Tweetovi

Blokirali ste korisnika/cu @bdcht

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @bdcht

  1. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi
  2. 4. sij

    I've just released ccrawl (). Its a -based tool that allows to collect and query various properties of C/C++ data structures, and to translate them for example to ctypes (including on C++ class instances.)

    Poništi
  3. proslijedio/la je Tweet

    live stream of his talk on fault injection attacks against TrustZone M chips.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    16. pro 2019.

    My PhD thesis "Software-based Side-Channel Attacks and Defenses in Restricted Environments" is finally available online: I really enjoyed my last 3 years working on it, also due to my great colleagues, especially , , and

    Poništi
  5. proslijedio/la je Tweet
    15. pro 2019.

    In an effort to better understand development myself, I've written a brief overview of Verilog and simulation with Verilator. Hopefully others may find it useful.

    Poništi
  6. proslijedio/la je Tweet
    12. pro 2019.
    Poništi
  7. proslijedio/la je Tweet
    4. pro 2019.

    Our new paper, Deep Learning for Symbolic Mathematics, is now on arXiv We added *a lot* of new results compared to the original submission. With (1/7)

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    28. stu 2019.

    If you’re into firmware exploitation the blog posts by are a goldmine:

    Poništi
  9. proslijedio/la je Tweet
    25. stu 2019.

    Announcing Haybale, a symbolic execution engine for LLVM IR written in . Haybale can analyze programs written in C/C++, Rust, or any other language which compiles to LLVM IR. Working on this has been great fun, and I'm excited to release 0.1.0!

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    25. stu 2019.

    What? A library that wraps IDA decompiler API and makes it usable? *and* documented? We just released a thing. Blog: Github: Docs!!!:

    Poništi
  11. proslijedio/la je Tweet
    21. stu 2019.

    This feels like a real breakthrough: Take the same basic algorithm as AlphaZero, but now *learning* its own simulator. Beautiful, elegant approach to model-based RL. ... AND ALSO STATE OF THE ART RESULTS! Well done to the team at

    Poništi
  12. proslijedio/la je Tweet
    22. stu 2019.

    Does homomorphic encryption hide the algorithm itself?

    Poništi
  13. proslijedio/la je Tweet
    20. stu 2019.
    Poništi
  14. proslijedio/la je Tweet
    8. stu 2019.

    AngeBounty: make the badge compute MD5 FastColl. Please RT 🙏

    Poništi
  15. proslijedio/la je Tweet
    7. stu 2019.

    It's finally out! Crafting an EFI Emulator and Interactive Debugger -> . Enjoy :-)

    Poništi
  16. proslijedio/la je Tweet
    1. stu 2019.

    It turns out that BouncyCastle implements Ed25519 with code designed from the ground up to be constant-time, and has been making some progress in removing variable-time code elsewhere. Added a note about this to (inside "Case study #9"). H/T Peter Dettman.

    Poništi
  17. proslijedio/la je Tweet
    20. lis 2019.

    This is pretty cool: Compiling a CPU, in a cheap FPGA board

    Poništi
  18. proslijedio/la je Tweet
    19. lis 2019.

    A reminder that I have a series of blog posts on Linux heap exploitation at

    Poništi
  19. 19. lis 2019.
    Poništi
  20. proslijedio/la je Tweet
    12. lis 2019.

    Hacking the PS2 with Yabasic:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·