaw discovered in widely used Apache Parquet"]]></title><description><![CDATA[
<p>Standard operating procedure for both the Chrome [<a href="https://chromium.googlesource.com/chromium/src/+/HEAD/docs/security/faq.md" rel="nofollow">https://chromium.googlesource.com/chromium/src/+/HEAD/docs/s...</a>] and Firefox [<a href="https://www.mozilla.org/en-US/about/governance/policies/security-group/bugs/" rel="nofollow">https://www.mozilla.org/en-US/about/governance/policies/secu...</a>] bug tracking systems.<p>But the fix itself is public in both the Chrome [<a href="https://chromium.googlesource.com/chromium/src.git/+/36dbbf38697dd1e23ef8944bb9e57f6e0b3d41ec" rel="nofollow">https://chromium.googlesource.com/chromium/src.git/+/36dbbf3...</a>] and Firefox [<a href="https://github.com/mozilla/gecko-dev/commit/ac605820636c3b964542a2c0589af04a02235d00">https://github.com/mozilla/gecko-dev/commit/ac605820636c3b96...</a>] source repos, and it makes pretty clear what the bug is.</p>
]]></description><pubDate>Sun, 06 Apr 2025 20:30:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=43604716</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=43604716</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43604716</guid></item><item><title><![CDATA[New comment by hovav in "FBI raids home of prominent computer scientist who has gone incommunicado"]]></title><description><![CDATA[
<p>> Xiaogang (Cliff) Wang is listed as the principal investigator.<p>No, you are misreading the award abstract.  Cliff Wang is the program manager at NSF who is the point of contact for the investigators.</p>
]]></description><pubDate>Mon, 31 Mar 2025 00:15:11 +0000</pubDate><link>https://news.ycombinator.com/item?id=43529212</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=43529212</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43529212</guid></item><item><title><![CDATA[New comment by hovav in "Constant-Time Code: The Pessimist Case [pdf]"]]></title><description><![CDATA[
<p>It's not guaranteed.  See section 7 of <a href="https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-kohlbrenner.pdf" rel="nofollow">https://www.usenix.org/system/files/conference/usenixsecurit...</a></p>
]]></description><pubDate>Wed, 12 Mar 2025 20:09:38 +0000</pubDate><link>https://news.ycombinator.com/item?id=43347186</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=43347186</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43347186</guid></item><item><title><![CDATA[New comment by hovav in "Constant-Time Code: The Pessimist Case [pdf]"]]></title><description><![CDATA[
<p>> power need[s] to be exploited locally<p>Not in the presence of DVFS, it turns out: <a href="https://www.hertzbleed.com/hertzbleed.pdf" rel="nofollow">https://www.hertzbleed.com/hertzbleed.pdf</a></p>
]]></description><pubDate>Wed, 12 Mar 2025 20:05:33 +0000</pubDate><link>https://news.ycombinator.com/item?id=43347144</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=43347144</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=43347144</guid></item><item><title><![CDATA[New comment by hovav in "Zenv: Forth for the ZX Spectrum"]]></title><description><![CDATA[
<p>Abersoft Forth for the ZX Spectrum inspired one of the classic books about Forth, Don Thomasson's /Advanced Spectrum FORTH/ (1984): <a href="https://archive.org/details/AdvancedSpectrumFORTH" rel="nofollow">https://archive.org/details/AdvancedSpectrumFORTH</a></p>
]]></description><pubDate>Mon, 18 Mar 2024 20:42:15 +0000</pubDate><link>https://news.ycombinator.com/item?id=39749751</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=39749751</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39749751</guid></item><item><title><![CDATA[New comment by hovav in "Linkers and Loaders (1999) [pdf]"]]></title><description><![CDATA[
<p>Levine's /Linkers and Loaders/ is a great book, but it's still in print, and this is an unauthorized copy.<p>The author's home page (<a href="https://www.iecc.com/linker/" rel="nofollow">https://www.iecc.com/linker/</a>) used to host a PostScript version for download, but it no longer does, now saying: "Chapters were available in an excessive variety of formats, but are not any longer due to chronic piracy."<p>These days there is lots of information about linkers and loaders to be had without violating Levine's copyright; see <a href="https://www.toolchains.net/" rel="nofollow">https://www.toolchains.net/</a> for many links.</p>
]]></description><pubDate>Thu, 07 Mar 2024 02:12:54 +0000</pubDate><link>https://news.ycombinator.com/item?id=39624342</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=39624342</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=39624342</guid></item><item><title><![CDATA[New comment by hovav in "Control-Flow Integrity in V8"]]></title><description><![CDATA[
<p>Yes! See, e.g., Fraser Brown et al., "Towards a Verified Range Analysis for JavaScript JITs," in proc. PLDI 2020, <a href="https://www.cs.utexas.edu/~hovav/dist/vera.pdf" rel="nofollow noreferrer">https://www.cs.utexas.edu/~hovav/dist/vera.pdf</a></p>
