Pietro Borrello

@borrello_pietro

PhD Computer Science Engineering student at . Pwner at and . anticlockwise in IRC

Vrijeme pridruživanja: kolovoz 2018.

Tweetovi

Blokirali ste korisnika/cu @borrello_pietro

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @borrello_pietro

  1. 3. velj

    It is always fantastic to bring some micro-architectural magic to our community at ! The talk was *heavily* inspired by the awesome work of Check my slides at:

    Poništi
  2. proslijedio/la je Tweet
    31. sij

    This afternoon don't miss our talks about and the recent work on MDS for CPU instrospection. 👉

    Poništi
  3. proslijedio/la je Tweet
    27. sij

    Next meeting schedule is out! 31 Jan, 5 p.m. - Breaking the walls: CPU introspection through micro-architectural data sampling, by - Breaking apps from the inside: an introduction to the FRIDA binary instrumentation framework, by Radamanth

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    3. sij

    2019 was a pretty good CTF year for us. We played great CTFs both alone and with . We ended 1st in Italy and 35th in the world on (under and over The Flat Network Society). GG to for the 1st place. Good 2020 to all the teams!

    Poništi
  5. 25. pro 2019.

    A attack visualized: a simple bounded loop on an array, speculatively leaks a value adjacent to its end (the 0xcafe peak in the graph) that passes through the load ports we are sniffing!

    Prikaži ovu nit
    Poništi
  6. 25. pro 2019.

    Holy shit this works 😍 I'm trying to reproduce the awesome work of of leaking and sequencing load port traffic to get an insight of CPU internal behavior. Developed a Linux Kernel Module, and this is the difference a mfence instruction does for two independent loads!

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    5. pro 2019.

    So gratefuI I could present BluePill to the crowd. Check it out and analyze evasive malware faster! Slides and code now online

    Poništi
  8. proslijedio/la je Tweet

    Senza parole per la rabbia. Gente che va in televisione a dire che le “app criptate” per i messaggi sono per chi ha qualcosa da nascondere (quindi immagino anche whatsapp che usa la stessa crittografia di signal?), e poi usa come esempio positivo di repressione gli Emirati.

    Prikaži ovu nit
    Poništi
  9. 1. pro 2019.

    Pretty happy with current version of my-bookshelf, a side project to automatically collect papers based on themes of interests, venues and years, to keep them organised and easily searchable: and fork the repo to create your own bookshelf :)

    Poništi
  10. proslijedio/la je Tweet
    29. stu 2019.
    Poništi
  11. proslijedio/la je Tweet
    20. stu 2019.

    Wonderful collection of security related must-read papers by

    Poništi
  12. proslijedio/la je Tweet
    11. stu 2019.

    Yesterday, my laptop was stolen in the "Hippopotamus" steakhouse () in Marseille while eating (!!! not in infamous alley). The owner was not at all cooperative, as if nothing had happened. Avoid that place. And avoid Marseille, the shittiest city in EU.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    9. stu 2019.

    presents BluePill, a dynamic analysis framework that fools a sample into believing it is executing loosely while actually being under the scalpel of an analyst in Briefing. Learn more:

    Poništi
  14. proslijedio/la je Tweet
    8. stu 2019.

    Hey friends, today we got the 2nd place at CTF and the 1st at the CSAW Embedded Security Challenge!

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    6. stu 2019.
    Poništi
  16. proslijedio/la je Tweet
    5. stu 2019.

    Dr. . With some truly amazing numbers, 13 Tier 1 publications. Congrats!

    Poništi
  17. proslijedio/la je Tweet
    28. ruj 2019.

    Am I the only one did the last challenge by cracking KeePass. Thanks and for another great contest 👏👏👏 Cant wait for the awesome medal.

    Poništi
  18. proslijedio/la je Tweet

    Don't miss today! 2 friends of the group that have presented at our meetings in the past ( & Francesco P.) are speakers! Looking forward to meet there! /cc

    Poništi
  19. proslijedio/la je Tweet
    23. ruj 2019.

    Today, we released the new version of our classification tree for transient-execution attacks. Now you can filter for affected vendors, leaking buffer, with or without PoCs, and more. Find the updated version at . Pull requests and feedback welcome.

    Poništi
  20. 18. ruj 2019.

    Finally completed!! 😍 Wonderful journey and full of wft moments. Hoping will also release the source of the challenges for some of the really sharp tricks!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·