John F.X. Galea

@johnfxgalea

PhD Student. Interested in binary analysis.

Vrijeme pridruživanja: svibanj 2016.

Tweetovi

Blokirali ste korisnika/cu @johnfxgalea

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @johnfxgalea

  1. proslijedio/la je Tweet
    30. ožu 2019.

    What are good Coq learning resources these days? I still have those notes from Alexandre Miquel & Benjamin Werner from 13 years ago, I imagine some new material is around by now.

    Poništi
  2. proslijedio/la je Tweet
    21. velj 2019.

    Today we are excited to release the MuJoCo Soccer environment and accompanying paper, Emergent Coordination through Competition: Environment: Sample gameplay:

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    13. velj 2019.

    Hackers tried to steal €13 million from BOV, Prime Minister tells parliament

    Poništi
  4. proslijedio/la je Tweet
    27. pro 2018.

    The cost of various operations in a bit-blasting SMT solver : 😁 bvnot, concat, extract, bv*sh(l|r) by constant 😀 bvand, bvor 😊 bvxor, bvcomp 🙂 ite 😐 bv(s|u)(g|l)(t|e), bvneg 😕 bvadd ☹️ bv*sh(l|r) 😥 bvmult 😓 bv(s|u)div, bv(s|u)rem, bvsmod

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    8. pro 2018.

    People don't know the amount of work that Open Source developers do for free on their spare time. Hello from one of them. BTW, the sun in shining outside.

    Poništi
  6. proslijedio/la je Tweet
    20. stu 2018.
    Odgovor korisnicima i sljedećem broju korisnika:

    To me: An easy change is not to worship at the altar of novelty. New *evidence* that an old idea works as previously advertised, or worse, or better, is a contribution, assuming that evidence is solid (e.g., per SIGPLAN guidelines). I argue for such papers on PCs!

    Poništi
  7. proslijedio/la je Tweet
    27. sij 2018.
    Odgovor korisnicima

    FWIW, I would go angr/Manticore if I wanted to do something quick & dirty (e.g solve a ctf). I would only use KLEE if I had source (you could use McSema, but ymmv). Anything Windows I would use S2E - last time I checked the other tools didn’t support PE binaries/Windows that well

    Poništi
  8. proslijedio/la je Tweet
    26. ruj 2018.

    and slides for my beVX talk - Dissecting the 17-old kernel bug

    Poništi
  9. proslijedio/la je Tweet
    10. kol 2018.

    newest manticore is out! it's way better (especially for ethereum), but it's (finally) python 3.6+ only, you will need to update your scripts! ⚠️

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    9. srp 2018.

    Excellent presentation by on the poor state of empirical evaluation in cyber security research, particularly fuzzing. Calls into question the validity of many published results. Guidance here:

    Poništi
  11. proslijedio/la je Tweet

    Scalability session has started at workshop. John Galea from discusses a case-study evaluating the manual intervention to address the challenges of bug finding with KLEE. Joint work with , and Daniel Kroening.

    Poništi
  12. proslijedio/la je Tweet
    4. tra 2018.

    IEEE Security and Privacy magazine has a whole section on the Cyber Grand Challenge this month! (h/t )

    Poništi
  13. proslijedio/la je Tweet
    22. ožu 2018.
    Poništi
  14. proslijedio/la je Tweet
    18. velj 2018.

    Slides from my keynote this morning at – Prospects and Pitfalls for a Science of Binary Analysis

    Prikaži ovu nit
    Poništi
  15. 12. ožu 2018.

    Apart from testing your code, I find unit tests particularly effective for identifying bad function design and facilitate the breakdown of complex code. Perhaps the latter is not stressed enough.

    Poništi
  16. proslijedio/la je Tweet
    27. velj 2018.

    My slides for "The Evolution of CFI Attacks and Defenses" are uploaded. Check them out to see everything Microsoft has learned about CFI in the past several years (or wait for the talk to be uploaded)!:

    Poništi
  17. proslijedio/la je Tweet
    3. sij 2018.

    The Agenda is now online!

    Poništi
  18. proslijedio/la je Tweet
    6. velj 2018.
    Poništi
  19. proslijedio/la je Tweet
    25. sij 2018.

    [BLOG] Slaying Dragons with QBDI by @Axi0m_S Explore how to use our DBI to bruteforce a password in an obfuscated binary

    Poništi
  20. proslijedio/la je Tweet
    23. sij 2018.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·