Rolf Rolles

@RolfRolles

Static reverse engineering, deobfuscation, program analysis and formal verification, training, mathematics, compilers, functional programming, etc.

Berkeley, California
Vrijeme pridruživanja: srpanj 2009.

Tweetovi

Blokirali ste korisnika/cu @RolfRolles

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @RolfRolles

  1. Prikvačeni tweet
    24. sij

    Mobius Strip Reverse Engineering is announcing public sessions for its Static Reverse Engineering and SMT-Based Binary Program Analysis training classes in May 2020 in Manassas, VA. More details can be found on our website:

    Poništi
  2. 21. sij

    Lazyweb: is it a common technique in algebraic cryptanalysis to embed the base ring for a polynomial system into a larger ring (e.g. Z2 into Z4) and study the larger system? (Wondering if I did something original or if there's something I should cite)

    Poništi
  3. 14. sij

    Good walkthrough of a paper that people often find intimidating; extra points for providing an implementation

    Poništi
  4. 7. sij

    I recently discovered 's channel on YouTube. A lot of stuff about old video game copy protections (arcade, console, PC), emulation, game development, etc. Good production values, too. Great stuff for reverse engineering enthusiasts.

    Poništi
  5. 18. pro 2019.

    A recent result: deobfuscation via relational abstract interpretation

    Poništi
  6. proslijedio/la je Tweet
    17. pro 2019.

    Security firm CheckPoint discovered a WhatsApp issue that meant an attacker could send a specific group message and crash the app. Okay, fair enough. But the framing was... just a little bit over the top. We didn't cover. Accurately informing users clearly not the motivation.

    Prikaži ovu nit
    Poništi
  7. 28. stu 2019.

    Somehow I missed there's a whole Ph.D. thesis on symbolic abstraction: Looks pretty readable, too.

    Poništi
  8. proslijedio/la je Tweet
    21. stu 2019.

    Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018.

    Poništi
  9. 19. stu 2019.

    What a terribly-named API. Microsoft is just appending numbers to existing API names now?

    Poništi
  10. 27. lis 2019.

    Research went better than expected. No manual work was involved in creating this screenshot. All type information was automatically generated and automatically applied to a freshly-created database.

    Poništi
  11. proslijedio/la je Tweet
    15. lis 2019.

    Handling microcode from IDAPython? It is possible!

    Poništi
  12. 3. lis 2019.

    Video for my RECON 2019 talk, "Automation Techniques in C++ Reverse Engineering", is now available:

    Poništi
  13. 25. ruj 2019.

    Z3 is such great software. I had to ask nicely, but I just convinced it to solve a pseudo-Boolean optimization instance with 160,000 variables. (It took 35 minutes, but I can live with that.)

    Poništi
  14. 28. kol 2019.

    Still can't get used to IDA's "undo" after 15+ years without. It saved time today after a blunder, but I doubt I will develop an instinct for using it in the near-term.

    Poništi
  15. 21. kol 2019.

    Things I did not anticipate while writing code to reconstruct inheritance hierarchies: noise in the data stemming from type confusion bugs in the programs under analysis

    Poništi
  16. proslijedio/la je Tweet
    17. kol 2019.

    In multiple recent disclosure discussions on Twitter, I had said I will write a longer blog post about my views. I finally found the time to jot them down. I expect almost every reader to disagree with something vehemently. Enjoy "Disclosure Rashomon":

    Poništi
  17. 14. kol 2019.
    Poništi
  18. 5. kol 2019.

    Here are the slides for my RECON and BlackHat presentation, "Automation Techniques in C++ Reverse Engineering":

    Poništi
  19. 5. kol 2019.

    I'll be presenting my talk, "Automation Techniques in C++ Reverse Engineering", at BlackHat on Thursday at 2:30

    Poništi
  20. proslijedio/la je Tweet
    8. srp 2019.

    I just published a blog post about the virtualized DGA of : The malware is ancient, but as recently showed (), Pitou is still active with the same DGA and seeds as five years ago.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·