Rezultati pretraživanja
  1. One successful conference is now end. Hope everyone have safe journey back home and see you all in

  2. 16. tra 2019.

    Here are the slides from my talk about TurboFan (Chrome's javascript compiler). If you have any questions, please leave a comment in the slides and I'll try to explain it in the speaker's notes.

  3. Last speaker @ Zer0con2019 Stephen Rotteger() is decorating last bit of Zer0con with last talk about “A guided tour through Chrome’s javascript compiler”

  4. 27. svi 2019.

    We just published the slides for the TEE presentation gave at and , and kicking off part 1/4 of a blog post series about this research.

  5. Third speaker @ Zer0con2019 Denis Selanin from Embedi(@_embedi_ )is giving a talk about “Research Marvell Avastar Wi-Fi: from zero knowledge to over-the-air zerotouch RCE”

  6. 3. velj 2019.

    and I made a training session about QSEE/Kinibi TEE-OS, summarizing our year of research on these platforms, developed tools and vulnerabilities with exploits allowing Secure World code execution. Feel free to join us and !

  7. 10. tra 2019.
  8. 7. tra 2019.

    Working hard with before our Trustzone training at in South Korea <o/

  9. 31. ožu 2018.

    is the most awesome and professional conference I've attended. Thank you for inviting and me to speak. Cya in

  10. 10. tra 2019.

    Made it to seoul for , will be arriving at the venue in about an hour. Ping me if you're around and like to meet up.

  11. 10. tra 2019.

    has started with the talk of .

  12. 2nd day is on! Our long time friend, Sergey Ivanov is giving a talk about “Getting RCE in personal security products from the scratch”

  13. 31. sij 2019.

    Happy to announce I'll also be presenting at !

    Prikaži ovu nit
  14. 22. stu 2018.

    Slides of have been uploaded. Some files are missing because of the request of speakers. Enjoy! - April 11 ~ 12, 2019 - November 7 ~ 8, 2019

  15. 12. tra 2019.

    is giving the last talk of .

  16. 21. velj 2019.

    We're giving a training on TrustZone at with and . There are still a few seats left if you want to learn how to reverse engineer and attack trusted world components. You can also attend our and sessions. See you there! :)

  17. 10. tra 2019.
  18. 20. tra 2019.

    Anyone saw Georgia Tech's browser fuzzing talk at ? I was wondering whether their demo involved a bug in WebCore or JSC? Was it merely a use-after-free exploit for an object allocated on FastMalloc? Their abstract seems a bit all over the place.

    Prikaži ovu nit
  19. 7. tra 2019.

    Enjoy & training on vulnerability research and exploitation in Trustzone at

  20. 15. tra 2019.
    Odgovor korisniku/ci

    You should ask PoC crew.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.