Tuấn Linh

@Tuan_Linh_98

I swear that I don't have a gun

Vrijeme pridruživanja: kolovoz 2015.
Rođen/a 27. prosinca 1998.

Tweetovi

Blokirali ste korisnika/cu @Tuan_Linh_98

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Tuan_Linh_98

  1. proslijedio/la je Tweet
    26. sij

    If you're a grad student interested in security/program analysis and looking for something fun, I would love to see someone revisit the APEG problem (posed by Brumley in ). There's *at least* one entire PhD worth of problems in that area.

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    1\ Malware sandboxes are useful but extremely limited. Here's a malware call graph, and in red are the functions the malware actually *executed* when run in a sandbox -- a miniscule fraction of the malware's potential badness!

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    13. sij
    Poništi
  4. proslijedio/la je Tweet
    28. sij

    We may be motivated by and think about things Geometrically but turning to Linear Algebra can be a much more rewarding way of doing the calculations. James Maynard on the value of in last week's 1st Year Student Lecture.

    Poništi
  5. proslijedio/la je Tweet
    27. sij

    'Much of modern takes complication and approximates by some linear system.' James Maynard sets out the parameters of his 2nd Year Student Lecture on Linear Algebra. Our latest filmed undergraduate lecture showcasing life in &

    Poništi
  6. proslijedio/la je Tweet
    27. sij

    Interested in learning Windows Kernel exploitation ? wrote 3 challenges to help you write your first Windows Kernel shellcodes ! You can already try the first one, or all of them if you're a premium member.

    Poništi
  7. proslijedio/la je Tweet
    24. sij

    Mobius Strip Reverse Engineering is announcing public sessions for its Static Reverse Engineering and SMT-Based Binary Program Analysis training classes in May 2020 in Manassas, VA. More details can be found on our website:

    Poništi
  8. 24. sij

    Happy Chinese/Korean/Vietnamese New Year everyone. If I did or said any stupid things during 2019, please forgive me...you know I don't mean it 🤟 Wish everyone a new good year, finding more 0day, publishing more innovative papers, pursuing your PhD/MSc... (。-ω-)>🍵 (・ิᗜ ・ิ@)

    Poništi
  9. 23. sij

    I have so much free time during the Lunar New Year holiday so I just combined some notes and thoughts during reading this paper to a blog post.The purpose of the post is to convince you this paper is good and you should read it, hope you have a good read ☕️

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    22. sij

    Work by , , myself on using graphical icons in PE binaries to do "social network analysis" on malware samples based on the visual similarities of their .rsrc section assets --

    Poništi
  11. proslijedio/la je Tweet
    4. svi 2019.

    I'd like mathematicians and math educators to formulate puzzles in ways that don't trivialize or operationalize the dehumanizing violence of the carceral system.

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    20. sij

    From a paper from awhile back on visualizing clusters of malware behavioural traces in large malware datasets. Malware samples shown on the rows, behavior shown in colored bands. We use a static analysis version of this / .

    Poništi
  13. proslijedio/la je Tweet
    Poništi
  14. proslijedio/la je Tweet
    10. sij

    Millions of dollars are spent on fuzzing, red teaming, exploit mitigations, and bounties. Nevertheless, based on the (limited) public record, the majority of 0days seen in 2019 can be blamed on memory unsafe languages. Make 2020 the year you start abandoning C and C++.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    11. sij

    Insomni'hack 2020 is approaching. Register now for a 3-days hands-on training on IoT vulnerability research with

    Poništi
  16. proslijedio/la je Tweet
    9. sij

    I'm very excited to share my blogpost series (including PoC code) about a remote, interactionless iPhone exploit over iMessage:

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    9. sij
    Poništi
  18. proslijedio/la je Tweet
    8. sij

    However, so far this is only a very special kind of a scheme, called an "affine scheme". A general scheme is built by gluing together affine schemes. Example: the Riemann sphere is built from 2 complex planes: one missing the point at infinity, and one missing 0. (3/n)

    Prikaži ovu nit
    Poništi
  19. 8. sij

    I guess you "must" go to uni to continue/begin your research. Research on your own is like 10 times frustrated

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·