Sergej Schumilo

@ms_s3c

Security Researcher

Bochum, Germany
Vrijeme pridruživanja: veljača 2014.

Tweetovi

Blokirali ste korisnika/cu @ms_s3c

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ms_s3c

  1. proslijedio/la je Tweet
    14. sij

    Congratulations Dr. ! 🎉

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    5. pro 2019.

    Slides for and my talk on fuzzing at are now available:

    Poništi
  3. proslijedio/la je Tweet
    15. stu 2019.

    Interesting small hypervisor demonstrating how to use VT-x to hide from PatchGuard:

    Poništi
  4. proslijedio/la je Tweet
    9. stu 2019.

    and I just released our fast coverage measurement tool: Get basic block and edge coverage on binaries using AFL's Qemu mode and a Forkserver.

    Poništi
  5. proslijedio/la je Tweet
    10. lis 2019.

    If you plan on using Redqueen for your research, you should use this code base for the fronted - it was completely redesigned.

    Poništi
  6. proslijedio/la je Tweet
    10. lis 2019.

    We just published the source code of our fuzzer Grimoire: Thanks to my co-authors , , , , and !

    Poništi
  7. 23. ruj 2019.

    We've finally released our x86-64 binary fuzzer, which is built upon KVM, QEMU and Intel Processor Trace.

    Poništi
  8. proslijedio/la je Tweet
    23. ruj 2019.

    We just published the source code of our fuzzer Redqueen: Thanks to my coauthors and

    Poništi
  9. proslijedio/la je Tweet
    27. velj 2019.

    The at As always, hardly working 😂 – mjesto: Catamaran Resort Hotel and Spa

    #NDSS19
    #NDSS19
    , , i još njih 5
    Poništi
  10. proslijedio/la je Tweet
    15. velj 2019.
    Poništi
  11. proslijedio/la je Tweet
    14. velj 2019.

    I recall a discussion on symbolic execution vs. automatically populated dictionaries. I think this appears to be a clever implementation of the latter and it does look promising

    Poništi
  12. proslijedio/la je Tweet
    13. velj 2019.
    Odgovor korisnicima i sljedećem broju korisnika:

    Thats exactly what we are doing with kafl/redqueen. A LOT OF WORK went into optimizing/stabilizing the pt decoder.

    Poništi
  13. proslijedio/la je Tweet
    13. velj 2019.

    New kid on the block: Redqueen. Results looks impressive. Genotype-phenotype (input-behaviorl) mapping promises to be very useful.

    Poništi
  14. proslijedio/la je Tweet
    13. velj 2019.
    Odgovor korisniku/ci

    for a writeup on a fuzzer using a very similar idea:

    Poništi
  15. proslijedio/la je Tweet
    12. velj 2019.

    They told us we should mirror our important stuff, so we did! Big thanks and for making this possible. :)

    Poništi
  16. proslijedio/la je Tweet
    1. velj 2019.

    NDSS is proud to announce the NDSS 2019 draft program. Keynote and workshop details coming soon!

    Poništi
  17. proslijedio/la je Tweet
    12. sij 2019.

    Betroffene Bundestagsabgeordnete fordern bei Hackerangriffen auf Bundestagsabgeordnete schärfere Strafen als bei Normalbürgern. Das wird bei den Normalbürgen sicher sehr gut ankommen.

    Poništi
  18. proslijedio/la je Tweet
    4. sij 2019.

    Die e sind viele Monate her, blieben unbemerkt, Behörden wurden erst von Betroffenen darauf aufmerksam gemacht. Nun sind die Daten öffentlich. ist mit Abstand der maximaldümmste Vorschlag – klar, dass die CDU das fordern würde.

    Poništi
  19. proslijedio/la je Tweet
    17. pro 2018.

    Our paper on a lightweight, yet very effective alternative to taint tracking and symbolic execution-based fuzzing is now available: "Redqueen: Fuzzing with Input-to-State Correspondence" -

    Poništi
  20. proslijedio/la je Tweet
    Odgovor korisnicima

    That's how you debug in ring-0!!!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·