]]></description><pubDate>Mon, 09 Oct 2023 22:43:27 +0000</pubDate><link>https://news.ycombinator.com/item?id=37826374</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=37826374</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37826374</guid></item><item><title><![CDATA[New comment by hovav in "Control-Flow Integrity in V8"]]></title><description><![CDATA[
<p>A JIT is a machine for turning logic bugs into memory unsafety.  Rewriting a JIT in Rust won't eliminate logic bugs and won't guarantee memory safety for the binary output of the JIT (as distinct from the JIT implementation itself).</p>
]]></description><pubDate>Mon, 09 Oct 2023 20:00:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=37824752</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=37824752</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37824752</guid></item><item><title><![CDATA[New comment by hovav in "Debunking NIST's calculation of the Kyber-512 security level"]]></title><description><![CDATA[
<p>Even with a verifiably random key, Dual EC is still unacceptable.<p>First, because its output has unacceptable biases [1,2].<p>Second, because its presence allows an attacker to create a difficult-to-detect backdoor simply by replacing the key, as apparently happened with Juniper NetScreen devices [3,4].<p>---
[1] Kristian Gjøsteen, Comments on Dual-EC-DRBG/NIST SP 800-90, draft December 2005. Online: <a href="https://web.archive.org/web/20110525081912/https://www.math.ntnu.no/~kristiag/drafts/dual-ec-drbg-comments.pdf" rel="nofollow noreferrer">https://web.archive.org/web/20110525081912/https://www.math....</a><p>[2] Berry Schoenmakers and Andrey Sidorenko, Cryptanalysis of the Dual Elliptic Curve Pseudorandom Generator, May 2006. Online: <a href="https://eprint.iacr.org/2006/190.pdf" rel="nofollow noreferrer">https://eprint.iacr.org/2006/190.pdf</a><p>[3] Stephen Checkoway, Jacob Maskiewicz, Christina Garman, Joshua Fried, Shaanan Cohney, Matthew Green, Nadia Heninger, Ralf-Philipp Weinmann, Eric Rescorla, and Hovav Shacham, A Systematic Analysis of the Juniper Dual EC Incident, October 2016.  Online: <a href="https://www.cs.utexas.edu/~hovav/dist/juniper.pdf" rel="nofollow noreferrer">https://www.cs.utexas.edu/~hovav/dist/juniper.pdf</a><p>[4] Ben Buchanan, The Hacker and the State, chapter 3, Building a Backdoor. Harvard University Press, February 2020.</p>
]]></description><pubDate>Wed, 04 Oct 2023 01:00:59 +0000</pubDate><link>https://news.ycombinator.com/item?id=37759651</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=37759651</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37759651</guid></item><item><title><![CDATA[New comment by hovav in "Viable ROP-free roadmap for i386/armv8/riscv64/alpha/sparc64"]]></title><description><![CDATA[
<p>It would not help at all.  See (all of, but especially) section 5.4 of N. Carlini, A. Barresi, M. Payer, D. Wagner, and T.R. Gross, "Control-Flow Bending: On the Effectiveness of Control-Flow Integrity," in proc. USENIX Security 2015, <a href="https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/carlini" rel="nofollow noreferrer">https://www.usenix.org/conference/usenixsecurity15/technical...</a></p>
]]></description><pubDate>Thu, 28 Sep 2023 03:59:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=37685095</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=37685095</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37685095</guid></item><item><title><![CDATA[New comment by hovav in "The original source code of the vi text editor, taken from System V"]]></title><description><![CDATA[
<p>Indeed, the History of Documented Unix Facilities [<a href="https://github.com/dspinellis/unix-history-man">https://github.com/dspinellis/unix-history-man</a>] says a vi(1) man page first appeared in 2BSD, and vi is implemented (as part of ex, with a 1979 copyright) in 2BSD src/ex, with the main routines at src/ex/ex_vmain.c: <a href="https://github.com/dspinellis/unix-history-repo/blob/BSD-2-Snapshot-Development/src/ex/ex_vmain.c">https://github.com/dspinellis/unix-history-repo/blob/BSD-2-S...</a></p>
]]></description><pubDate>Tue, 15 Aug 2023 16:45:37 +0000</pubDate><link>https://news.ycombinator.com/item?id=37136161</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=37136161</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=37136161</guid></item><item><title><![CDATA[New comment by hovav in "BP: Formal Proofs, the Fine Print and Side Effects (2018) [pdf]"]]></title><description><![CDATA[
<p>"Best Practices (BP) papers, up to 10 pages. Suitable papers are those that provide an integration and clarification of ideas on an established, major research area, support or challenge long-held beliefs in such an area with compelling evidence, or present a convincing, comprehensive new taxonomy of some aspect of secure development. Such a paper would be marked with the prefix 'BP:' in the title, and would need to provide new insights, although it could draw upon prior work." [<a href="https://secdev.ieee.org/2018/papers/#best-practices" rel="nofollow noreferrer">https://secdev.ieee.org/2018/papers/#best-practices</a>]</p>
