Opens profile photo
Follow
Click to Follow bsdaemon
Rodrigo Branco
@bsdaemon
Just an opinionated security researcher. Opinions are my own H2HC (Hackers 2 Hackers Conference)
United Statesgithub.com/rrbrancoJoined September 2009

Rodrigo Branco’s Tweets

Today was my last day going to the office at Intel (I will still be available for my team til the end of the month). Soon I will talk about the next steps! Sad to leave the amazing behind, but excited with the new challenges ahead.
52
305
Today was my last day. Spent the entire day meeting folks and mostly saying good byes (I gave notice a while ago so everything project-related was already properly transferred). While it was an overall sad day, I am super thrilled that I'm starting monday at Google!
41
301
So, after a lot of problems, delays and overall expectation, I've got my green card today! (this time, the actual card is really in my hands, not just approved - for those who do not know: after it got approved, it took many months full of problems to finally receive it).
13
169
It is with mixed feelings that I say that this coming week will be my last one with AWS (after a bit longer than 2 years). I've made real friends, worked on amazing challenges and with outstanding engineers. I start the next week on my new journey!
21
138
We (AWS) are looking for folks interested in low-level software devel positions. Specifically in enabling security features at platform-level (experience with BIOS, TPM, secureboot and related tech is a plus). C/C++/Asm (x86 and/or arm) is a must. Reach out in priv8 to discuss
5
125
I'm a Latino immigrant in the US. I was welcomed and made real friends. I did face discrimination in few occasions and it is incredible how awful it feels (even though I'm very privileged). I stand with *ALL* minorities because the difference makes the whole stronger, not weaker.
1
100
This is officially my last week at Google. I had the opportunity to work with brilliant engineers that really care about improving the state of things. I am sure the team will continue challenging the status quo.
7
92
What a honor! I am really looking forward to the conference.
Quote Tweet
😎Super excited to 🙌Welcome Rodrigo Branco @bsdaemon as our Keynote Speaker 💡Watch out for the title to be out soon➡️bit.ly/3UCENgz #hw_ioUSA2023 #hardwaresecurity #embedded #Conference
Image
3
90
A reminder that the CFP for the 16th Hackers to Hackers Conference ends in 15 days! Send your goodies: we cover the travel, have simultaneous translation, open bar (including juice/soda/water) and are very welcoming to our speakers that lead the show!
78
As was known since spectre but unfortunatelly kept "secret" by corporate culture by both Intel and AMD. It is time for openness. No more hidding knowledge.
Quote Tweet
Today @kavehrazavi and I are finally allowed to talk about #Retbleed. In 2018, #SpectreV2 was fixed by replacing indirect jumps with returns. But, returns can be poisoned like indirect jumps, throwing us us back to 2018 again. Paper, demo, addendum, code @ comsec.ethz.ch/retbleed
Embedded video
GIF
2
70
This is opens the pandora box. I wish Intel was more open on ucode capabilities, threat model and overall implications. It is possible to do that without losing competitive advantage. Just need a management and tech leadership that understands security instead of moving backwards
Quote Tweet
Finally, the casket is opened: we (+@h0t_max and @_Dmit) have extracted Intel x86 microcode! One more Intel "top secret" information gets revealed... github.com/chip-red-pill/
Image
Image
1
70
Our manuscript on cache-related security analysis has just been published. It does touch speculation but covers other classes of cache problems and offers a way to think about the different issues. Took more than 4 years from inception to publication
2
71
Having lead the work on making sure CET implementation itself is secure, I must say it is one of the most complex pure core tech. Touches a lot of different points.
Quote Tweet
#Intel Confirms #CET Security Support For #TigerLake phoronix.com/scan.php?page=
Image
2
67
Trend Micro and partnered for the Capture the Flag. #H2HC2018 will host the Latin America edition of a global competition organized by the Trend. Winner team will compete in Japan (with the whole trip sponsored). Details TBA soon.
1
63
MPX is now deprecated from the linux kernel, gcc and glibc... What lessons Intel should have learned from the failure of that tech? And from the failure of TXT? And even SGX? As an industry, which security tech is really needed from the HW?
18
60
We (AWS) are looking for individuals interested in development of technologies for program analysis (mostly at source code level). PhD or practical (demonstrated) experience in the area required. Interested? Reach out privately and I will gladly connect.
1
57
Sometimes people ask my advice on career. I guess the best I can offer is work with great people. Focus on the team, more than on the company or the problem. Great people inspire the best out of us.
2
60
The is now oficially a non-profit organization, with formal statutes and entity. Besides the conference, open-source projects and research grants are coming soon. Volunteers only, no entity related costs.
Quote Tweet
Durante a #H2HC2022 nos anunciamos que agora somos oficialmente uma ONG! (Ja operavamos como tal mas agora realizamos todos os passos burocraticos para a abertura oficial da entidade). Varias novidades vindo por ai!
1
59
Nitro Enclaves is an interesting approach at trying to simply the problem of code isolation. I personally believe that simplicity and openness are core tenets for a secure technology. Maybe AWS is into something... feedbacks are always welcome:
1
54
Well, Intel had the biggest exodus of top security researchers that I ever saw in my career. And it was not like they all left to open their own company. They literally left their top management. I hope the few that stayed remain strong and manage to revert the damage.
