Ryan

@ReversingWithMe

Object File Analysis, Programming Scientist. I use [lol, haha, :), !] to deal with Poe's Law. Reserve right to be wrong sometimes.

Vrijeme pridruživanja: srpanj 2012.

Tweetovi

Blokirali ste korisnika/cu @ReversingWithMe

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ReversingWithMe

  1. proslijedio/la je Tweet

    This is really cool...just the stdlib but it’s a LOT of versions. I wish we could do this with Keil stdlibs w/o violating ToS

    Poništi
  2. proslijedio/la je Tweet

    A solid 10% of being an engineering manager is asking two people if they've talked to each other yet

    Poništi
  3. 4. velj

    I have to say, this is my favorite take on AI

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    VSCode x * VSCode based GUI * Interactive terminal * Remote file browser (Yes!) * Open source Not on market yet. But you can built it from the source:

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    2. velj
    Poništi
  6. proslijedio/la je Tweet
    1. velj

    It's not every day that a read-after-write makes a server spend 4% of its CPU cycles in one instruction. Wrote that one up here:

    Poništi
  7. proslijedio/la je Tweet
    2. velj

    Was going through some old papers and found this gem from 1984 comparing the UX design process to loading dishwashers: "There is always room for one more thing. At some point though, everything starts getting a little less clean."

    Poništi
  8. proslijedio/la je Tweet
    31. sij

    "Parallelizing Binary Code Analysis", Meng et al. Parallelizes Dyninst to improve control/data flow analysis + debug information parsing performance. Uses perf analysis to identify expensive code and applies race detectors to guide synchronization.

    Poništi
  9. proslijedio/la je Tweet
    12. pro 2019.

    All 's IDA scripts have (finally) been ported to Ghidra. Woohoo!

    Poništi
  10. proslijedio/la je Tweet
    1. velj

    1\ Malware sandboxes are useful but extremely limited. Here's a malware call graph, and in red are the functions the malware actually *executed* when run in a sandbox -- a miniscule fraction of the malware's potential badness!

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    31. sij

    Want to see how the red team weaponizes threat intel for R&D and TTP development? Check out some research I did with and . Also includes some new executables that can be used for DLL abuse.

    Poništi
  12. proslijedio/la je Tweet
    29. sij

    Here's the bibliography for an automatic exploit generation talk I'm giving tomorrow. If you're looking for a reading list on the topic, this should have almost everything for historical context and state of the art

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    28. sij

    Some things make more sense when one realizes that there are at least 5 distinct security communities: Security product people (people that view security as something that can be added by buying/selling products), Security Infrastructure people (people that view security as ...

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    26. sij

    If you're a grad student interested in security/program analysis and looking for something fun, I would love to see someone revisit the APEG problem (posed by Brumley in ). There's *at least* one entire PhD worth of problems in that area.

    Poništi
  15. proslijedio/la je Tweet

    Around 2012 my colleagues and I worked on Intel ME We were bug hunters We read the code Line by line For months 1 team of many Want to tell me formal methods are too expensive? I've done code reviews I've done FM It's time to talk about it

    Poništi
  16. proslijedio/la je Tweet
    24. sij

    open question for compiler people: what should be taught in a modern undergrad compiler class? I'm revamping / modernizing Utah's version of this and would appreciate feedback

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    24. sij

    Mobius Strip Reverse Engineering is announcing public sessions for its Static Reverse Engineering and SMT-Based Binary Program Analysis training classes in May 2020 in Manassas, VA. More details can be found on our website:

    Poništi
  18. proslijedio/la je Tweet

    Still blown away by this talk Check the thread for highlights It’d be a GREAT time for a Formal Methods Fast Track!! Let’s disrupt the status-quo of perpetual computer insecurity!

    Poništi
  19. proslijedio/la je Tweet
    18. sij

    I'm putting together a list of resources for learning about PE file format and Windows Loader, can you recommend me the best resources to add to this guide?

    Poništi
  20. proslijedio/la je Tweet
    18. sij

    In academia, if supply correct code, you have gone 1/3rd of the way. You now need to: 1) Make the code readable so others can verify it's correct 2) Make the code extensible so others can build on your work I'm *really* tired of "academia-quality" code meaning it's utter shit.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·