-
source code of my old fuzzer, pe-afl, which applies static binary instrumentation, aka binary rewriting, on PE file https://github.com/wmliang/pe-afl
#BlueHatIL -
Had a lot of fun speaking about
#AMDFlaws at#BlueHatIL today. Thank you all for coming! Slides are available at http://cts-labs.com/past-publications …@uri_farkas -
The
#BlueHatIL talks are online, go watch all the things
=> https://www.youtube.com/user/microsoftrndIsrael/videos … -
Here's the video recording for my presentation at
#bluehatil last week on "Trends, Challenges, and Strategic Shifts in the Software Vulnerability Mitigation Landscape" https://www.youtube.com/watch?v=PjbGojjnBZQ …Prikaži ovu nit -
CFP for
#BlueHatIL 2020 is open! Submit now for a chance to take the stage. https://bluehatil.com pic.twitter.com/OpZjJNmlSG
-
Finally! My
#BlueHatIL talk “Who’s Watching the Watchdog? Uncovering A Privilege Escalation Vulnerability in OEM Driver” is out, telling the story behind the discovery of CVE-2019-5241 & CVE-2019-5242 vulnerabilities in Huawei PC Manager driver. https://youtu.be/Ltzye0Cj9G8Prikaži ovu nit -
At
#BluehatIL I spoke about how innovators are improving security on data by using data to improve security. More and more security controls are using data/telemetry as the heart of their insight. PDF: https://1drv.ms/b/s!Akl-R_H0qTIPcqjMVlRFhTDtyYM …pic.twitter.com/0o6G6BGv5F
Prikaži ovu nit -
Watch: Bhavna Soman (
@bsoman3)'s#BlueHatIL presentation on using ML and custom entity extraction techniques from natural language processing to extract STIX-like info from unstructured text like blogs, whitepapers, reports for threat intelligence http://msft.social/eKBPND -
Here is the video of my talk from
#BlueHatIL: No Code No Crime: UPnP as an Off-the-Shelf Attacker's Toolkit https://www.youtube.com/watch?v=9cb0ltwk3gE … (video)Prikaži ovu nit -
The wait is finally over! Registration & schedule for
#BlueHatIL 2020 are live. Places are limited so register NOW: http://bluehatil.com pic.twitter.com/JXXx8OQOYn
-
I’m deeply honored to be speaking at
#bluehatil for the third year in a row. My presentation will focus on finding anomalies in UEFI PE and Terse Executables and the odd stuff we spotted so far through code similarity: https://twitter.com/bluehatil/status/1080064245587460098?s=21 …
-
just imagine a conference where every talk gets its own poster... and it was just one of many creative details prepared by
#BlueHatIL's organizers, to spice up the whole event pic.twitter.com/sUsj2wX8ZB
Prikaži ovu nit -
Reports of Twitter not working 3000 years ago greatly exaggerated
#BlueHatIL pic.twitter.com/Crcp58K6D0
-
My
#BlueHatIL talk about MemProcFS, Total Meltdown and HW Cheating! Lots of demos - remote memory capture, point and click memory analysis using virtual File System and Python API. https://youtu.be/Da_9SV9FA34Prikaži ovu nit -
congratulations
! we will celebrate at #BlueHatIL
-
-
Excited to present on some variant analysis of 0-days used in the wild
@BlueHatIL! See you in Tel Aviv!
#BlueHatIL https://twitter.com/BlueHatIL/status/1219306208554889216 …
-
Last year I gave a presentation
#BlueHatIL, and it became one of my favorite conferences. The talks, the venue, the way the speakers are treated - all left so many good memories. This year I have an honor to be in a review board, and I highly recommend you to submit!Prikaži ovu nit -
Miss us? We miss you too! We're throwing our post-
#BlueHatIL meetup, where some of the lucky winners will show us how they solved the backroom challenges. RSVP: http://aka.ms/bhilmut pic.twitter.com/51JBvwksgK
-
The video recording from my presentation at
#BlueHatIL just went live!
super enjoyed doing this project! https://youtu.be/fRaMOQyCuh0 Prikaži ovu nit
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.