Adrian Herrera

@0xadr1an

Systems security researcher with a penchant for functional programming languages. PhD candidate and . S2E developer. Runner.

Canberra, Australia
Vrijeme pridruživanja: lipanj 2017.

Tweetovi

Blokirali ste korisnika/cu @0xadr1an

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xadr1an

  1. Prikvačeni tweet
    2. pro 2019.

    I wrote a small tool to "recreate" AFL's mutation chain from a given seed/crash. It can also produce a graph that shows the relationship between seeds and the mutations that led to the creation of those seeds Hopefully it's useful to peeps

    Poništi
  2. 2. velj

    This is a really great post! I don’t really consider myself a PL person (and had never heard of POPLmark), but I’ll definitely be checking out the panel video

    Poništi
  3. 31. sij

    "Parallelizing Binary Code Analysis", Meng et al. Parallelizes Dyninst to improve control/data flow analysis + debug information parsing performance. Uses perf analysis to identify expensive code and applies race detectors to guide synchronization.

    Poništi
  4. proslijedio/la je Tweet
    25. sij

    Check out the RLCheck preprint! Cool idea to try and use reinforcement learning to tune generators to generate more valid (assumption-satisfying) inputs. With

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    21. sij

    Automatic ROP chain generation using ROPgadget (gadgets finding) and Triton (sym. exec. part) by !!

    Poništi
  6. proslijedio/la je Tweet
    17. sij

    A new version of my tutorial is available. It mainly follows some changes in Frama-C Calcium but also includes a few minor fixes. Note that the French version is back. EN: FR:

    Poništi
  7. proslijedio/la je Tweet
    16. sij

    My favorite articles are the ones that walks you through the author methodology and strategy to find/exploit bugs. This is the case for last post on Chrome IPC vulnerabilities:

    Poništi
  8. 16. sij

    MS’ Project Verona, an experiment on concurrent ownership in a PL

    Poništi
  9. proslijedio/la je Tweet
    11. sij

    "AFLNet: A Greybox Fuzzer for Network Protocols", my joint work with & Abhik, is accepted as a testing tool paper . It was motivated by many requests from AFL users for . Stay tuned for preprint & tool (with funder's approval).

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    10. sij

    new blog post: Testing Dataflow Analyses for Precision and Soundness summarizes a new paper lead by

    Poništi
  11. proslijedio/la je Tweet
    10. sij

    NDSS is pleased to announce the preliminary list of accepted papers for NDSS 2020. . Join us 23-26 February in sunny San Diego for all the details.

    Poništi
  12. proslijedio/la je Tweet
    29. pro 2019.

    Observing and sequencing Intel load port traffic! Wrote up this blog over the holidays! Happy New Year!

    Poništi
  13. 26. pro 2019.

    “An Observational Investigation of Reverse Engineers’ Processes”, to appear at Usenix Security 2020

    Poništi
  14. proslijedio/la je Tweet
    22. pro 2019.

    New post: Programming and Interactive Proving With Z3Py

    Poništi
  15. proslijedio/la je Tweet
    23. pro 2019.

    For their semester project, Kent Ma () and Leon Chou () of the put together some enhancements to the Ghidra decompiler to give it better Go support! Two posts: first, a dive into what Go looks like at the binary level:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    21. pro 2019.

    This semester I taught a course on programming language semantics and abstract interpretation. All of the slides are freely available in PDF and Keynote here: . I really loved presenting this, and am thankful for the students who worked so hard to learn it

    Poništi
  17. proslijedio/la je Tweet
    17. pro 2019.

    "Memory safety issues remain dominant ... Spatial safety remains the most common vulnerability category (heap out-of-bounds read/write)"

    Poništi
  18. proslijedio/la je Tweet
    17. pro 2019.

    New paper "Inferring Input Grammars from Dynamic Control Flow". Given a program, our Mimid prototype automatically infers a human-readable context-free grammar that accurately specifies its input syntax. Great helper for fuzzing and program understanding!

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    17. pro 2019.

    If you're interested in getting started with PANDA for debugging and reverse engineering, Tim Leek put together a short introductory course!

    Poništi
  20. proslijedio/la je Tweet
    9. pro 2019.
    Poništi
  21. 6. pro 2019.

    Forgot I had this photo from Peter O’Hearn’s (great!) talk on “Incorrectness Logic” from the Facebook testing & verification event a few weeks back. I feel personally attacked by that reviewer tho 🧐

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·