Byoungyoung Lee

@mylifeasageek

Working on Systems Security. Assistant Professor of ECE at Seoul National University (SNU)

Vrijeme pridruživanja: lipanj 2009.

Tweetovi

Blokirali ste korisnika/cu @mylifeasageek

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mylifeasageek

  1. 26. svi 2019.

    Any guess how to find races through fuzzing? Here's our approach, Razzer (), which found 16 new race bugs in the Linux kernel

    Poništi
  2. proslijedio/la je Tweet
    12. svi 2014.

    . & present "Abusing Performance Optimization Weaknesses to Bypass ASLR" at Briefings

    Poništi
  3. 12. svi 2014.
    Poništi
  4. 25. lis 2013.

    I guess ppl didn't get this Remember FF hash table leaks?Safari (experimental feature) also had similar vulnerability

    Poništi
  5. proslijedio/la je Tweet

    New, from me: Apple's iCloud cracked: Lack of two-factor authentication allows remote data download

    Poništi
  6. 1. lis 2013.
    Poništi
  7. 20. ruj 2013.

    Can we find the crypto backdoor in a reasonable time? Guess we must be able to do it in the polynomial time? based on

    Poništi
  8. 19. ruj 2013.

    Things we did - Partial Information Leakage in Hash Table implementations :

    Poništi
  9. 9. ruj 2013.
    Odgovor korisniku/ci

    Yeah. Pretty awkward naming, isn't it?

    Poništi
  10. 8. ruj 2013.
    Odgovor korisniku/ci

    Wow... was it acronym? I thought they just want to mean it's wtf complicated

    Poništi
  11. 8. ruj 2013.

    When my fuzzer hit uaf on Webkit's WTF, I said WTF? Always wondering what this "WTF" means.

    Poništi
  12. proslijedio/la je Tweet
    5. ruj 2013.

    A recent Samsung update for GS4 (GT-I9505) sets SEAndroid to enforcing by default, which I didn't expect to see on consumer devices.

    Poništi
  13. 6. ruj 2013.
    Odgovor korisniku/ci
    Poništi
  14. 4. ruj 2013.

    We got confirmed 2 use-after-free and 1 heap-overflow in chrome after having three weeks of less-eat,less-sleep, and more-coding :)

    Poništi
  15. 2. ruj 2013.
    Odgovor korisniku/ci

    Seems this is the attempt in blink: Take a look at the security properties.

    Poništi
  16. 2. ruj 2013.
    Odgovor korisniku/ci

    This was a discussion over how to better mitigate use-after-free on webkit/chrome. Using slab allocator is one suggestion, but controvertial

    Poništi
  17. 2. ruj 2013.

    Chris Neklar and Chris Evans didn't realize or understand the problems listed above, and didn't tackle them. From .

    Poništi
  18. 29. kol 2013.

    Old day fuzzing was all about finding exploitable one out of tons of crashes. Today, it's about finding reproducible ones out of a few uaf?

    Poništi
  19. 19. kol 2013.

    Re-engineered exploits for CVE-2013-0912, one used for Pwn2Own 2013 chrome

    Poništi
  20. 5. kol 2013.

    Well. The first use-after-free chrome bug from my DOM/JS fuzzer turned out to be duplicate bugs. Lesson? Still fuzzing works on chrome :)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·