Brandon Falk

@gamozolabs

I write a lot of fuzzing tools. I use these to find hard bugs. Usually there's a custom OS involved for some obscure performance benefit. Who knows.

Vrijeme pridruživanja: kolovoz 2014.

Tweetovi

Blokirali ste korisnika/cu @gamozolabs

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @gamozolabs

  1. 2. velj

    Should I do a word-for-word read through of the book on stream with commentary and tangents/examples?

    Poništi
  2. 2. velj

    Writin' code to optimize other code which was coded in un-optimized ways

    Poništi
  3. 1. velj

    I also uploaded the first Paper Review, on "Building Fast Fuzzers"!

    Poništi
  4. proslijedio/la je Tweet
    31. sij

    This afternoon don't miss our talks about and the recent work on MDS for CPU instrospection. 👉

    Poništi
  5. 30. sij

    Paper Review for CacheOut is now up on YouTube! It's 2 parts totaling 11 hours, have fun!

    Poništi
  6. 29. sij

    Paper Review S01E02 - CacheOut! EU friendly steam, starting in 15 min!

    Poništi
  7. 21. sij

    I'm looking for a good kernel race condition leading to memory-corruption on Linux. Ideally with hard timings and windows. I've got some ideas to massively increase the success rate that I'd like to try out. Suggestions? CVE numbers? The simpler the better. Patched n-day only ofc

    Poništi
  8. 17. sij

    Travis's blogs are always amazing. Never a dull moment :)

    Poništi
  9. 15. sij

    I gotta do the Infiltrate CFP, what do people want? For other ideas just reply.

    Poništi
  10. 14. sij

    Can't believe I live here

    Poništi
  11. proslijedio/la je Tweet
    9. sij

    Announcing Scalene: A high-performance, high-precision CPU and memory profiler for Python. Virtually zero overhead line-granularity profiling. , pip install scalene

    Prikaži ovu nit
    Poništi
  12. 6. sij

    Realized that lots of people were on holiday travels when I published my most recent blog. Here it is if you missed it, holiday crowd!

    Poništi
  13. 5. sij

    Added a YouTube comment with some timestamps for the long video.

    Prikaži ovu nit
    Poništi
  14. 5. sij

    Here's the VoD for today's stream. We discovered that we can "pick" which load port we log data from. We also filtered and sequenced the data well enough that we could determine the ordering and values of 128 randomly generated loads with 100% accuracy!

    Prikaži ovu nit
    Poništi
  15. 5. sij

    Going live shortly, more "mathy" and data processing. I mean I have no formal math knowledge, but we gotta get some more info from this data!

    Poništi
  16. 4. sij

    Thanks to Twitter's creepy ass purchased data and correlation, I know how to engage my audience optimally. I've realized you are all big fans of eggs. And I will try to spend 2020 producing maximum egg content.

    Poništi
  17. 29. pro 2019.

    Observing and sequencing Intel load port traffic! Wrote up this blog over the holidays! Happy New Year!

    Poništi
  18. 25. pro 2019.

    Thanks so much! Now to format some works for submission! Apparently arXiv takes HTML+images as a valid submission, not sure my blogs are formal enough as is.

    Poništi
  19. proslijedio/la je Tweet
    25. pro 2019.

    A attack visualized: a simple bounded loop on an array, speculatively leaks a value adjacent to its end (the 0xcafe peak in the graph) that passes through the load ports we are sniffing!

    Prikaži ovu nit
    Poništi
  20. 25. pro 2019.

    Reproducible results! Now that's some science :D Glad to see someone else got it working as well

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·