Liang Chen

@chenliang0817

Mobile Pwn2Own 2013 iOS winner; Pwn2Own 2014 Mavericks winner

라진항역
Vrijeme pridruživanja: siječanj 2013.

Tweetovi

Blokirali ste korisnika/cu @chenliang0817

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @chenliang0817

  1. proslijedio/la je Tweet
    28. pro 2019.

    🙏 We also have the utmost respect for all our engineering friends and counterparts working at Apple.

    Poništi
  2. proslijedio/la je Tweet
    6. stu 2019.

    is giving his talk, “Exploiting IOSurface 0".

    Poništi
  3. proslijedio/la je Tweet

    Good morning sunshines! Awesome start from Liang Chen()! Already packed with people early in the morning Lets get it started!

    Poništi
  4. proslijedio/la je Tweet
    8. stu 2019.
    Poništi
  5. proslijedio/la je Tweet
    4. ruj 2019.

    My last week in KeenLab. Thanks for all friends. Thank and for bringing me here.

    Poništi
  6. proslijedio/la je Tweet
    9. kol 2019.

    Very excited to see used as one of the Defcon CTF challenges ❤️

    Poništi
  7. proslijedio/la je Tweet
    7. kol 2019.

    Feel lucky and super excited to be #1 on this year’s MSRC most valuable security researcher list. Thanks to and congrats to all guys on the list from Vulcan Team. Thanks to all MSRC guys for their kindly help!

    Poništi
  8. proslijedio/la je Tweet
    6. kol 2019.

    Hello everyone, long time no see! Now begins a series of blog posts about bugs I found and reported of various Android vendors. This very first one is about the exploit chain we used to get remote arbitrary application install on Galaxy S8. Plz enjoy:

    Poništi
  9. proslijedio/la je Tweet
    2. kol 2019.

    Apple knows its bug bounty was a failure.Instead of fixing,they plan to double down on exclusivity and give certain members special hw. Why not just give virtual devices to ALL developers & help arm them with the tools & knowledge to improve platform & app security?

    Poništi
  10. proslijedio/la je Tweet
    13. lip 2019.

    VM escape exploit for CVE-2019-6778 in QEMU. I'm too lazy to write an English version writeup, sorry for the inconvenience😅

    Prikaži ovu nit
    Poništi
  11. 17. svi 2019.

    All good things come to an end. Last week of my career. Time flies, but good memories are eternal: moment of brought me into the area, founding keenteam,first Pwn2Own at Tokyo; extremely nervous at BlackHat as speaker in 2014,3 master of pwn, iOS Jailbreak, etc

    Poništi
  12. proslijedio/la je Tweet
    13. svi 2019.
    Poništi
  13. proslijedio/la je Tweet
    4. svi 2019.

    Slides for me and talk at 2019. 2PAC 2Furious: Envisioning an iOS compromise in 2019

    Poništi
  14. 3. svi 2019.

    Thanks and for inviting me to talk about iOS with ,at beautiful Miami beach. Had a nice time with ,their iOS emulator is really awesome.Attached the iOS 12.2 demo video yesterday.

    Poništi
  15. proslijedio/la je Tweet
    2. svi 2019.

    Envisioning an iOS compromise in 2019 by and

    Poništi
  16. proslijedio/la je Tweet
    16. tra 2019.

    Speaker Highlight: Marco Grassi () & Liang Chen () will be presenting ‘2PAC 2Furious: Envisioning a iOS compromise in 2019.

    Poništi
  17. proslijedio/la je Tweet

    Thanks everyone for making another successful event We sincerely appreciate your great effort put on our Zer0Con conference It is indeed our pleasure to express gratitude to all of you participated in Zer0Con. Hope you had incredible time with us! See you again next year!

    Prikaži ovu nit
    Poništi
  18. 10. tra 2019.
    Poništi
  19. proslijedio/la je Tweet
    5. tra 2019.

    Some experiment yesterday of identifying filetypes by visualizing them first turning them into a PNG then feeding them to a Convolutional Neural Network (resnet)

    Poništi
  20. proslijedio/la je Tweet
    30. ožu 2019.

    Before I did security&reversing I was very interested in demoscene. I sucked at it big time, but this is one of the productions I am really proud of even today: a vector animation in ASCII mode under DOS. This may look crappy now, but you need to understand the context. (1/N)

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·