Satoshi Tanda

@standa_t

Reverse Engineer, System Windows Software Developer. My DM is open.

Vancouver, Canada
Vrijeme pridruživanja: veljača 2013.

Tweetovi

Blokirali ste korisnika/cu @standa_t

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @standa_t

  1. proslijedio/la je Tweet
    20. pro 2019.

    We just updated the executive callback repo with a research on the callback used by PatchGuard

    Poništi
  2. proslijedio/la je Tweet
    27. stu 2019.

    Teardown: Windows 10 on ARM - x86 Emulation. In this article, we present five key features of x86 emulation, concluding with an example of the raw opcode translation procedure. Learn more:

    Poništi
  3. 14. stu 2019.

    Intel SDM was updated mainly for CET (vol.1 chapter 18). We have gotten a new exception , and a possibly confusing term: SSP (vs SPP). Also a ton of updates about interaction with SGX and CET. I wonder who could possibly design and implement such complex system without bugs

    Poništi
  4. proslijedio/la je Tweet
    31. lis 2019.

    So I can honestly say that the and Hypervisor training is worth every penny. Seriously - It is awesome. If you have a chance to go, absolutely do it.

    Poništi
  5. proslijedio/la je Tweet
    Poništi
  6. 17. lis 2019.

    Note that 6.0 already supports AMD-V in a VM. Same as VT-x, no NTP support yet.

    Prikaži ovu nit
    Poništi
  7. 17. lis 2019.

    "VirtualBox 6.1 will be a new minor release" ... "support for nested hardware-virtualization on Intel CPUs" I do not think this is a "minor" even though it does not support EPT. Excited to see the 10-year-old feature request is being worked on

    Prikaži ovu nit
    Poništi
  8. 6. lis 2019.

    Does anyone know what models implement this? Maybe, the Microsoft Ryzen Surface Edition only at this point?

    Prikaži ovu nit
    Poništi
  9. 6. lis 2019.

    AMD documented Guest Mode Execute Trap Extension (GMET), ie, the AMD version of mode-based execute control on Intel processors. CR4.UMIP too. Nice to see better security feature parity.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    13. ruj 2019.
    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    19. srp 2019.

    InfinityHook sample is live, please consult the readme. Massive kudos to for incredible code clean-up. Microsoft says this is not security issue, have fun.

    Poništi
  12. proslijedio/la je Tweet
    Poništi
  13. 7. lip 2019.

    Thank you for responding very quickly and professionally to my questions regarding an issue I had with your product. I’m honestly very impressed. Great products are made by great people.

    Poništi
  14. proslijedio/la je Tweet
    10. svi 2019.

    Hypervisor firmware written in rust

    Poništi
  15. proslijedio/la je Tweet
    8. svi 2019.

    TIL that Windows Implementation Libraries (WIL) exists. Looks like a much safer c++ way to do Windows System programming. I sure gotta learn to love it!

    Poništi
  16. proslijedio/la je Tweet

    New : becomes first security provider to integrate firmware attack detection capability, delivering visibility into the state of BIOS across the enterprise via

    Poništi
  17. 27. tra 2019.
    Poništi
  18. proslijedio/la je Tweet
    Poništi
  19. 25. tra 2019.

    Hardware and Software Support for Virtualization is an excellent book for those who are interested in the subject. Explanation is concise but gives enough details and background. Also covers ARM.

    Poništi
  20. 13. tra 2019.

    Setup instructions for workshop on 28th is already up. Please take time to go though before the day. Outline can be found here: Looking forward to meeting you all and crue.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·