jiayy

@chengjia4574

Security Researcher at 360 icesword lab

Vrijeme pridruživanja: svibanj 2015.

Tweetovi

Blokirali ste korisnika/cu @chengjia4574

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @chengjia4574

  1. 25. pro 2019.

    I just ported exploit of Jann Horn's vuln CVE-2019-13272 to aarch64:

    Poništi
  2. 28. stu 2019.

    it is an amazing vuln and I got an idea when I learn your vuln that maybe the name 'ptracer_cred' can be changed to be sth like ' ptracelinkcreater_cred', when link is created by PTRACE_ATTACH,it == tracer's cred, when link created by PTRACE_TRACEME, it == tracee's cred

    Poništi
  3. 4. stu 2019.

    Nov android bulletin, got one critical

    Poništi
  4. proslijedio/la je Tweet
    3. ruj 2019.

    When QBDI meets on Android AArch64 :)

    Poništi
  5. 9. lis 2019.

    october bulletin (android/qualcomm)

    Poništi
  6. proslijedio/la je Tweet
    8. kol 2019.
    Poništi
  7. proslijedio/la je Tweet
    7. kol 2019.

    Project Zero blog: "The Fully Remote Attack Surface of the iPhone" by Natalie Silvanovich () -

    Poništi
  8. proslijedio/la je Tweet
    30. srp 2019.

    Two Google Project Zero researchers have just dumped details about five (of six) exploits for "interactionless" iOS attacks. The bugs are worth collectively between $5 million and $10 million -- if they would have been sold on the exploit black market.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    23. srp 2019.

    PoC for Android CVE-2019-2107 RCE - the payload can be executed by simply watching a video

    Poništi
  10. proslijedio/la je Tweet
    13. lip 2019.

    VM escape exploit for CVE-2019-6778 in QEMU. I'm too lazy to write an English version writeup, sorry for the inconvenience😅

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    17. svi 2019.

    Google on Android: “Use-after-free (UAF), integer overflows, and out of bounds (OOB) reads/writes comprise 90% of vulnerabilities with OOB being the most common.”

    Poništi
  12. proslijedio/la je Tweet
    12. ožu 2019.

    Linux kernel v5.0 was released last week! I'm excited about arm64's read-only linear mapping, per-task stack canaries for arm and arm64, top-byte-ignore on arm64, the ongoing marking of implicit-fallthroughs, and the continuing conversions to refcount_t

    Poništi
  13. proslijedio/la je Tweet

    Taking control of through UHCI. In part 1 of his analysis, looks at the bug used by during the last

    Poništi
  14. proslijedio/la je Tweet
    5. svi 2019.
    Poništi
  15. 24. ožu 2019.
    Poništi
  16. proslijedio/la je Tweet

    Among the Top 5 researchers of Technologies' Vulnerability Rewards Program , two are from 360 IceSword Lab. Congrats! Hard work pays off!

    Poništi
  17. 17. sij 2019.
    Poništi
  18. 2. sij 2019.
    Poništi
  19. proslijedio/la je Tweet
    2. sij 2019.
    Poništi
  20. proslijedio/la je Tweet
    26. pro 2018.

    A security-heavy Xmas gift in mainline: .3 pointer authentication in userspace, per-thread stack canaries in the kernel, removal of writable aliases of executable mappings by default & base support for secure boot w/ kexec. @kriiku

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·