Hi, I am Stephan van Schaik (IPA: /ˈsteːfɑn vɑn sxaɪk/). I'm currently doing research into computer systems security, more specifically micro-architectural attacks involving the CPU. Generally, I like delving into the low-level areas of computer science such as computer architecture, operating system development, concurrency, embedded hardware, etc.
More information can be found at https://cacheoutattack.com (January 27, 2020).
More information can be found at https://www.mdsattacks.com (May 14, 2019).
Awarded with the Intel Bounty Reward.
Presented the paper at S&P 2019 in San Francisco, CA, USA (May 20, 2019).
Presented the poster at the Cybersecurity and Privacy (CySeP) Summer School in Stockholm, Sweden (June 13, 2019).
Presented the talk at OFFZONE 2019 in Moscow, Russia (June 17-18, 2019).
Presented the talk at HITB+ CyberWeek 2019 in Abu Dhabi, UAE (October 17, 2019).
Presented the poster at CSAW '19 in Valence, France and won the 2nd place award of €500 for Applied Research (November 7-8 2019).
Presented the paper at USENIX Security 2018 in Baltimore, MD, USA (August 15, 2018).
Courses: Kernel Programming (2018 - 2019) and Hardware Security (2018)
Course: Compiler Construction
Developed the Trusted Boot Module (TBM), a hardware component implemented using the STM32F1 microcontroller to manage and store keys and to verify signed software images in order to prevent attackers from tampering with the software.
Courses: Computer Architecture & Organisation (2013 - 2015), Image Processing (2014), Parallel Programming (2013), Data Structures (2013 - 2014), Introduction to Programming (2012 - 2013), Modern Databases (2015 - 2016), Multimedia (2013 - 2014), Net-Centric Computing (2013), Numerical Recipes (2015 - 2016), Functional Programming (2012 - 2015) and Statistical Reasoning (2014 - 2015).
Discussing and monitoring the progress of students as well as assisting students with auxiliary resources they require during their study.
Documented and assisted the installation process of Linux Ubuntu and additional software for first year undergraduates.
Documented and reported various vulnerabilities in both Datanose and Blackboard.
Universiteit van Amsterdam
Graduated under supervision of Toto van Inge.
While the Allwinner SoCs have support for booting from SPI NOR flash, one of the limitations was that there was simply no U-Boot SPI driver. While working at Whitebox Systems, we needed support for booting from SPI NOR flash for one of our projects. We found back then that everything else was already in place, except for the SPI driver itself.
To implement the SPI driver, we mostly based our code on the existing implementation in the Linux source code, as well as a manual describing the register mapping used for the various SPI interfaces on the various SoCs. We then wrote and prototyped a SPI driver for U-Boot. Once we confirmed that we could read, write and erase the SPI NOR flash attached, we set up U-Boot SPL and applied some soldering hacks to boot U-Boot and eventually the Linux kernel directly from SPI NOR flash.
We then made sure the driver had full support for other SoCs as well by testing it on the H2+ Orange Pi Zero, the A20 OLinuXino LIME 2, the A64 Pine64+ and the A64 OLinuXino. The driver ended up in U-Boot mainline, and also led to new OLinuXino boards that now ship with SPI NOR flash.
L1D Eviction Sampling (L1DES) (CVE-2020-0549)
Vector Register Sampling (VRS) (CVE-2020-0548)
Transactional Asynchronous Abort (TAA) (CVE-2019-11135)
Microarchitectural Data Sampling Uncacheable Memory (MDSUM) (CVE-2019-11091)
Microarchitectural Fill Buffer Data Sampling (MFBDS) (CVE-2018-12130)
Microarchitectural Load Port Data Sampling (MLPDS) (CVE-2018-12127)