Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @NeatMonster_
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @NeatMonster_
-
Alex “neat” A. proslijedio/la je Tweet
If you're interested in Samsung's TrustZone, the talk I gave at
#BHUSA2019 is online. It presents the work we did with@NeatMonster_ and@patateQbool at@quarkslab. We are at#36c3 if you want to come say hi. :)https://youtu.be/uXH5LJGRwXIHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex “neat” A. proslijedio/la je Tweet
[BLOG] A Deep Dive Into Samsung's TrustZone (Part 2) https://blog.quarkslab.com/a-deep-dive-into-samsungs-trustzone-part-2.html … by
@NeatMonster_,@patateQbool and@pandasec_Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex “neat” A. proslijedio/la je Tweet
[BLOG] A Deep Dive Into Samsung's TrustZone (Part 1) https://blog.quarkslab.com/a-deep-dive-into-samsungs-trustzone-part-1.html … by
@NeatMonster_,@patateQbool and@pandasec_Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex “neat” A. proslijedio/la je Tweet
Glitching a $20k Piece of Historyhttps://yifan.lu/2019/08/16/glitching-a-20k-piece-of-history/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex “neat” A. proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Alex “neat” A. proslijedio/la je Tweet
APRR: Of Apple hardware secrets. https://siguza.github.io/APRR/ Might include a free 0day.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Breaking Samsung's ARM TrustZone https://www.blackhat.com/us-19/briefings/schedule/#breaking-samsungs-arm-trustzone-14932 …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Sad to not being able to make it to
@BlackHatEvents this year. Huge thanks to my colleague and friend@pandasec_ for presenting our work on his own. Don't miss his talk, he has a put a lot of work into it!Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex “neat” A. proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Alex “neat” A. proslijedio/la je Tweet
Using Samsung's TrustZone implementation as a target,
@pandasec_ &@NeatMonster_ &@patateQbool explain and demonstrate how this new attack surface can be leveraged to hijack and exploit trusted components in their Briefing at#BHUSA http://ow.ly/7gmI30oRAXmHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex “neat” A. proslijedio/la je Tweet
Gain a solid understanding of the underlying mechanisms used in popular ARM TrustZone implementations by
@NeatMonster_ &@patateQbool at#hardwear_io US. More training info: http://bit.ly/2TAR9V8 pic.twitter.com/BVZS7u9Pz7
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex “neat” A. proslijedio/la je Tweet
Our talk "Attacking Samsung's ARM TrustZone" has been accepted at
#BHUSA! \o/ cc@patateQbool@NeatMonster_@BlackHatEvents https://www.blackhat.com/us-19/briefings/schedule/index.html#breaking-samsungs-arm-trustzone-14932 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex “neat” A. proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Alex “neat” A. proslijedio/la je Tweet
My
#TR19 NGI slides about 'mobile devices attacks in practice' have been update! This fixes mistakes reported by@lapinhib0u (thanks again!) on the introduction slide and adds up few more information + few asked links: https://www.synacktiv.com/ressources/Troopers_NGI_2019-Modmobtools_and_tricks.pdf …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex “neat” A. proslijedio/la je Tweet
I used high-powered branch-predictor and memory side channels to extract private keys from Qualcomm's TrustZone keystore. Check it out: https://www.nccgroup.trust/us/our-research/private-key-extraction-qualcomm-keystore/ …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex “neat” A. proslijedio/la je Tweet
[BLOG] Reverse-engineering Broadcom wireless chipsets by
@Phenol__ https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html … The long and good trip of an intern, then the long and sad disclosure timeline of 5 vulnerabilities. Thx to@Broadcom we dont know what is vulnerable...Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex “neat” A. proslijedio/la je Tweet
New blog entry: An Abstract Interpretation-Based Deobfuscation Plugin for Ghidrahttps://www.msreverseengineering.com/blog/2019/4/17/an-abstract-interpretation-based-deobfuscation-plugin-for-ghidra …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex “neat” A. proslijedio/la je Tweet
In
#GHIDRA, simply enabling the pcode field is enough to display the Pcode, checking "Raw Pcode" displays a more verbose version of it. H/T to@0xAlexei for pointing this out to me yesterday. Thanks, dude!pic.twitter.com/ZYSLae8VorPrikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex “neat” A. proslijedio/la je Tweet
It's here! Ghidra source code released: https://github.com/NationalSecurityAgency/ghidra … This is an ongoing, supported project from
@NSAGov. Looking forward to seeing the continued advancements and the innovation that occurs from the release.https://twitter.com/NSAGov/status/1113788370461843461 …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Alex “neat” A. proslijedio/la je Tweet
Here are some research related to Android runtime restrictions: - PDF: https://github.com/quarkslab/android-restriction-bypass/blob/master/report.pdf … - Blog Post: https://blog.quarkslab.com/android-runtime-restrictions-bypass.html … - Github: https://github.com/quarkslab/android-restriction-bypass … cc
@quarkslabpic.twitter.com/czDKW5kla1
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.