Alex Matrosov

@matrosov

IDAholic, , , "Rootkits and Bootkits" book co-author (), BIOS voodoo, and TEE exorcist. Chief Offensive REsearcher at

Portland, OR
Vrijeme pridruživanja: srpanj 2008.

Tweetovi

Blokirali ste korisnika/cu @matrosov

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @matrosov

  1. Prikvačeni tweet
    17. kol 2019.

    I wrote a blog post "Breaking Through Another Side: Bypassing Firmware Security Boundaries". It's a first part of the series based on our research with Alexandre Gazet. HW/FW Security != Summary of all Security Boundaries

    Poništi
  2. proslijedio/la je Tweet
    prije 3 sata

    Video from my presentation is now available. "Capsule Update & LVFS: Improving system firmware updates"

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    I am starting a blog. First post is about the StarkWare Hash Challenge

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  5. proslijedio/la je Tweet
    1. velj

    I am quite exhausted from the sheer complexity of the research I have been doing, having just spoken about the ME at . Now it's your turn: Please look into it as well and post your follow-up insights! ✨👩🏻‍💻 Slides: Video will follow.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  7. proslijedio/la je Tweet
    31. sij

    🚨It took Kraken Security Labs just 15 minutes to hack both of ’s crypto hardware wallets. Here’s how we did it and what it means if you’re a user:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    30. sij

    HWASAN (think of it as ASAN v2) has become available to developers on Android outside of Google. If you use C or C++ on Android, please give it a try. HWASAN is also available on Aarch64 Linux with a recent kernel.

    Poništi
  9. proslijedio/la je Tweet
    30. sij

    A quick post on why you shouldn't use SYSTEM Tokens when you sandbox a process. Part 1 of N (where I haven't decided how big N is).

    Poništi
  10. proslijedio/la je Tweet
    30. sij

    Just published a follow-up to my Adobe Reader symbols story on the Project Zero blog. Turns out there's even more debug metadata to be found in some old (and new) builds, including private CoolType symbols. Enjoy!

    Poništi
  11. proslijedio/la je Tweet
    28. sij
    Poništi
  12. proslijedio/la je Tweet
    27. sij

    I wrote a bit about hunting for UEFI Implants, and realising that we’re failing as an industry -- along with some ideas of things we could do to fix it. Comments welcome, especially from and ...

    Poništi
  13. proslijedio/la je Tweet
    27. sij

    Yet another Intel CPU flaw affects SGX. 2020: Please stop cheating by "solving" crypto problems with SGX magic, it does not work.

    Poništi
  14. proslijedio/la je Tweet
    22. sij

    For those who attended our talk with at , I will push the client utility for Siemens S7 bootloader arbitrary code execution here:

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    27. sij

    pocorgtfo20.pdf, "Grab gifts from the genizah, reading every last page! And write in their margins! And give them all again!"

    Poništi
  16. proslijedio/la je Tweet
    23. sij

    Sharing a new demo + an article on BlueKeep dissection (CVE-2019-0708) using REVEN. See how data Tainting, Memory History, and its Python API streamline the RE process to quickly and accurately analyze the root-cause and behavior at the system level.

    Poništi
  17. proslijedio/la je Tweet
    22. sij

    We've found a bug in CSME on-die ROM!💥 Intel says it's already targeted by CVE-2019-0090 (). Security Fuses can be extracted! 🔥 Mehlow and Cannon Point chipsets are affected. Stay tuned!

    Poništi
  18. proslijedio/la je Tweet
    21. sij

    Untrusted Roots: exploiting vulnerabilities in Intel ACMs by

    Poništi
  19. proslijedio/la je Tweet
    20. sij

    my new current project. automatic ropchain generation!

    Prikaži ovu nit
    Poništi
  20. 20. sij

    I'm thrilled to announce, I will be a keynote speaker for ! Stay tuned for more details ;-)

    Poništi
  21. proslijedio/la je Tweet
    18. sij
    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·