Opens profile photo
Follow
RBTree
@RBTree_
Rev & Crypto | Work | CTF | HypwnLab | DEFCON CTF 2017-2022 Finalist
South Korearbtree.infoJoined June 2019

RBTree’s Tweets

I would like to thank the chairs for letting us use heart emojis in the paper title. I think this is a very important step forward for academia and research. Can't wait to use "👀" for related work and "🤨" for limitations on the next one
Quote Tweet
Are you working with stubborn aarch64 code? Check out @cyan_pencil's upcoming @USENIXSecurity #SEC23 paper on efficiently rewriting ARM binaries. Insight: using heuristics for optimization on a safe baseline is key! nebelwelt.net/files/23SEC3.p Comments welcome!
Image
64
If you have a solution on SusCipher which works w/o the knowledge of the S-box and permutation layers, please let me know! I hope you enjoyed my challenges ❤️
2
Show this thread
The other one is SusCipher from this ACSC 2023. I intentionally put some backdoors in the cipher, and my solution works by using them. But there are various ways to break it by exploiting some of these backdoor properties. I'm gonna explain the official solution next week.
1
2
Show this thread
I made two block cipher challenges recently. First one is Blocky, about breaking a AES-like custom cipher implemented over GF(3^5). I thought there must be a decent technique which can be applied to this custom cipher, but I couldn't find a way to do so. 😢
1
18
Show this thread
읽기 27.8GB/s 쓰기 25.7GB/s가 나오도록 삼성 990PRO SSD 8개를 RAID0로 짜서 AMD Ryzen Threadripper PRO 5995WX, 256G RAM 기기에 연결해보니 4K RAW 영상을 10 스트림 동시에, 혹은 니콘Z9으로 찍은 8.3K RAW를 1화면에 8개 띄우고 편집 돌려도 쾌적하더라…는 결과.
3
41
Show this thread
I really enjoyed challenges from this SECCON CTF finals! I hope we can win next year 😎
Image
Image
Image
38
Finally finished thinking out challenge ideas… It was full of pains. My crypto challenges in this pbctf will be fun, but not that difficult [1]. At least it will be better than my pbctf 2021 challenges which I just directly copy-pasted from some papers 🥲 [1] Maybe false.
1
24
In this post I'll use CVE-2022-38181, a use-after-free I reported last year in the Arm Mali GPU driver to gain arbitrary kernel code execution and root from untrusted Android app. Not sure if the bug or the disclosure is more interesting:
2
372
Show this thread
I am happy to announce that I am going to be an author for the real World CTF this year... Also, I heard that is up to something too👀. Come and play it this January 6th because the challenges are going to be🔥 #ctf #bugbountytips
Quote Tweet
We are glad to announce that The 5th Real World CTF held by Chaitin Tech is about to start. Online Jeopardy will still be the game model.More information can be found in our Website(realworldctf.com), CTFtime(ctftime.org/event/1797). Looking forward to having you on board
Image
6
66