]]></description><pubDate>Sat, 22 Jul 2023 17:31:39 +0000</pubDate><link>https://news.ycombinator.com/item?id=36828054</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=36828054</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36828054</guid></item><item><title><![CDATA[New comment by hovav in "The legend of “x86 CPUs decode instructions into RISC form internally” (2020)"]]></title><description><![CDATA[
<p>X. Ren et al., "I See Dead µops: Leaking Secrets via Intel/AMD Micro-Op Caches," in proc. ISCA 2021: <a href="https://cseweb.ucsd.edu/~tullsen/isca2021.pdf" rel="nofollow noreferrer">https://cseweb.ucsd.edu/~tullsen/isca2021.pdf</a></p>
]]></description><pubDate>Mon, 19 Jun 2023 14:59:06 +0000</pubDate><link>https://news.ycombinator.com/item?id=36391820</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=36391820</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36391820</guid></item><item><title><![CDATA[New comment by hovav in "Every Signature Is Broken: Insecurity of Microsoft Office’s Ooxml Signatures"]]></title><description><![CDATA[
<p>It's listed as a summer deadline accepted paper for USENIX Security 2023: <a href="https://www.usenix.org/conference/usenixsecurity23/summer-accepted-papers" rel="nofollow noreferrer">https://www.usenix.org/conference/usenixsecurity23/summer-ac...</a><p>Per the call for papers [<a href="https://www.usenix.org/conference/usenixsecurity23/call-for-papers" rel="nofollow noreferrer">https://www.usenix.org/conference/usenixsecurity23/call-for-...</a>], that means the paper would have been submitted for review by June 7, 2022, accepted for publication as of September 2, 2022, and had the final ("camera-ready") version uploaded by October 4, 2022.<p>The conference itself won't take place until August of this year.</p>
]]></description><pubDate>Mon, 12 Jun 2023 15:31:00 +0000</pubDate><link>https://news.ycombinator.com/item?id=36295215</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=36295215</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36295215</guid></item><item><title><![CDATA[New comment by hovav in "Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and Arm SoCs"]]></title><description><![CDATA[
<p>See also the closely related "DVFS Frequently Leaks Secrets: Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data," presented at Oakland last week: <a href="https://www.hertzbleed.com/2h2b.pdf" rel="nofollow">https://www.hertzbleed.com/2h2b.pdf</a></p>
]]></description><pubDate>Tue, 30 May 2023 19:30:48 +0000</pubDate><link>https://news.ycombinator.com/item?id=36129435</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=36129435</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36129435</guid></item><item><title><![CDATA[New comment by hovav in "Hot Pixels: Frequency, Power, and Temperature Attacks on GPUs and ARM SoCs"]]></title><description><![CDATA[
<p>See also the closely related "DVFS Frequently Leaks Secrets: Hertzbleed Attacks Beyond SIKE, Cryptography, and CPU-Only Data," which will be presented at Oakland today: <a href="https://www.hertzbleed.com/2h2b.pdf" rel="nofollow">https://www.hertzbleed.com/2h2b.pdf</a><p>(It's citation 68 in the Hot Pixels paper.)</p>
]]></description><pubDate>Tue, 23 May 2023 13:55:18 +0000</pubDate><link>https://news.ycombinator.com/item?id=36044337</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=36044337</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=36044337</guid></item><item><title><![CDATA[New comment by hovav in "NSA, NIST, and post-quantum crypto: my second lawsuit against the US government"]]></title><description><![CDATA[
<p>I don't think Juniper used BSAFE in ScreenOS -- they seem to have put together their own Dual EC implementation on top of OpenSSL, sometime around 2008.  (This doesn't change your point, of course.)</p>
]]></description><pubDate>Sat, 06 Aug 2022 16:08:49 +0000</pubDate><link>https://news.ycombinator.com/item?id=32369278</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=32369278</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=32369278</guid></item><item><title><![CDATA[New comment by hovav in "Ask HN: Best book on modern cryptography?"]]></title><description><![CDATA[
<p>Steven Galbraith's <i>Mathematics of Public Key Cryptography</i>: <a href="https://www.math.auckland.ac.nz/~sgal018/crypto-book/crypto-book.html" rel="nofollow">https://www.math.auckland.ac.nz/~sgal018/crypto-book/crypto-...</a></p>
]]></description><pubDate>Fri, 27 May 2022 21:04:53 +0000</pubDate><link>https://news.ycombinator.com/item?id=31534882</link><dc:creator>hovav</dc:creator><comments>https://news.ycombinator.com/item?id=31534882</comments><guid isPermaLink="false">https://news.ycombinator.com/item?id=31534882</guid></item></channel></rss>