Vinoth Deivasigamani's Avatar

Vinoth Deivasigamani

@vinothd

I lead silicon security architecture and silicon security operations teams at #Google. Previously, silicon security at #Qualcomm. These days I work on Tensor/Pixel and Android security

25
Followers
80
Following
71
Posts
27.11.2024
Joined
Posts Following

Latest posts by Vinoth Deivasigamani @vinothd

6/
As a result, defender-side agents will likely be better positioned to identify these harder classes of vulnerabilities.

That’s why I think LLM-assisted vulnerability discovery ultimately favors defense.

09.03.2026 07:43 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

5/
Finding these requires deep context:
how the system is designed, what assumptions were made, and how different pieces interact across the stack.

Defenders naturally have that context.
Attackers usually don’t.

09.03.2026 07:43 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

4/
What remains are the harder classes of vulnerabilities:
β€’ issues emerging at module boundaries
β€’ incorrect assumptions between components
β€’ complex system-level behavior rather than a single piece of code

09.03.2026 07:43 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

3/
As that happens, the attack surface shifts.

Fewer trivial bugs. More subtle vulnerabilities.

09.03.2026 07:43 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

2/
The era of "stupid bugs" resulting in vulnerabilities is ending.

With LLM-assisted analysis, obvious implementation mistakes will get discovered and fixed much faster.

09.03.2026 07:43 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Codex Security: now in research preview Codex Security is an AI application security agent that analyzes project context to detect, validate, and patch complex vulnerabilities with higher confidence and less noise.

1/
Codex security is now in research preview.
openai.com/index/codex-...

I think models and agents that can help hunt down software vulnerabilities are net positive for defenders.

09.03.2026 07:43 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

Happy birthday to all my privacy conscious, but lazy friends who chose Jan 1st as their birthday!πŸŽ‰πŸŽ‰πŸŽ‰

01.01.2026 06:35 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
If AI replaces workers, should it also pay taxes? The technological race among industry giants and the wave of layoffs they have announced has revived the debate about the advisability of taxing automation

Article title: If AI replaces workers, should it also pay taxes?

Me: We don't want a rebellion sparked by 'Taxation without representation'. Do we?

english.elpais.com/technology/2...

15.12.2025 18:59 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Link back to the top of the thread:
bsky.app/profile/vino...

22.11.2025 04:45 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
IACR News item: 21 November 2025

That said, I am glad that IACR is addressing this "human mistake" by making a "system design change" to a 2-of-3 quorum for the re-run.

www.iacr.org/news/item/27...

#IACR #Cryptography #KeyManagement #InfoSec #OPSEC #Elections

22.11.2025 04:44 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Devices die. Backups fail. People forget. People die. Anyone who has worked with computers (or people) knows this happens.

System design should account for this. I wish IACR took accountability for the design failure rather than blaming the human element.

22.11.2025 04:44 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

I am disappointed that IACR is framing the root cause as an "unfortunate human mistake," effectively throwing a distinguished member of the community under the bus.

This is a system design issue. No critical system should have a 3-of-3 quorum requirement.

22.11.2025 04:44 πŸ‘ 2 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

2. Security is more than cryptography.

Most secure systems fail or get compromised, not due to sophisticated cryptanalytic attacks, but due to implementation and OPSEC issues.

22.11.2025 04:44 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Few lessons to relearn here:

1. Availability is a security requirement. It is just as important as Confidentiality.

While this seems like a truism, it is not uncommon to come across system designs (or even NSA/NIST specs) that contradict this principle.

22.11.2025 04:44 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

IACR used #Helios for voting. They configured it such that all 3 trustees need to be present with their share of the private key to tally results.

One trustee lost their share. Now the results are mathematically secureβ€”forever.

The math worked. The encryption held. The process failed.

22.11.2025 04:44 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Cryptography is the art of transforming every problem into a key management problem. Here is a recent case study on this theme, which is a bit on the nose.

The International Association for Cryptologic Research (IACR) is unable to tally their election results because they lost a private key. Ouch!

