Rezultati pretraživanja
  1. 12. kol 2017.

    abootool - simple tool to dynamically discover hidden fastboot OEM commands based on static knowledge

  2. 14. kol 2017.
  3. 14. kol 2017.

    Congrats to our student James Patrick-Evans for the best paper award at !

  4. 3. srp 2017.

    Our research on static vulnerability discovery and IMSI catcher detectors will be presented at !

  5. The final talk of 'fastboot oem vuln: Android Bootloader Vulnerabilities in Vendor Customizations' includes a live demo

  6. 14. kol 2017.

    Kudos to James for Best Paper on finding & exploiting bugs in USB drivers w/ sym fault inj /cc

  7. 14. kol 2017.

    @0x6D6172696F made it on the opening slides ;-)

  8. 14. kol 2017.

    One Car, Two Frames: Attacks on Hitag-2 Remote Keyless Entry Systems Revisited [PDF]

  9. 14. kol 2017.
  10. Omer is presenting our work on malicious smartphone components at . Good luck! – mjesto: Sheraton Vancouver Wall Centre

  11. 14. kol 2017.

    very interesting and entertaining presentation by Ang Cui about BADFET: Defeating Modern Secure Boot Using Second-Order Pulsed EMFI

  12. 14. kol 2017.
    Odgovor korisniku/ci
  13. 13. kol 2017.

    Short version of "Breaking and Fixing Gridcoin" from now as blog post with ,

  14. 13. kol 2017.

    “One Side-Channel to Bring Them All and in the Darkness Bind Them”: premiering tomorrow at

  15. 15. kol 2017.
  16. 13. kol 2017.

    A filesystem block was randomly corrupted and you'll never guess what happened next! Come check out our talk tomorrow at :)

  17. 31. kol 2017.

    Exploiting 2nd-stage unteth. secure boot & device locking bypass => root + PoC code

  18. 14. kol 2017.

    "If developers borrow code, they borrow vulns".

  19. 21. srp 2017.
    Odgovor korisniku/ci

    Truth man!

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.