Dmitry Vyukov

@dvyukov

I tweet about fuzzing, bugs, sanitizers, security, hardening, kernels, Go, performance, concurrency, lock-free algorithms.

Vrijeme pridruživanja: travanj 2009.

Medijski sadržaj

  1. 21. sij
    Odgovor korisniku/ci

    Not sure what's the definitive source. If you understand Russian, I gave 2 talks about fuzzing, one with Go flavor: and another with C++ flavor:

  2. 17. sij

    The magical fantasy land of Linux kernel testing by at Great overview of the kernel testing 2 corrections re syzbot: 1. there are no false positives, don't pick and choose, _every_ report is something to fix somewhere

    Prikaži ovu nit
  3. 6. pro 2019.

    LKL paper starts with: The Linux kernel is a repository of high-quality, extensively reviewed and tested code. Tell me more!

  4. 27. stu 2019.
    Prikaži ovu nit
  5. 27. stu 2019.

    Also my talk on GWP-ASAN: (detect the worst bugs in production) my update on syzbot: talk on KMSAN and "initialize all the memory!": 1/n ...

    Prikaži ovu nit
  6. 27. stu 2019.

    Linux Plumbers/Kernel Summit videos are up. What I found interesting: Efficient Userspace Optimistic Spinning Locks: Malloc for everyone and beyond NUMA: pidfds: Process file descriptors on Linux: 1/n ...

    Prikaži ovu nit
  7. 23. stu 2019.

    Is there a neural net that can auto-generate logos for security bugs already?

  8. 19. stu 2019.

    Video of my Reflections on kernel quality, dev process and testing talk: Re deep problems with testing, quality, security, process and dev experience in . The talk triggered some activity: But...

    Prikaži ovu nit
  9. 8. stu 2019.

    Dealing with Uninitialized Memory in the Kernel by our very own Exploiting uninitialized memory, KMSAN, auto-initializing all the things (stack/heap). 3/3

    Prikaži ovu nit
  10. 8. stu 2019.

    Exploiting Race Conditions Using the Scheduler by from P0 Detailed explanation of 3 exploits and associated techniques involving scheduler, preemption, stale TLB, fuse, userfaultfd and more to make hard to trigger races deterministic. 2/3

    Prikaži ovu nit
  11. 8. stu 2019.

    What I found interesting 1/3: Deep Analysis of Exploitable Linux Kernel Vulnerabilities 2017-2019 With some overview and deep dive into several real exploits. Including , SMAP, exploiting races. 1/3

    Prikaži ovu nit
  12. 31. lis 2019.

    Oh tech talks on About tracing vs security

  13. 28. lis 2019.

    Some of the finer userspace and kernel features: no distro hell, the TCP/IP stack. on

  14. 28. lis 2019.

    presenting about on FreeBSD development team structure. No perpetual "gods", core team members reelected by community every year.

  15. 28. lis 2019.

    presents about new SECCOMP mode that allows to intercept syscalls and emulate them in userspace: I am pushing new syzkaller descriptions during the talk:

  16. 28. lis 2019.

    "If you are not using... a stable / longterm kernel, you have an insecure system" on Go and update!

  17. 28. lis 2019.

    KernelCI joins ! and on stage. Consolidated kernel testing for the win!

  18. 9. lis 2019.

    "Setting up secure communication channel" part is hilarious: Breaking corp mail servers (as they receive encrypted emails for the first time ever), different people receiving different partially-intersecting subset of emails, etc.

  19. 1. lis 2019.

    Fun:on social made paper boat(following plane), donates pen,I collect ,,,,,,,tglx signatures. Next day it sold for 170€ for thx to pitch

    Prikaži ovu nit
  20. 27. ruj 2019.

    Change-ID is the new kernel CVE! on

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·