Rezultati pretraživanja
  1. 27. lip 2019.

    1st coding period of GSoC'19 is over and I have made some progress in improving support for in the kernel fuzzer.

  2. 25. svi 2017.

    Qualcomm Mobile Security Summit 2017 presentations Incl mine on . The leakage one was fun.

  3. 12. ruj 2019.

    Had a great time working with the foundation as a part of GSoC'19. I worked on enchancing support for the kernel fuzzer.

  4. 3. lis 2019.

    It's fascinating to see changes like this due to your work: whole class of inbound IPv6 packets is now unconditionally dropped by all Linux machines out there right in ip6_rcv_core() because... nothing good will happen otherwise:

  5. 10. kol 2019.

    I wrote a post: "Case study: Searching for a vulnerability pattern in the Linux kernel". It's a funny story about , , Coccinelle and a "public 0day".

  6. 5. ožu 2019.

    . of our team delivered a talk on in the fuzzing track of where he talked about Coverage Guided Fuzzing, , and results the community got after porting syzkaller to NetBSD recently :)

  7. 27. ruj 2019.

    The value of attending conferences like expressed in a single pr: Proper fuzzing support for codepaths. Spent a good hour with getting things in order. :) Now off to enjoy my last hours without bug reports. :)

  8. 9. svi 2019.

    Got accepted into 19. Had such an awesome time last year with that I decided to go for it again. I will be working on better integration of kernel fuzzer with the NetBSD kernel. Looking forward to another fabulous summer with this amazing organization.

  9. 19. ožu 2019.
  10. 20. stu 2019.

    Minor out-of-bounds read in smk_set_cipso() root$ echo "test 1" > /sys/fs/smackfs/cipso2

    Prikaži ovu nit
  11. 19. lis 2017.
  12. 26. stu 2019.

    let's see if I got the new set_tid feature sent for v5.5 into correctly: 🤞

  13. 20. stu 2019.
    Prikaži ovu nit
  14. Anton Lindqvist (anton@) "Add kcov(4), a kernel code coverage tracing driver. It's used in conjunction with the kernel fuzzer. So far, 8 distinct panics have been found and fixed. This effort will continue."

  15. 6. srp 2019.
    Odgovor korisnicima

    I was running a instance for some time. Bad luck - it didn't find anything and sometimes was loosing connection to VMs. The alert from Fedora DE about QEMU was a clue. Then I used rr for debugging QEMU and rr hanged :) I'll fix it. Actually it's a good luck.

  16. 24. tra 2018.
  17. 5. velj

    The incredible and presenting at on modifying to find Windows Kernel vulnerabilities

  18. 7. ruj 2019.
    Odgovor korisniku/ci

    The syscall descriptions from the project might be useful here?

  19. 3. stu 2019.

    Didn't receive any PRs for support in . So waiting for more KVM guest escapes and priv escalations. +more work for stable and all downstream maintainers to put down fires later. Stuff moar unfuzzed code into kernel! My job security goes through the roof

  20. 17. velj 2019.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.