Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @kurmus
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @kurmus
-
Anil Kurmus proslijedio/la je Tweet
Arvind Krishna Elected IBM Chief Executive Officer http://newsroom.ibm.com/2020-01-30-Arvind-Krishna-Elected-IBM-Chief-Executive-Officer …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
It's 2020 and people are still working on kernel CFI. The (Linux) kernel has just too much access for CFI to be a reasonable tradeoff. For example it has been shown that one can gain privesc by corrupting targeted FS blocks https://www.usenix.org/system/files/conference/woot17/woot17-paper-kurmus.pdf …. <Ostrich sticks head in sand>
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anil Kurmus proslijedio/la je Tweet
The paper submission deadline for
#DIMVA2020 is in one month! Great conference at a great location (Lisbon). Check the#cfp https://dimva2020.campus.ciencias.ulisboa.pt/cfp.htmlHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anil Kurmus proslijedio/la je Tweet
The OpenBSD thing reminds me of this paper but our system would not break any runtime as it would just verify that the syscall actually exists in the binary on disc https://www.mulliner.org/collin/publications/bintegrity.pdf …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anil Kurmus proslijedio/la je Tweet
We compiled a long list of Threats to Validity/Relevance in Security Research for our students, building on common sense & our papers on malware experiments and on benchmarking (and inspired by
@GernotHeiser's excellent blog). Perhaps useful for others?https://bit.ly/2XAUtmSHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anil Kurmus proslijedio/la je Tweet
Is there any public list/repository/whatever in which the instructions for different archs are semantically divided into categories? Something like: intel_64_arithmetic = ["add", "sub", ...] intel_64_stack = ["pop", "push", ...]
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
1d690299dc9a0ce97a7fffc5cb3e53bdc9c0004ef7f57f377957cafb8a0d0ae5
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
This tool has proven to be very useful for us in analyzing speculative execution attacks. We've open sourced it, so give it a try if you're working in this field and let
@m4mbr3 know what you think :)https://twitter.com/ACSAC_Conf/status/1199827914835025926 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anil Kurmus proslijedio/la je Tweet
Just turned 30 y-old in Tokyo meanwhile speaking about speculative exec attacks at
#pacsec2019 with@kurmus and celebrating with lots of great folks! Special thanks to@dragosr for inviting us, organizing such great event and for the amazing surprise cake! Indeed an amazing day!pic.twitter.com/9n7Jz9UNYt
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anil Kurmus proslijedio/la je Tweet
So the Rust compiler generates the following piece of assembly, which seems to copy data from a location in the stack to a new location in the stack, and then back to the original location [thread].
#rustlangpic.twitter.com/GTVbCLvfy0
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anil Kurmus proslijedio/la je Tweet
The complete program for ACM CCS 2019, workshops, and social events is up! https://sigsac.org/ccs/CCS2019/index.php/program/program-2/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anil Kurmus proslijedio/la je Tweet
You can find the papers here.https://www.usenix.org/conference/woot19/workshop-program …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anil Kurmus proslijedio/la je Tweet
Uploaded the slides for my WOOT'19 talk. Thanks
@againsthimself and@BloodyTangerine for inviting me. If you're doing offensive research, I encourage you to submit your work to WOOT next year. It's great!https://github.com/microsoft/MSRC-Security-Research/blob/master/presentations/2019_08_WOOT/WOOT19%20-%20Trends%20and%20challenges%20in%20vulnerability%20mitigation.pdf …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anil Kurmus proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Anil Kurmus proslijedio/la je Tweet
It's been one year since we launched our continuous bug-finding competition,
@Rode0day! We've spent the past year learning all we can about bugs and bug-finding and tomorrow morning, I'll be presenting some of what we've found at#woot19 https://www.usenix.org/conference/woot19/presentation/fasano …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anil Kurmus proslijedio/la je Tweet
“We also verify that hardening the configuration of applicable mitigations (STIBP in this case) is an effective mitigation, making a case for their wider adoption.”https://twitter.com/kurmus/status/1161011024562020352 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The paper is now publicly available at https://www.usenix.org/system/files/woot19-paper_mambretti.pdf …https://twitter.com/kurmus/status/1159859369804259330 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Anil Kurmus proslijedio/la je Tweet
Followed by Mambretti et al.'s Two methods for exploiting speculative control flow hijacks
#woot19pic.twitter.com/wkD1u6yv86
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Erratum: Matthias Neugschwandtner is
@sictune on twitter :)Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
For those into speculative execution attacks, we have two new exploitation methods using the I$ and BTB as side channels. Come and listen to
@m4mbr3's talk on Monday at#woot19. /cc @tracenbreak@mneugpic.twitter.com/QFqxXdEyzc
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.