Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @andremoulu
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @andremoulu
-
Prikvačeni tweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
André Moulu proslijedio/la je Tweet
GDA is a Dalvik bytecode decompiler written in C++. It supports APK, DEX, ODEX and OAT files. Looks really cool, especially if you don't have JEB, but it's not open source yet. https://buff.ly/2Gfmqc8
#AndroidSecurity#reversengineeringpic.twitter.com/YNoRaNYI6u
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je Tweet
#Checkm8 and the first comprehensive implementation of the exploit is now available through#UFED in our latest 7.28 version update! Read all about it in our newly published#blog.#digitalintelligence#ontheblog http://bit.ly/3afPo9o pic.twitter.com/W3NslUdrJt
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je Tweet
#UFED and UFED Physical Analyzer 7.28 is now available! Access untapped datasets from iOS devices with checkm8. Plus improved decoding and examination, and first time support for devices running KaiOS. Read the release notes for more information. http://bit.ly/2RiCDlR pic.twitter.com/55WyRglvZ5
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je Tweet
We are actively looking for talk proposals. If you have an interesting new topic around Android security&privacy or a new accessible summary/analysis of previous work please take a look at https://android.ins.jku.at/symposium/call-for-participation/ … and send your proposal to android-symposium@ins.jku.at until Feb 28https://twitter.com/insjku/status/1214918307909918722 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je Tweet
Happy new decade!
#android#security is still a thing, thus we will host the third edition of#AndroidSecuritySymposium in Linz, Austria on July 6-7, 2020 (at@jkulinz, co-located with@acm_wisec) More details and call for speakers: https://android.ins.jku.at/symposium/ pic.twitter.com/TozGDWk1jv
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je Tweet
Wishing you a happy, healthy and prosperous holiday and New Year from our family to yours.pic.twitter.com/VgJEnqyyg0
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je Tweet
Save the date! The 7th annual Qualcomm Product Security Summit will take place May 13 – 15, 2020 in San Diego, CA. CFP: http://secsummit.qualcomm.com/
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je Tweet
Introducing a new public code search tool for Android Open Source Project (AOSP)!
Now you can explore the AOSP codebase locally without having to download the source!
Learn more ↓https://goo.gle/2PaGmCn Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je Tweet
TEE Exploitation by Example: Exploiting Trusted Apps in
@Samsung’s TEE - Eloi Sanfelix (@esanfelix ) - INFILTRATE 2019@InfiltrateCon. Video:https://vimeo.com/335947683Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je Tweet
Congrats to my co-researcher at
@census_labs Aristeidis Thallas (@_athallas) for his accepted talk on enabling vulnerability research for the Samsung RKP hypervisor at@offensive_con#offensivecon20: https://www.offensivecon.org/speakers/2020/aristeidis-thallas.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je Tweet
I'm hiring Android Platform Security Product Managers. Plural. I'm especially interested in candidates with a wide range of backgrounds. 1/8
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je Tweet
Project Zero blog: "Bad Binder: Android In-The-Wild Exploit" by Maddie Stone (
@maddiestone) - https://googleprojectzero.blogspot.com/2019/11/bad-binder-android-in-wild-exploit.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je Tweet
KNOX Kernel Mitigation Bypasses - New Reliable Android Kernel Root Exploitation Part #2
#MobileSecurity#AndroidSecurity#POC2019 [SLIDES] http://powerofcommunity.net/poc2019/x82.pdf pic.twitter.com/mLnykwWM6b
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je Tweet
Last and FATAL HW exploit on ESP32. Using this, an attacker is now able to decrypt the firmware and install its own (encrypted) malware PERSISTENTLY. No Fix on current ESP32 , vuln is here forever
Enjoy:
https://limitedresults.com/2019/11/pwn-the-esp32-forever-flash-encryption-and-sec-boot-keys-extraction/ …
#FatalFuryonESP32#ESP32#EspressifSystemspic.twitter.com/wkZm8aGF3l
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je Tweet
I've published a write-up on the Android Binder use-after-free kernel bug that p0 discovered recently affected the Pixel 2 and Galaxy S7/S8/S9. It goes into technical details of how an arbitrary read/write is established :)https://dayzerosec.com/posts/analyzing-androids-cve-2019-2215-dev-binder-uaf/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je Tweet
https://blog.flanker017.me/text-to-speech-speaks-pwned/ … Text-To-Speech speaks pwned: writeup for CVE-2019-16253, how a benign TTS language pack lead to system shell.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je Tweet
Co-authored my first
@USENIXSecurity paper, with the amazing folks at@Samsung_RA! Fuzzing one of the most unfuzzable environments, via full-system emulation, reveals 48 vulnerable "Trusted Applications" across four TEEs that run on ~2 billion devices. http://rohan.padhye.org/files/partemu-usenixsec20.pdf …pic.twitter.com/AiXaMbEaPe
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
André Moulu proslijedio/la je Tweet
Want to win Pwn2Own without all the hassle of having to spend time finding bugs? We finally got round to sorting out and releasing Jandroid - a tool for helping to find logic bugs in Android apps (and just in time for next week!) https://labs.f-secure.com/blog/automating-pwn2own-with-jandroid …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
André Moulu proslijedio/la je Tweet
Google Online Security Blog: Protecting against code reuse in the Linux kernel with Shadow Call Stack https://security.googleblog.com/2019/10/protecting-against-code-reuse-in-linux_30.html … via
@googleHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.