André Moulu

@andremoulu

Android security researcher at , member of Obviously tweets are my own.

France, Paris/Rouen
Vrijeme pridruživanja: travanj 2010.

Tweetovi

Blokirali ste korisnika/cu @andremoulu

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @andremoulu

  1. Prikvačeni tweet
    12. kol 2016.
    Poništi
  2. proslijedio/la je Tweet
    25. sij

    GDA is a Dalvik bytecode decompiler written in C++. It supports APK, DEX, ODEX and OAT files. Looks really cool, especially if you don't have JEB, but it's not open source yet.

    Poništi
  3. proslijedio/la je Tweet
    15. sij

    and the first comprehensive implementation of the exploit is now available through in our latest 7.28 version update! Read all about it in our newly published .

    Poništi
  4. proslijedio/la je Tweet
    15. sij

    and UFED Physical Analyzer 7.28 is now available! Access untapped datasets from iOS devices with checkm8. Plus improved decoding and examination, and first time support for devices running KaiOS. Read the release notes for more information.

    Poništi
  5. proslijedio/la je Tweet
    13. sij

    We are actively looking for talk proposals. If you have an interesting new topic around Android security&privacy or a new accessible summary/analysis of previous work please take a look at and send your proposal to android-symposium@ins.jku.at until Feb 28

    Poništi
  6. proslijedio/la je Tweet
    8. sij

    Happy new decade! is still a thing, thus we will host the third edition of in Linz, Austria on July 6-7, 2020 (at , co-located with ) More details and call for speakers:

    Poništi
  7. proslijedio/la je Tweet
    24. pro 2019.

    Wishing you a happy, healthy and prosperous holiday and New Year from our family to yours.

    Poništi
  8. proslijedio/la je Tweet
    19. pro 2019.

    Save the date! The 7th annual Qualcomm Product Security Summit will take place May 13 – 15, 2020 in San Diego, CA. CFP:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    🗣 Introducing a new public code search tool for Android Open Source Project (AOSP)! Now you can explore the AOSP codebase locally without having to download the source! Learn more ↓

    Poništi
  10. proslijedio/la je Tweet
    9. pro 2019.

    TEE Exploitation by Example: Exploiting Trusted Apps in ’s TEE - Eloi Sanfelix ( ) - INFILTRATE 2019 . Video:

    Poništi
  11. proslijedio/la je Tweet
    9. pro 2019.

    Congrats to my co-researcher at Aristeidis Thallas () for his accepted talk on enabling vulnerability research for the Samsung RKP hypervisor at :

    Poništi
  12. proslijedio/la je Tweet

    I'm hiring Android Platform Security Product Managers. Plural. I'm especially interested in candidates with a wide range of backgrounds. 1/8

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    21. stu 2019.

    Project Zero blog: "Bad Binder: Android In-The-Wild Exploit" by Maddie Stone () - 

    Poništi
  14. proslijedio/la je Tweet
    20. stu 2019.

    KNOX Kernel Mitigation Bypasses - New Reliable Android Kernel Root Exploitation Part #2 [SLIDES]

    Poništi
  15. proslijedio/la je Tweet
    13. stu 2019.

    Last and FATAL HW exploit on ESP32. Using this, an attacker is now able to decrypt the firmware and install its own (encrypted) malware PERSISTENTLY. No Fix on current ESP32 , vuln is here forever 😮 Enjoy:

    Poništi
  16. proslijedio/la je Tweet
    9. stu 2019.

    I've published a write-up on the Android Binder use-after-free kernel bug that p0 discovered recently affected the Pixel 2 and Galaxy S7/S8/S9. It goes into technical details of how an arbitrary read/write is established :)

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    6. stu 2019.

    Text-To-Speech speaks pwned: writeup for CVE-2019-16253, how a benign TTS language pack lead to system shell.

    Poništi
  18. proslijedio/la je Tweet
    4. stu 2019.

    Co-authored my first paper, with the amazing folks at ! Fuzzing one of the most unfuzzable environments, via full-system emulation, reveals 48 vulnerable "Trusted Applications" across four TEEs that run on ~2 billion devices.

    Poništi
  19. proslijedio/la je Tweet
    1. stu 2019.

    At , Xpl017Elz will give the second round of “New Reliable Android Kernel Root Exploitation”(first round at POC2016). He will talk about bypassing attack against KASLR, PXN, RKP, JOPP, EPV, etc. If you are interested in making a fullchain in Android, come to .

    Poništi
  20. proslijedio/la je Tweet
    1. stu 2019.

    Want to win Pwn2Own without all the hassle of having to spend time finding bugs? We finally got round to sorting out and releasing Jandroid - a tool for helping to find logic bugs in Android apps (and just in time for next week!)

    Poništi
  21. proslijedio/la je Tweet
    30. lis 2019.

    Google Online Security Blog: Protecting against code reuse in the Linux kernel with Shadow Call Stack via

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·