Michael Rodler

@f0rki

software systems security research/phd ; I like low-level stuff, compilers etc. and also going fast on *board; in a previous life ctf w/ ;

Vrijeme pridruživanja: prosinac 2011.

Tweetovi

Blokirali ste korisnika/cu @f0rki

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @f0rki

  1. proslijedio/la je Tweet
    2. velj

    Our Sun is being stolen ...

    Poništi
  2. proslijedio/la je Tweet
    prije 8 sati

    Many funders have understood that grant reviewing wastes time & money, given the low inter-rater reliability among reviewers for anything but the lowest ~30% of applications. Solution: lotteries. What is the support for lotteries, & are results accepted by the community? ⬇️

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    Oder wie der etwas Ehrlichere sagt: Unser Feind ist der Jude.

    Poništi
  4. proslijedio/la je Tweet
    1. velj

    Attention CTF players (and organizers, CTFd v2.0.0 - v2.2.2 has a serious vulnerability (CVE-2020-7245) in which an attacker could perform account takeover using a leading-trailing on the Registration form. It has been fixed in v2.2.3. Make sure to update!

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    1. velj

    Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).

    Poništi
  6. proslijedio/la je Tweet
    30. sij

    Am 5.2 um 18Uhr veranstalten wir beim training ein r2wars Turnier☺️ schaut vorbei und kämpft mit um den Titel "Master of Assembly"

    Poništi
  7. proslijedio/la je Tweet
    29. sij

    My wife and I never talk baby talk to our kid. We enforce academic seminar norms and jargon. My child isn’t even 2 yet and can interrupt presenters on the first slide. Adults at family gatherings are shocked when my child asks a question that turns out to be more of a comment.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    29. sij

    Just came across the Egalito rewriting paper by . Seems we had the same idea of using relocations for complete disassembly, ours published at (submitted 2018), the other at

    Poništi
  9. proslijedio/la je Tweet
    28. sij

    Big news in avatar2 land: v1.3.1 was just released. Among others, we now support QEMU v4.2.0, and our modifications to PANDA have been mainlined, deprecating the need of a separate avatar-panda. Thanks to everyone involved!

    Poništi
  10. proslijedio/la je Tweet
    24. sij

    Here's your periodic reminder that basic research is only "useless" until it suddenly becomes the most important thing in the world. 20 years ago, coronavirology was an obscure sub-field the public never heard about. Good thing we funded it anyway.

    Poništi
  11. 27. sij

    Reading a uarch security paper and suddenly kernel Bug with some corrupted list pointer *paranoia level intensifies*

    Poništi
  12. proslijedio/la je Tweet
    25. sij
    Odgovor korisniku/ci

    I think the argument re: Huawei is not that there are backdoors in the code today, but that once Huawei have dominance in many countries they will be able to introduce them, just as the US has been proven to do. Seems kind of hard to dispute this.

    Poništi
  13. proslijedio/la je Tweet
    26. sij

    New article: The Infinite Loop That Wasn't: A Holy Grail Bug Story

    Poništi
  14. proslijedio/la je Tweet
    26. sij

    Protip: If your deep neural network won’t converge, try remodulating the shield frequencies and reconfiguring the plasma relay to emit a rapid EM burst directly at the subspace anomaly.

    Poništi
  15. proslijedio/la je Tweet
    25. sij

    (A few) Ops Lessons We All Learn The Hard Way -- a Twitter 🧵:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    25. sij

    64. Somewhere, somebody ran into this exact problem, but they never bothered to post a solution. 65. That completely automated solution you set up requires at least three manual steps you didn't document.

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    25. sij

    55. Any sufficiently successful product launch is indistinguishable from a DDoS; any sufficiently advanced user indistinguishable from an attacker. 56. Debugging any sufficiently complex open source product is indistinguishable from reverse engineering a black box.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    25. sij

    45. Some of your most critical services are kept alive by a handful of people whose job description does not mention those services at all.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    23. sij

    The Swedish word for goat is 'get' and the Swedish for kid is 'killing', resulting in this creepy instruction in a children’s educational book

    Poništi
  20. proslijedio/la je Tweet
    24. sij

    My conjecture* for 2020. An 𝗲𝘅𝗽𝗼𝗻𝗲𝗻𝘁𝗶𝗮𝗹 increase in the # cores available to your favourite fuzzer yields a 𝗹𝗶𝗻𝗲𝗮𝗿 increase in coverage achieved (or # bugs found) after a fixed time budget. Maybe less. *Give me counter-evidence!

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·