Alex “neat” A.

@NeatMonster_

Security engineering by day; reversing, exploiting and tools development by night. You can find all of my projects at

Toulouse, France
Vrijeme pridruživanja: prosinac 2011.

Tweetovi

Blokirali ste korisnika/cu @NeatMonster_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @NeatMonster_

  1. proslijedio/la je Tweet
    27. pro 2019.

    If you're interested in Samsung's TrustZone, the talk I gave at is online. It presents the work we did with and at . We are at if you want to come say hi. :)

    Poništi
  2. proslijedio/la je Tweet
    17. pro 2019.
    Poništi
  3. proslijedio/la je Tweet
    10. pro 2019.
    Poništi
  4. proslijedio/la je Tweet
    16. kol 2019.
    Poništi
  5. proslijedio/la je Tweet
    12. kol 2019.
    Poništi
  6. proslijedio/la je Tweet
    8. kol 2019.

    APRR: Of Apple hardware secrets. Might include a free 0day.

    Poništi
  7. 6. kol 2019.
    Prikaži ovu nit
    Poništi
  8. 6. kol 2019.

    Sad to not being able to make it to this year. Huge thanks to my colleague and friend for presenting our work on his own. Don't miss his talk, he has a put a lot of work into it!

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    11. lip 2019.
    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    3. lip 2019.

    Using Samsung's TrustZone implementation as a target, & & explain and demonstrate how this new attack surface can be leveraged to hijack and exploit trusted components in their Briefing at

    Poništi
  11. proslijedio/la je Tweet
    9. svi 2019.

    Gain a solid understanding of the underlying mechanisms used in popular ARM TrustZone implementations by & at US. More training info:

    Poništi
  12. proslijedio/la je Tweet
    9. svi 2019.
    Poništi
  13. proslijedio/la je Tweet
    7. svi 2019.
    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    2. svi 2019.

    My NGI slides about 'mobile devices attacks in practice' have been update! This fixes mistakes reported by (thanks again!) on the introduction slide and adds up few more information + few asked links:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    23. tra 2019.

    I used high-powered branch-predictor and memory side channels to extract private keys from Qualcomm's TrustZone keystore. Check it out:

    Poništi
  16. proslijedio/la je Tweet
    17. tra 2019.

    [BLOG] Reverse-engineering Broadcom wireless chipsets by The long and good trip of an intern, then the long and sad disclosure timeline of 5 vulnerabilities. Thx to we dont know what is vulnerable...

    Poništi
  17. proslijedio/la je Tweet
    17. tra 2019.

    New blog entry: An Abstract Interpretation-Based Deobfuscation Plugin for Ghidra

    Poništi
  18. proslijedio/la je Tweet
    4. tra 2019.

    In , simply enabling the pcode field is enough to display the Pcode, checking "Raw Pcode" displays a more verbose version of it. H/T to for pointing this out to me yesterday. Thanks, dude!

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    4. tra 2019.

    It's here! Ghidra source code released: This is an ongoing, supported project from . Looking forward to seeing the continued advancements and the innovation that occurs from the release.

    Poništi
  20. proslijedio/la je Tweet
    27. ožu 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·