Yueqi Chen

@Lewis_Chen_

Ph.D. Student interested in OS Security and Vulnerability Analysis.

Vrijeme pridruživanja: travanj 2016.

Tweetovi

Blokirali ste korisnika/cu @Lewis_Chen_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Lewis_Chen_

  1. 31. sij

    So sad that I can’t make it Israel due to Corona Virus. Organizers are so nice and do me a great favor in rescheduling my agency. Really appreciate! Lucky guys, enjoy the talks.🤩

    Poništi
  2. proslijedio/la je Tweet
    4. pro 2019.

    We compiled a long list of Threats to Validity/Relevance in Security Research for our students, building on common sense & our papers on malware experiments and on benchmarking (and inspired by 's excellent blog). Perhaps useful for others?

    Poništi
  3. 8. pro 2019.

    So happy that the work I did during my internship this summer is accepted to . This work detects the cache timing leak caused by speculative execution. Thank everyone's help in this procedure. It's a brand-new topic for me and I am proud of myself.

    Poništi
  4. 22. stu 2019.

    Thank for hosting me at Oxford. So happy to share our idea of exploit development. I will post the slides to my personal page in the next few days after polishing. 😬

    Poništi
  5. 15. stu 2019.

    Done the presentation of exploitation work and FSM extraction work at the FEAST workshop. Exhausted.😶Now the only thing makes me excited is the seminar next Friday at Oxford where I will talk about exploitability assessment.

    Poništi
  6. 10. stu 2019.

    Good morning, London. 🇬🇧This week, I will present my exploitation work at on Thursday and my fellow’s cool work about automated FSM extraction at FEAST workshop on Friday. If you happen to be at the venue and are interested in either topic, Let’s have a chat.😬

    Poništi
  7. 9. lis 2019.
    Prikaži ovu nit
    Poništi
  8. 9. lis 2019.

    I was about to doctor's appointment and received an email beginning with "Congratulations... ". So excited to gonna have a briefing at talking about Linux kernel exploitation. See you folks again in London. (Why BH Europe is held at Brexit🤣)

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    21. ruj 2019.

    "Support for asm goto, enabling for example the mainline Linux kernel for x86_64 to build with Clang." 🐧

    Poništi
  10. 16. ruj 2019.

    Wake up morning and happily see that is accepted to . builds a database of kernel objects and proposes a systematic Fengshui approach to facilitate/escalate kernel exploitation. Paper/Code is coming soon. See you folks in London! 😋

    Poništi
  11. 13. ruj 2019.

    Cool stuff. Planning to read it over the weekend to see if it manages to kill our "KEPLER" attack.

    Poništi
  12. proslijedio/la je Tweet
    10. ruj 2019.

    So it seems remote cache attacks are a thing now 😱

    Poništi
  13. 7. ruj 2019.
    Poništi
  14. 15. kol 2019.

    My collaborator Wei Wu is presenting our work about hacking Linux kernel. He is on the market. Take your time and welcome! Paper available at

    Poništi
  15. 15. kol 2019.

    Presented our work on detecting inconsistency among vulnerability reports Paper available at

    Poništi
  16. 12. srp 2019.

    Thank for providing student travel grant for me. So excited that I can attend the conference without worrying too much about expense. Looking forward to seeing you folks at the venue!

    Poništi
  17. proslijedio/la je Tweet
    10. ruj 2018.

    Today we release "salt", a gdb plugin to reverse and learn Linux kernel heap memory management! Kudos to Paolo Monti for the awesome work:

    Prikaži ovu nit
    Poništi
  18. 10. kol 2018.
    Poništi
  19. proslijedio/la je Tweet
    9. kol 2018.

    Our talk is this afternoon 2:30 at Islander FG, I will be talking about linux kernel vulnerabilities, I will introduce challenges and propose our technique, demonstrate its utility against real world vuls.

    Poništi
  20. 2. kol 2018.

    Software vendors also suffer when critical info is missed in report. See our group's new paper in "Understanding the Reproducibility of Crowd-reported Security Vulnerabilities"

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·