Martijn Bogaard

@jmartijnb

Reverse engineers source code by day and reviews binaries by night. TEEs, TAs, bootloaders (Secure Boot), RTOSs, firmware blobs and other low-level sw.

Netherlands
Vrijeme pridruživanja: lipanj 2009.

Tweetovi

Blokirali ste korisnika/cu @jmartijnb

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @jmartijnb

  1. 1. velj

    Hmm, who is the intended audience for a conference countdown timer? The attendees or the speakers to give them a reminder they should work on their presentation instead of doing new research?🤔

    Poništi
  2. 19. sij

    Best solution seems to be to do a force decompile as call on the instruction and then force the calling convention using __usercall. Doesn't seem to be possible to model everything, but improves the output a lot!

    Prikaži ovu nit
    Poništi
  3. 19. sij

    Hmm, any (good) ideas how to deal with ARM64 SMC calls in IDA? Only sort-of OK idea I got so far is creating a stub function before the code segment with custom calling convention and patch the SMC calls to BLs to the stub... But that's also quite a pain...

    Prikaži ovu nit
    Poništi
  4. 16. sij

    The recording of our (with ) fault injection on Secure Boot talk showing a fault simulator and glitching an Android device live on stage at EU '18 got published! Now is your chance to watch it back it if you weren't there!

    Poništi
  5. proslijedio/la je Tweet
    10. pro 2019.

    Grab those keyz and learn somebodies darkest secrets! by

    Poništi
  6. 10. pro 2019.

    I’m really excited I get the chance to talk about my most recent research about Android’s File Based Encryption!

    Poništi
  7. proslijedio/la je Tweet
    3. pro 2019.

    Today we are hosting a webinar with on Running a fuzzing tool in OP-TEE. If you haven't already, make sure to register here:

    Poništi
  8. 24. stu 2019.

    Also, the 3rd of December (on Tuesday 1.5 week from now) I will present a webinar hosted by core developer where I will give a high-level overview of how the fuzzer works + answering questions. Register here:

    Prikaži ovu nit
    Poništi
  9. 24. stu 2019.

    I just published the (raw) patches for my fuzzer which were long, very very long overdue. Also I linked to the latest slides and recording of my presentation from Linaro Connect SAN19. Enjoy!

    Prikaži ovu nit
    Poništi
  10. 27. ruj 2019.

    Ready for demo friday! Demonstrating how to bypass Secure Boot using fault injection and how simulation can help to find the vulnerable locations in source code.

    Poništi
  11. 19. ruj 2019.

    Talking again about fuzzing trusted execution environments. Today at the workshop, coming Tuesday Connect! Have some cool improvements since last March!

    Poništi
  12. proslijedio/la je Tweet
    14. kol 2019.

    Can we stop undervaluing humans in security? It seems like there's a huge focus on total automation of provably unsolvable problems. At the end of the day a human writing scripts or interpreting complex results always wins.

    Poništi
  13. 30. lip 2019.

    With submitting for the first time for a third-party bonus bounty of the Android reward program, I can finally conclude some research I did last Christmas. Keep an eye for CVE-2019-2343 in your Android patch notes 😉

    Poništi
  14. proslijedio/la je Tweet
    25. lip 2019.

    Getting ready for our talk at ! Hotel room demo prep never gets old...

    Poništi
  15. proslijedio/la je Tweet
    29. svi 2019.

    TEEs have an increasing role in the of systems. , Senior Security Analyst at , talked about embedded (trusted) operating systems using AFL.

    Poništi
  16. proslijedio/la je Tweet
    10. tra 2019.

    Secure Boot Under Attack: Simulation to Enhance Fault Attacks & Defenses by Martijn Bogaard (), Riscure

    Poništi
  17. proslijedio/la je Tweet
    22. ožu 2019.

    The talk by Martijn Bogaard drew quite a crowd.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    21. ožu 2019.

    In case you wondered how to open a QFP IC from back side: - drill carefully from the middle with Dremel until you hit the copper plate - expose all the copper square - lift copper from corner with a stencil knife (see pic) - remove adhesive with toothpick - clean dust with paper

    Poništi
  19. 21. ožu 2019.

    Doing hardware attacks live on stage are a lot of fun when well prepared but also quite a pain to get right. Just confirmed my demo survived the flight but the glitch parameters shifted dramatically again compared with yesterday... Lets see what happens tomorrow!

    Poništi
  20. 20. ožu 2019.

    Also, I really look forward to talk with others interested in hardware/embedded device security!

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·