Kekai Hu

@Kekai_Hu

Security Researcher in Intel

Vrijeme pridruživanja: prosinac 2014.

Tweetovi

Blokirali ste korisnika/cu @Kekai_Hu

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Kekai_Hu

  1. proslijedio/la je Tweet
    7. sij

    Full analysis and exploit for Windows kernel ws2ifsl use-after-free (CVE-2019-1215) by our researcher

    Poništi
  2. proslijedio/la je Tweet
    22. stu 2019.

    macOS new mitigations: Enable VTd from T2 firmware before run UEFI in RAM, Sandbox OROMs in Ring3 + RO PTs, MMIO only to device loaded from, Restrict usable UEFI services & installable interfaces, VTd confine device DMA to OROM mem, W^X, SMAP/SMEP. Nice!

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    22. stu 2019.

    Mac secure boot (with two world firsts: DMA defense from PCIe Bus 0, and the Option ROM sandbox), iOS kernel integrity, Pointer Auth Codes (PAC), APRR register, Page Protection Layer (PPL), and novel Find My crypto — all in my slides from Black Hat 2019!

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    22. lis 2019.

    We've just released two new papers "A New Type of Branch Instruction with Configurable Speculation Behavior" and "A Recursive Counter for Linked-List Return Stack Buffer" (non-security related). Read it here:

    Poništi
  5. proslijedio/la je Tweet
    17. lis 2019.

    We've updated the paper "A New Memory Type Against Speculative Side-Channel Attacks" by to incorporate feedback received on other work and improve the references! Thanks to

    Poništi
  6. proslijedio/la je Tweet
    26. ruj 2019.

    We've just released a new paper "New Memory Type Against Speculative Side-Channel Attacks". Read it here:

    Poništi
  7. proslijedio/la je Tweet
    17. ruj 2019.

    We've just released the code for the WinDBG Plugin by our team member Artem Shishkin () presented at ()

    Poništi
  8. proslijedio/la je Tweet
    23. kol 2019.

    Baby's out 😍 here goes "Randpoline: A Software Mitigation for Branch Target Injection" - a co-op among a number of really smart ppl, in & outside Intel; uberproud to have contributed a lil! An oh look theres a sample GCC plugin 😶

    Poništi
  9. proslijedio/la je Tweet
    23. kol 2019.

    New paper - "Randpoline: A Software Mitigation for Branch Target Injection" Thanks for the help in reviewing and amazing discussions

    Poništi
  10. proslijedio/la je Tweet
    15. svi 2019.

    In all the craziness of the work, noise of the news, etc,I wanted to praise 4 individuals in this whole saga: Jann Horn (for the brilliant insight and awesome work), Ke Sun, Henrique Kawakami (now at Amazon) and Kekai Hu. And finally the rest of our team,that supported us!

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet

    Microsoft fixed a Windows 0day (CVE-2019-0808) in Patch Tuesday. Our team constructed the POC and reproduced the vulnerability triggering process. Click here to read more:

    Poništi
  12. proslijedio/la je Tweet
    17. ožu 2019.

    Hackers, I've built a small game that helps improve your XSS skills! It dynamically generates (increasingly more difficult) levels for you to exploit XSS vulnerabilities. No level is the same. Let me know what you think. Happy hacking!

    Poništi
  13. proslijedio/la je Tweet
    8. ožu 2019.

    PCILeech v4.0 - Major Release 🔥🔥🔥 Now much more than PCIe DMA attacks! New memory acquisition methods - DumpIt, winpmem and more Remote memory dumping Win10 kernel injects stable 😈 New user-mode injects 😈 And much more 😀

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    15. sij 2019.
    Poništi
  15. proslijedio/la je Tweet
    3. sij 2019.

    Team members that deserve credit as well (in no special order): Ke Sun (), , Gabriel Barbosa () and Henrique Kawakami ()

    Poništi
  16. proslijedio/la je Tweet
    15. lis 2018.

    I've just published my slides:

    Poništi
  17. proslijedio/la je Tweet
    10. srp 2018.

    We've just released the PCIe Device Security Enhancements Specification 0.7 (). Feedbacks are, as usual, very welcome.

    Poništi
  18. proslijedio/la je Tweet
    6. srp 2018.

    There is no such a thing as a dumb fuzzer...

    Poništi
  19. proslijedio/la je Tweet
    4. srp 2018.

    Marion Marschalek () is confirmed 15th Edition - Talking about GCC Internals ()

    Poništi
  20. proslijedio/la je Tweet
    14. lip 2018.

    Intel Security Conference Call for Papers (Tech Committee: @shaygueron plus Shay Gueron, Martin Dixon and Deepak Gupta)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·