Alex Rebert

@ayper

Computer Security Researcher. Co-Founder of ForAllSecure

Pittsburgh
Vrijeme pridruživanja: kolovoz 2008.

Tweetovi

Blokirali ste korisnika/cu @ayper

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ayper

  1. proslijedio/la je Tweet
    3. pro 2019.

    Join software security experts and industry leaders on Feb 25th for 2020, a education and community building event. Follow the link here for more info:

    Poništi
  2. proslijedio/la je Tweet
    3. lis 2019.
    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    21. ruj 2019.

    Chrome enables PageHeap like code for a small number of allocations. Probably to find bugs is low, but since there are 1B chrome users -> bugs are bounds to be found. It's Fuzzing in production

    Poništi
  4. proslijedio/la je Tweet
    18. ruj 2019.

    I’m thrilled for this next step now is part of . I’m excited to continue our journey in helping developers embed/inherit security, scale through them and the OSS community. More news to come soon about my role and how to support this mission.

    Poništi
  5. proslijedio/la je Tweet
    16. ruj 2019.

    "We have extended Google’s Address Sanitizer to add it to the C++ compilers for Windows, enhanced the open source runtimes to make Address Sanitizer work for a wide variety of Windows applications, and topped it off with Azure-powered fuzzing controlled directly in the VS IDE"

    Poništi
  6. proslijedio/la je Tweet
    12. ruj 2019.

    intern, Zion Basque, reveals how he and his fellow intern discovered a crucial vulnerability in DIAL software. Read on to find out more via

    Poništi
  7. proslijedio/la je Tweet
    19. kol 2019.

    new blog post: Write Fuzzable Code in which I express a lack of sympathy for anti-fuzzing measures

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    8. kol 2019.

    ... and one more thing: Apple is opening up their bug bounty to all researchers, more products (including macOS), 50% bonus for pre-release software, and *research fused* devices with debug capabilities (!!!!) Great stuff from Apple and

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    25. srp 2019.

    “phasing out legacy memory unsafe codebases is not a luxury, it’s a necessity.”

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    21. srp 2019.

    I wrote a blog post about how fuzz testing is making memory unsafe languages untenable

    Poništi
  11. proslijedio/la je Tweet
    18. lip 2019.

    The commerical SAST/DAST offerings lack much vision or tech development. The leading DAST (fuzzing) product is still Defensics which is built on tech from 2004. You still pay ~$5k per protocol for a couple thousand (at best) pre-generated packets derived from BNF grammars in RFC

    Poništi
  12. proslijedio/la je Tweet
    2. svi 2019.

    Binary ninja coverage plugin we use just released.

    Poništi
  13. proslijedio/la je Tweet
    27. ožu 2019.

    co-founder answered your questions on what it takes to make software secure. Learn more in the article here:

    Poništi
  14. proslijedio/la je Tweet

    UPDATE: 's (Computer Security Researcher and Co-Founder of ForAllSecure) session has been rescheduled for next Thursday, March 21, but is still open for questions now!

    Poništi
  15. proslijedio/la je Tweet

    ., Computer Security Researcher. Co-Founder of ForAllSecure, is hosting a session this Monday at 10 AM PT. Ask your questions now!

    Poništi
  16. proslijedio/la je Tweet
    6. ožu 2019.

    . is hosting a panel on Startups. My co-founder and CGC captain will be there. also attending. If you are interested in PA startups, great opportunity.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·