pagabuc

@pagabuc

PhD Student @ EURECOM. Memory forensics et al. Captures flags with NOPS.

Milan
Vrijeme pridruživanja: lipanj 2011.

Tweetovi

Blokirali ste korisnika/cu @pagabuc

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @pagabuc

  1. proslijedio/la je Tweet
    4. velj

    The Call for Papers for 2021 is now available at , the first submission deadline is on March 5. Please carefully check the CfP, a few things have changed

    Poništi
  2. proslijedio/la je Tweet
    3. velj

    Pre-announcement: will be looking for a new colleague soon. Specifically, we will be interested in an assistant (or *perhaps* associate) professor in security. If you are interested, DM , or Info about :

    Poništi
  3. proslijedio/la je Tweet
    30. sij

    -- Just found out the zine is out! Look out for a paper on modern ELF infection techniques with SCOP binaries.

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    Added a new interface to PANDA today which mostly recreates Unicorn Engine but with support for taint analysis (and all the other existing PANDA features). Might be time for a series of blog posts about using PANDA from python.

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    23. sij

    The Security Circus 2019 update is now online:

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    14. sij

    We propose Pivoted Query Synthesis (PQS), a new approach for finding logic bugs in DBMS (see ). Using PQS, we found ~100 previously unknown (and many critical) bugs in widely-used DBMS (e.g., SQLite3, MySQL, and PostgreSQL). Work with .

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    13. sij

    Karonte - A Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded Firmware

    Poništi
  8. proslijedio/la je Tweet
    13. sij

    Massimo Tarallo, un collega con una grande sensibilità per la divulgazione scientifica è mancato improvvisamente. Chi lo ha conosciuto può mandare un ricordo tramite

    Poništi
  9. proslijedio/la je Tweet
    10. sij

    NDSS is pleased to announce the preliminary list of accepted papers for NDSS 2020. . Join us 23-26 February in sunny San Diego for all the details.

    Poništi
  10. proslijedio/la je Tweet
    9. sij

    Made a "quick" writeup on the and the in the kernel. I thought it might be useful to share. Suggestions are very welcome :)

    Poništi
  11. proslijedio/la je Tweet
    4. sij

    I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process.

    Poništi
  12. proslijedio/la je Tweet
    29. pro 2019.

    I am looking for Linux/UNIX ELF binary infections/injectors, process memory infections, and kernel rootkits and any other APT's that are being used in the wild. Upload here -- Thank you.

    Poništi
  13. proslijedio/la je Tweet
    Odgovor korisnicima

    There's a fascinating presentation here by which I found recently. I wish I had a video of the talk which corresponded:

    Poništi
  14. proslijedio/la je Tweet
    19. pro 2019.

    ProTip: Giving a server needless amounts of RAM means diagnostic memory dumps are going to be 128GB... I recognize you moved everything to the cloud and now you have excess capacity on-prem, but don’t be wildin’.

    Poništi
  15. proslijedio/la je Tweet
    17. pro 2019.

    I am glad to announce that we released the source code of KARONTE at . Our tool tracks information data-flow across the different components of a firmware and finds vulnerabilities. Our paper can be found at

    Poništi
  16. proslijedio/la je Tweet
    17. pro 2019.

    If you're interested in getting started with PANDA for debugging and reverse engineering, Tim Leek put together a short introductory course!

    Poništi
  17. proslijedio/la je Tweet
    11. pro 2019.

    Due to popular demand, we are extending the deadline for the Workshop on Binary Analysis Research (BAR) at NDSS to Sunday, December 22nd (AoE). Get your groundbreaking binary analysis papers submitted!

    Poništi
  18. proslijedio/la je Tweet
    6. pro 2019.

    A while back I did a quick fuzzing exercise on Google Chrome <portal> element

    Poništi
  19. proslijedio/la je Tweet
    15. stu 2019.

    It's time to announce the contest First Place winners! : FreeBSD Support by Antoine Brodin : Memory Analysis Data Leakage Cases report by TEAM. HSLFL Read the full contest results here:

    Poništi
  20. proslijedio/la je Tweet
    12. stu 2019.

    Volatility : submission includes 6 new plugins to extract tasks and kernel modules and a novel way to automatically extract kallsyms from a memory sample.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·