Lee Fisher

@LeeFisher_PreOS

CTO/co-founder of PreOS Security. firmware 'Security Researcher', UEFI developer, DC206, Black Lodge Research, ex-MSFT NT kernel/Windbg/HAL/DDK. Twitter noob.

Vrijeme pridruživanja: srpanj 2017.

Tweetovi

Blokirali ste korisnika/cu @LeeFisher_PreOS

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @LeeFisher_PreOS

  1. proslijedio/la je Tweet
    30. sij

    Microsoft's Project Mu UEFI attempts to guide system builders toward correct IOMMU implementations...

    Poništi
  2. proslijedio/la je Tweet
    27. sij

    Finally, the disclosure is over! We present CacheOut, a new speculative execution attack to leak data on Intel CPUs via cache eviction despite current mitigations: , Andrew Kwong, Daniel Genkin and

    Poništi
  3. proslijedio/la je Tweet
    27. sij

    I wrote a bit about hunting for UEFI Implants, and realising that we’re failing as an industry -- along with some ideas of things we could do to fix it. Comments welcome, especially from and ...

    Poništi
  4. proslijedio/la je Tweet
    24. sij

    Happy Friday Hacker Fam! This is a friendly reminder that this is the last weekend to work on your CFP submission. Any questions - reach out to us!

    Poništi
  5. 24. sij

    There will be a RISC-V assembly language and machine language workshop at in May, to learn asm dev and bin exploitation. (Userspace apps, no firmware.)

    Poništi
  6. proslijedio/la je Tweet
    15. sij

    LAST CALL! Submit your proposals for LFNW 2020 by midnight tonight if you want to help make the fest amazing.

    Poništi
  7. proslijedio/la je Tweet
    14. sij

    Seattle Locksport and DC206 Meeting coming up! January 19, 2020 We are covering mechanical keyboards! Please visit for more information!

    Poništi
  8. proslijedio/la je Tweet
    17. pro 2019.

    I am glad to announce that we released the source code of KARONTE at . Our tool tracks information data-flow across the different components of a firmware and finds vulnerabilities. Our paper can be found at

    Poništi
  9. proslijedio/la je Tweet

    Infosec people: Are there any viable attacks on the FS8806 I2C/SPI software authentication chip or its associated "Concerto" embedded library? I'm not looking to pirate software per se, but it was used on the "Happy Fish" bootleg MAME board, and is a real gnarly S.O.B.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    5. sij

    I made an experimental x86 bootloader using for BIOS boot. This program can boot the ELF formatted kernel which compressed with bzip2. it decompresses the bz2 image and relocate the ELF image, then boot the kernel.

    Poništi
  11. proslijedio/la je Tweet
    2. sij

    It has come to our attention that several Battlefield 5 players have recently been banned for playing on Linux, and that EA has chosen not to revert these wrongful punishments. Due to this, we advise to refrain from playing any multiplayer games published by in the future.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    28. pro 2019.
    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    26. pro 2019.
    Poništi
  14. proslijedio/la je Tweet
    26. pro 2019.

    New blogpost: Sanitized Emulation with QEMU-AddressSanitizer I just open-sourced my QEMU patches to fuzz binaries with ASan, QASan. You can also use it with ARM targets on Linux, a thing that you can't do with LLVM ASan!

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    23. pro 2019.

    Side-note for professors & teachers: I made it a requirement for students to cite any URL as an 'd URL—meaning students had to archive before citing. This class alone created hundreds of archived sources, including obscure posts and whatnot. You should too.

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    19. pro 2019.

    A new set of "Mac firmware security" pages are finally out, thanks to . Check it out, it's what me and my teammates at Apple had beet working on really damn hard for the last several years.

    Poništi
  17. proslijedio/la je Tweet
    19. pro 2019.

    Only 75 tickets left for ! CFP and campsite signups will be going online in early January 💻🏕✨

    Poništi
  18. proslijedio/la je Tweet
    16. pro 2019.

    My latest little 1-day project: generating a Z3 SAT model of x86 intrinsics from Intel's documentation. This can help prove SIMD code correct, find lookup table values, etc.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    16. pro 2019.

    Neither UEFI Forum nor Kaspersky revoked vulnerable UEFI bootloader which allows to bypass Secure Boot with default configuration (with stock Microsoft keys) for unknown reason. Here's Silent UEFIinSecureBoot Disk on rutracker then:

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    15. pro 2019.

    Its amazing that a lot of people still find and reference my Modern Memory Safety training. That was exactly the goal of open sourcing it. If you’re interested in C/C++ vulnerability research you should check it out

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·