Quote Tweet
New #vulnerability for @intel SGX security technology. The most disturbing aspect is not the vuln itself, but how Intel has responded. Pure denial. As a shareholder and former employee, I am gravely disappointed! Do better. youtu.be/KK2RrBMnSbU #cybersecurity #infosec
54
This is the content that anyone doing anything with Linux must watch. It is time to re-think the security assumptions and how the community is engaged.
Quote Tweet
A recording of today's presentation of "10 Years of Linux Security - A Report Card" is now available to view here: youtu.be/F_Kza6fdkSU PDF: grsecurity.net/10_years_of_li PPT: grsecurity.net/10_years_of_li
10 Years of Linux Security - A Report Card, delivered at the 2020 Linux Security Summit North America on July 2nd, 2020
53
It will be great to come back to Russia and meet this amazing security research community and my many friends in the area!
Quote Tweet
Dear friends, Introducing the keyout for the second day of the conference OFFZONE2019 - Rodrigo Branco @bsdaemon, chief security researcher at #Intel #OFFZONE2019 tickets are still subject to Early Birds discount 😉 offzone.moscow/2019-tickets/
Image
4
53
The Call for Papers is open for the 16th edition of Hackers to Hackers Conference in Brazil, the oldest hacking con in Latin America. Incredible technical committee and content. True community spirit. Many more things than we announce ;) #H2HC2019
1
54
This research is oustanding. It enables a lot of other deep dives in the uarch. I hope it also forces more openness: for example, what are Intel's responses? Implications? Recommendations?
Quote Tweet
Today we're[+@_markel___ and @_Dmit]disclosing the technique allowing to modify #Intel #Microcode on the fly! For the first time you have the ability to intercept control flow at such a low level. We've developed the microcode patch that changes the processor model string as PoC
Embedded video
1:11
2
49
The CPU research team at Google continues at full speed ahead. Great work. Lets see if erratas start getting better analyzed for their security implications.
Quote Tweet
I couldn't understand why AVX registers were randomly going back in time on Ryzen, turns out it's a known CPU errata 😬 lkml.org/lkml/2023/2/22
In all the craziness of the work, noise of the news, etc,I wanted to praise 4 individuals in this whole saga: Jann Horn (for the brilliant insight and awesome work), Ke Sun, Henrique Kawakami (now at Amazon) and Kekai Hu. And finally the rest of our team,that supported us!
1
51
Today I'm thinking that leadership is hard. I have a #1 rule in any team that I work at: No one overworks me. Meaning: I work at least as hard as I ask my team to do. I do not ask them to stop working (motivation is key), but if they continue, so do I. What is yours?
7
51
And to be clear: My criticism to both Intel and AMD PSIRTs is only to their director and above levels. The individual contributors there are a fine bunch and would love to be able to do the right things but their management wont let them.
The video for the talk is available. I hope folks enjoy and feel free to send me feedback, comments, criticisms (privately or publicly, either way is welcome!)
Quote Tweet
🔼Keynote talk upload! 🖥️Hear out interesting lesser known µarch & hardware security stories by our Keynote speaker Rodrigo Branco @bsdaemon from his rich experience 📽️Click to watch▶️youtu.be/WlcQrx7VK00 #hw_ioUSA2023 #hardwaresecurity #Conference #microarchitecture
5
48
Sometimes I feel that real-life has the same classes of vulnerabilities as computers: Agenda Overflow, Meeting of by a Few, Resources Race Condition and Resource Allocation Use After Free. I guess I should have finished my fun paper on brain overflow after all.
2
44
ow!! Having one of the researchers that you really admire and get inspiration from saying something like that was the best birthday gift I could receive!! thank you man!!
Quote Tweet
Happy birthday to my awesome friend and even awesomer InfoSec thought leader and kickass exploit and platform security guru, @bsdaemon. The kindest and humblest person in this industry that I can think of. I try to be more like you every day.
1
47
Many found by our team(s)... Ramping up security in many fronts #SecurityFirst
Quote Tweet
#Intel issued 34 fixes for various #vulnerabilities – with seven of those ranking high-severity, 21 ranking medium-severity and five ranking low-severity, in addition to the critical flaw. threatpost.com/intel-fixes-cr
2
41
The world seems to be in this path of denying reality. I just heard from a vendor: "We don't know if it is possible, for now it is only a theory". When I know as a fact that the vendor has an actual exploit (not just a PoC, an exploit against a real system, leaking real data)
3
39
This! Trying to control the knowledge flow does not benefit the defending side in the long run. It is a very weak and easy to fight off argument, but unfortunately it is one made by many against few (noise ratio and engagement make the argument grow, similar to fake news).
Quote Tweet
Replying to @timb_machine @thegrugq and @tiraniddo
Let me ask you this, where would you be today if we had restricted access to offensive tools and information? I know I'm here because of the exploits, advisories, papers etc people published in the 90s. We can't cut off that pipeline, it will not increase defender count.
1
41
15th edition of H2HC Magazine, this edition with one article translated to English (about a FreeBSD Kernel bug and how to exploit it)
Quote Tweet
15a Edicao da H2HC Magazine lancada!! 70+ paginas de conteudo tecnico exclusivo: bit.ly/h2hcmagazine15 ( excelente trabalho de nosso editor, @gabrielnb ) #H2HC2021 #H2HConference #H2HCMagazine @h2hconference
36
Another academic paper with excellent writing feedback, terrifying technical responses. Declined because implementing an exploit as proof is 'not as important as proposing a mitigation'. But how to convince anyone to invest in mitigating something that no one agrees is a problem?
3
41