FG SecT

@fgsect

Research Group, Security in Telecommunications, TU Berlin

Ernst-Reuter-Platz 7, Berlin
Vrijeme pridruživanja: srpanj 2011.

Tweetovi

Blokirali ste korisnika/cu @fgsect

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @fgsect

  1. 25. velj 2019.

    Don’t miss our talk at about PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary! Tuesday Morning, 8:30 am, Kon Tiki

    Poništi
  2. 19. velj 2019.

    We've got a blog post at on how to break out of in the by exploiting the Check it out here:

    Poništi
  3. proslijedio/la je Tweet
    31. kol 2018.

    Ah BTW here are our ( and my) final BH fuzzing slides [featuring unpatched out of bounds reads and writes in packages starting at page 49] and here's the tool in case you prefer to find them yourself

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet

    Our new research at attacking LTE network side this time - we will show how $ 200 hardware setup can be used remotely to kill a base station & change LTE network configurations. This tiny hardware can be easily mounted on a drone

    Prikaži ovu nit
    Poništi
  5. 10. kol 2018.

    We presented our automated fuzzing framework that we call at (CC ) and made our tooling open source for you to try out. Here's our GitHub repo:

    Poništi
  6. 17. svi 2018.

    Our talk "Follow the White Rabbit: Simplifying Fuzz Testing Using FuzzExMachina" was accepted for Black Hat 2018.

    Poništi
  7. 11. svi 2018.

    receives press coverage on CVE-2018-1000155 from and . Check out and

    Poništi
  8. 11. svi 2018.

    reported CVE-2018-1000155: Denial of Service, Improper Authentication and Authorization, and Covert Channel in the OpenFlow 1.0+ handshake.

    Poništi
  9. 6. ožu 2018.

    We have two PhD positions vacant, one in mathematics, and the other in machine learning. Please RT. Contact:

    Poništi
  10. 1. ožu 2018.

    We are offering a student job in the domain of Android security. Contact:

    Poništi
  11. 25. sij 2018.

    Our paper titled 'Taking Control of SDN-based Cloud Systems via the Data Plane' will appear in the proceedings of ACM Symposium on research 2018.

    Poništi
  12. 17. stu 2017.

    Our paper "On the Power of Optical Contactless Probing: Attacking Bitstream Encryption of FPGAs" was awarded the 1st place in the European CSAW Applied Research competition. Paper link:

    Poništi
  13. 19. lis 2017.

    Our paper at 2017 about reverse engineering of FPGAs is online:

    Poništi
  14. proslijedio/la je Tweet
    2. lis 2017.

    OVS Orbit #43, an interview with Bhargava Shastry from about fuzzing frameworks, is now available:

    Poništi
  15. 25. ruj 2017.

    We are offering student projects/theses in network virtualization (DPDK, SR-IOV, OvS), and ML and SDN. Contact

    Poništi
  16. 18. ruj 2017.

    Accepted at CCSW'17! "The vAMP Attack: Taking Control of Cloud Systems via the Unified Packet Parser" Link:

    Poništi
  17. 18. ruj 2017.

    A preliminary version of our paper titled "Static Analysis as a Fuzzing Aid" is public

    Poništi
  18. 6. ruj 2017.

    Code for our paper titled "Static Analysis as a Fuzzing Aid" is public.

    Poništi
  19. 6. ruj 2017.

    Code for our poster titled "KleeFL - Seeding fuzzers with symbolic execution" is public:

    Poništi
  20. 25. srp 2017.

    Our paper "Static analysis as a fuzzing aid" will be presented at RAID 2017!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·