Sean Heelan

@seanhn

Co-Founder | PhD | Relevant interests: exploit dev, software optimisation, automated software analysis

Vrijeme pridruživanja: srpanj 2008.

Tweetovi

Blokirali ste korisnika/cu @seanhn

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @seanhn

  1. Prikvačeni tweet
    14. stu 2019.
    Poništi
  2. proslijedio/la je Tweet
    1. velj

    The team is working through submissions for the first round of 2020 hiring for junior and senior roles. Be quick to get in there if you’re new to the industry or just looking for a change from the norm.

    Poništi
  3. 29. sij

    Are the ACM CCS 2019 talk recordings public yet?

    Poništi
  4. 29. sij

    If I missed something important let me know. Thx! <3

    Prikaži ovu nit
    Poništi
  5. 29. sij

    Here's the bibliography for an automatic exploit generation talk I'm giving tomorrow. If you're looking for a reading list on the topic, this should have almost everything for historical context and state of the art

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    29. sij

    Me and a student want to learn how to use LLVM for "traditional" program analysis (e.g., known bits over coreutils). Is there a good starter tutorial out there anyone would recommend?

    Poništi
  7. proslijedio/la je Tweet
    29. sij

    EuroLLVM 2020 program is online!

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    29. sij

    A former head of the Australian Signals Directorate’s SIGINT & offensive cyber mission excoriates the UK Huawei decision. "they have doubled down on a flawed and outdated cybersecurity model to convince themselves that they can manage the risk" 

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet

    Former head of Australia's Signals Directorate weighs in on U.K.'s choice to stick with Huawei:

    Poništi
  10. proslijedio/la je Tweet
    27. sij

    We need to ask ourselves why journalists base their reporting on studies whose results contradict each other, and don't even question if these theories produce accurate results. How do you explain that the tool you reported on classifies 1/2 of the US congress as ?

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    27. sij

    "Social bots have influenced elections." Does it sound plausible? Yes. Is it scientifically founded? Not at all. Many mistakes were made in the research and a lack of review allowed an unfounded theory to spread around the world: 1/11

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    27. sij

    THREAD: I’m pretty sick of the poor quality debate about whether to involve Huawei in the roll-out of 5G in the UK and elsewhere. The simple fact is that it is NOT the only provider of 5G networks - but it is the largest and (surprise!) the CHEAPEST

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    26. sij

    I should mention I'm hiring security engineers both in Sunnyvale and Zürich. Come shape how we do automated security scanning at Google, and find more bugs in a hour than all bughunters combined in a day.

    Prikaži ovu nit
    Poništi
  14. 26. sij

    If you're a grad student interested in security/program analysis and looking for something fun, I would love to see someone revisit the APEG problem (posed by Brumley in ). There's *at least* one entire PhD worth of problems in that area.

    Poništi
  15. 24. sij

    I would not wish on my enemies the process of a Delaware flip with > 2 tax jurisdictions.

    Poništi
  16. proslijedio/la je Tweet
    Poništi
  17. proslijedio/la je Tweet
    23. sij

    Chicago used algorithmic risk scores to run a program literally called “TRAP,” which targetted people for “enhanced prosecution" if police thought they had “propensity” for future crime

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    23. sij

    Both a user expectation and an internal cultural touchstone, slowly dissolved over time. People who pointed out the frog was boiling were often not believed in real time.

    Tweet je nedostupan.
    Poništi
  19. 23. sij

    For an experiment I'm looking for dead UAF vulns in Firefox where the free and use are triggered via separate Javascript functions(similar to ). i.e. avoiding the case where it may not be possible to trigger other code in between. Suggestions appreciated =)

    Poništi
  20. proslijedio/la je Tweet
    21. sij

    We really shouldn't be surprised that Google has turned their search engine into an ad engine. This is the basic, predictable playbook of monopoly power. Once the quality of the product stops mattering, because all competition has been vanquished, you raise prices. This is it.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·