22.11.2025 04:44 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 1

Attack outcome: If you mess with the ground-based time, you mess with GPS.

This affects everything from your car's driving directions to the guidance systems for precise missiles.

Sources:
www.theregister.com/2025/10/20/c...
www.cert.org.cn/publish/main...

21.10.2025 19:06 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

2. GPS Navigation: GPS satellites need perfectly synchronized clocks. They have onboard atomic clocks but rely on ground stations (like NTSC) to correct for timing drifts.

(An interesting source of drift: Relativistic time dilation, because the sats move at ~9,000 mph!)

21.10.2025 19:06 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

1. Telecommunications: Cell phone base stations must share a common clock to hand off calls. This is even more vital for low-latency 5G applications.

Attack outcome: If you disrupt the time, you can disrupt the entire communications grid.

21.10.2025 19:06 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Why target a timekeeper? It sounds mundane, but high-precision time is a critical national security asset.

Modern tech relies on nanosecond-level accuracy. If you can mess with time, you can disrupt critical infrastructure.

Here are two key examples:

21.10.2025 19:06 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

China alleges the NSA mounted a cyberattack on its National Time Service Center (NTSC), the country's official timekeeper.

The attack reportedly attempted to compromise high-precision timing. Beijing has not stated if the attempt was successful.

(Thread 🧡)

21.10.2025 19:06 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Great work, Wenyi Zhang, Annie Dai, Keegan Ryan, Dave Levin, Nadia Heninger and Aaron Schulman!

satcom.sysnet.ucsd.edu/docs/dontloo...

14.10.2025 04:53 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

While it is important to work on futuristic threats such as Quantum cryptanalysis, backdoors in standardized cryptographic protocols, etc. - the unfortunate reality is that the vast majority of real-world attacks happen because basic protection is not enabled. Lets not take our eyes off the basics.

14.10.2025 04:53 πŸ‘ 2 πŸ” 2 πŸ’¬ 1 πŸ“Œ 0

- Walmart Mexico: Unencrypted corporate emails, plaintext credentials to inventory management systems, inventory records transferred and updated using FTP

14.10.2025 04:53 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

- AT&T Mexico cellular backhaul: Raw user internet traffic
- TelMex VOIP on satellite backhaul: Plaintext voice calls
- U.S. military: SIP traffic exposing ship names
- Mexico government and military: Unencrypted intra-government traffic

14.10.2025 04:53 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

A few researchers from UCSD and UMCP scanned bunch of satellite links, found much of the traffic is not encrypted, and went on to decode them. It's amazing what came out.
- T-Mobile backhaul: Users' SMS, voice call contents and internet traffic content in plain text.

14.10.2025 04:53 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

"Almost died on the thruway today when it happened and I’m glad it didn’t cause a bigger accident with an 18-wheeler behind me being able at the last minute to shift lanes because my Jeep died, locked its hand brake and jolted so hard my face almost ended up in the steering wheel at 70mph."

12.10.2025 17:15 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

OTA update to Jeep Wrangler bricks the vehicle. No attack suspected here. Nonetheless, it exposes an often under appreciated attack vector. It is scary how easy it will be for a motivated actor to cause chaos by just bricking stuff en masse.

www.4xeforums.com/threads/wran...

12.10.2025 17:15 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0

Availability is not antithetical to security and privacy. A well designed security system will meet availability needs.

"The Interior Ministry explained that... the G-Drive’s structure did not allow for external backups. This vulnerability ultimately left it unprotected."

05.10.2025 22:20 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
NIRS fire destroys government's cloud storage system, no backups available A fire at the National Information Resources Service (NIRS) Daejeon headquarters destroyed the government’s G-Drive cloud storage system, erasing work files saved individually by some 750,000 civil se...

This terrible event is a reminder that "Availability" is a critical goal for security and privacy systems. After all, we are in the risk mitigation business. And losing critical assets is one of the biggest risks a business faces.

koreajoongangdaily.joins.com/news/2025-10...

05.10.2025 22:20 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0