echo

@echusio

somewhere in time
Vrijeme pridruživanja: srpanj 2015.

Tweetovi

Blokirali ste korisnika/cu @echusio

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @echusio

  1. proslijedio/la je Tweet
    19. srp 2019.

    Interested in memory safety exploits & mitigations? Here's a new research paper that explores an ISA extension which tries to make it more difficult to corrupt pointers. All feedback on the security efficacy and overall design is appreciated :)

    Poništi
  2. proslijedio/la je Tweet
    18. lip 2019.

    Just uploaded on my slides for my talk on exploiting chrome by attacking TurboFan. Thanks for the opportunity to present :-)

    Poništi
  3. proslijedio/la je Tweet
    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    24. svi 2019.

    Here is the slides of the talk on ZeroCon 2019 (DOM fuzzing part) by me and Soyeon Park (). I will open source my WebGL fuzzer when having time.

    Poništi
  5. proslijedio/la je Tweet
    7. svi 2019.

    Also here are the slides from my talk about these exploit primitives with some more examples:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    7. svi 2019.
    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    16. svi 2019.

    New blog post written together with my friend about using the JIT to abuse a non-JIT bug in Chakra (CVE-2019-0812)

    Poništi
  8. proslijedio/la je Tweet
    16. tra 2019.
    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    29. ožu 2019.

    The slides about our () topic can download now! enjoy it! if you have any question, please contact us!

    Poništi
  10. proslijedio/la je Tweet
    20. ožu 2019.

    Fuzzilli, my JavaScript engine fuzzer, is now open source: \o/ Keep an eye on the Project Zero bugtracker in the next few weeks for some of the bugs found with it. Also let me know if you encounter any problems when using it! :)

    Poništi
  11. 8. ožu 2019.

    Moja koszulka do spania właśnie do mnie jedzie hyhyhy 😁

    Poništi
  12. 1. ožu 2019.
    Poništi
  13. proslijedio/la je Tweet
    20. stu 2018.

    Merry Thanksgiving everyone! I've decided to release my Chrome IPC slides early. I'll have some new content for 35c3 that's way more beginner friendly, but until then feel free to DM/comment questions. Thanks to for organizing <3

    Poništi
  14. proslijedio/la je Tweet
    13. stu 2018.
    Poništi
  15. proslijedio/la je Tweet
    4. lis 2018.

    You might not be able to place a hardware implant into Apple's datacenter, but you can still run my open-source DOM fuzzer and own Safari :-)

    Poništi
  16. 28. kol 2018.

    Hacker Discloses Unpatched Windows Zero-Day Vulnerability (With PoC) przez

    Poništi
  17. proslijedio/la je Tweet
    9. kol 2018.

    Here are the slides from my talk about just-in-time compilers for JavaScript and the bug I used as part of my Pwn2Own chain this year =)

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    3. tra 2018.

    “Shellcodes are for the 99%” , Bing has released the slides for talk, be sure to check it out, it’s cool!

    Poništi
  19. proslijedio/la je Tweet
    28. velj 2018.

    Here are my presentation slides ("From Assembly to Javascript and back"). Code will be released soon!

    Poništi
  20. proslijedio/la je Tweet
    28. pro 2017.

    My colleague Bing Sun has released his slide decks for presos "The Battle For Protected Memory - Attack Read-only Memory Using Advanced Data-only Attack Technique" (2 parts, EN & CN), lots of cutting-edge tech shared! .

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·