SektorROM

@SektorROM

Software Security | (De-)Obfuscation | Exploitation | Compiler

Vrijeme pridruživanja: prosinac 2015.

Tweetovi

Blokirali ste korisnika/cu @SektorROM

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SektorROM

  1. proslijedio/la je Tweet
    28. sij

    Just put together our recent struggle to solve the type equality problem in LLVM. I would love to hear some feedback from LLVM folks:

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    27. sij

    The ASPLOS camera-ready preprint for Egalito, our binary recompiler, is now available! Appendix A links to a virtual machine with Egalito preinstalled.

    Poništi
  3. proslijedio/la je Tweet
    22. sij

    RUMINT: Ghidra debugger module is in alpha testing; should work out of the box with gdb 8.0.1; more configuration required for Windows

    Poništi
  4. 20. sij

    Workshop on Software Attacks and Defenses SAD 2019 CfP open (February 28th 2020, Conf June 19th) [Merge of SPRO and SPREW conferences] @ Genova, Italy

    Poništi
  5. proslijedio/la je Tweet
    27. pro 2019.

    Soon-ish at ! If anyone wants to meet up, LMK -- reversing, malware, obfuscation, anything.

    Poništi
  6. proslijedio/la je Tweet
    26. pro 2019.

    Need some reading material for the holidays? All papers are published as and they are freely available through the conference website:

    Poništi
  7. proslijedio/la je Tweet
    21. pro 2019.

    This semester I taught a course on programming language semantics and abstract interpretation. All of the slides are freely available in PDF and Keynote here: . I really loved presenting this, and am thankful for the students who worked so hard to learn it

    Poništi
  8. proslijedio/la je Tweet
    16. pro 2019.

    My latest little 1-day project: generating a Z3 SAT model of x86 intrinsics from Intel's documentation. This can help prove SIMD code correct, find lookup table values, etc.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    17. pro 2019.

    New paper "Inferring Input Grammars from Dynamic Control Flow". Given a program, our Mimid prototype automatically infers a human-readable context-free grammar that accurately specifies its input syntax. Great helper for fuzzing and program understanding!

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    15. pro 2019.

    Its amazing that a lot of people still find and reference my Modern Memory Safety training. That was exactly the goal of open sourcing it. If you’re interested in C/C++ vulnerability research you should check it out

    Poništi
  11. proslijedio/la je Tweet
    16. pro 2019.

    My PhD thesis "Software-based Side-Channel Attacks and Defenses in Restricted Environments" is finally available online: I really enjoyed my last 3 years working on it, also due to my great colleagues, especially , , and

    Poništi
  12. proslijedio/la je Tweet
    15. pro 2019.
    Poništi
  13. proslijedio/la je Tweet
    12. pro 2019.

    First blog post in a short series about some vulnerabilities that I found in Ubuntu's crash reporter earlier this year. I learned a lot from working on the exploits, so I am going to share some of the tips and tricks that I learned.

    Poništi
  14. proslijedio/la je Tweet
    11. pro 2019.

    Due to popular demand, we are extending the deadline for the Workshop on Binary Analysis Research (BAR) at NDSS to Sunday, December 22nd (AoE). Get your groundbreaking binary analysis papers submitted!

    Poništi
  15. proslijedio/la je Tweet
    11. pro 2019.

    Understand attack surface of statically linked binaries in Linux and learn how to harden them

    Poništi
  16. proslijedio/la je Tweet
    11. pro 2019.

    My team in Sunnyvale is looking for a Summer 2020 intern to work on fuzzing-related research. The deadline to apply (for any intern position at Google) for Bachelors/Masters is this Friday and for PhD students Feb 7.

    Poništi
  17. proslijedio/la je Tweet
    10. pro 2019.

    You’ve reversed a bunch of structs in a binary and now it’d be nice to access those structs in lldb:

    Poništi
  18. proslijedio/la je Tweet
    10. pro 2019.

    the idea seems to have been introduced by David Whalley in 1994 () and popularized in perhaps this blog post in 2011 ()

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    9. pro 2019.

    The Program Analysis team at Apple is hiring static analysis engineers! Excited about making static analysis more effective and easier to use? Come join us to help build bug-finding tools used by millions of developers!

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    6. pro 2019.

    Lots of cool research and junior professors at UCSC recruiting PL students! (shameless plug: want to build the next generation of ultra-precise high-scale binary analysis tools? Come work with me at Syracuse or at UAB.)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·