Tweetovi

Blokirali ste korisnika/cu @tieknimmers

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @tieknimmers

  1. Prikvačeni tweet
    2. velj

    Please have another peek into the kitchen! This exercise uses fault injection which is commonly used to bypass Secure Boot when software vulnerabilities are unknown. Join us at to experience many more ways to bypass Secure Boot!

    Poništi
  2. proslijedio/la je Tweet
    24. sij

    A shout-out to here! Always great to dig up new angles and share research together. :)

    Poništi
  3. proslijedio/la je Tweet
    16. sij

    The recording of our (with ) fault injection on Secure Boot talk showing a fault simulator and glitching an Android device live on stage at EU '18 got published! Now is your chance to watch it back it if you weren't there!

    Poništi
  4. proslijedio/la je Tweet
    13. sij

    Tiger's back in town...

    Poništi
  5. proslijedio/la je Tweet
    8. sij
    Poništi
  6. proslijedio/la je Tweet
    7. sij

    Debunking Fault Injection Myths And Misconceptions - Cristofaro Mune and Niek Timmers

    Poništi
  7. proslijedio/la je Tweet
    6. sij

    Niek Timmers () & Cristofaro Mune () will conduct a 3-days hands-on training on "BootPwn - Pwning Secure Boot by Experience" at . Get hands dirty breaking Secure Boot with attacks beyond software exploitation.

    Poništi
  8. proslijedio/la je Tweet
    27. pro 2019.

    Discover how to exploit based with , teaching "TEE Offensive Core" at . Gain a system-level understanding of security and weaknesses in this 2-day training. Register today and get up to 25% OFF before Dec 31 😎

    Poništi
  9. proslijedio/la je Tweet
    21. pro 2019.

    We'll have a Hardware Slackers assembly at . Breaking hardware with fault injection⚡️ or side channels📈 is easy and fun, drop by and try it! We'll also be doing other random hardware (security) stuff, playing with avatar2 and hopefully hacking Trådfri💡 thanks to .

    Poništi
  10. proslijedio/la je Tweet
    10. pro 2019.

    I am honored to give an invited lecture on at VU Amsterdam on Dec. 13th. I will be covering how fault models can unlock unexpected potentials & new attacks. will join me in the talk. Thanks for allowing me to present to an amazing audience!

    Poništi
  11. proslijedio/la je Tweet
    10. pro 2019.

    We present TL;DR First ever fault injection attack on Intel SGX enclaves. Abuses an undocumented software-based interface to undervolt the CPU. Extract full crypto keys and trigger memory safety violations in bug-free code. Read the paper at

    , , i još njih 3
    Poništi
  12. proslijedio/la je Tweet
    10. pro 2019.

    Full list of talks for is now up! Only 50 seats left!

    Poništi
  13. proslijedio/la je Tweet
    10. pro 2019.

    Grab those keyz and learn somebodies darkest secrets! by

    Poništi
  14. proslijedio/la je Tweet
    5. pro 2019.

    Excited to share that my "TEE Offensive Core" training will be featured at in August 2020! Humbled to be part of such an amazing lineup. See you in !

    Poništi
  15. proslijedio/la je Tweet
    2. pro 2019.

    I have been giving my "TEE Offensive Core" training several times during 2019. I would like to thank everyone who joined. You made it special. The detailed agenda (3-days) is now available here: Upcoming training dates and additional content soon!

    Poništi
  16. proslijedio/la je Tweet

    Short outline of my training in: 🇩🇪 Berlin (10-13 Feb 2020) • Static & dynamic module reversing • De/obfuscation • CVEs & cryptominer analysis • module vuln research • Fuzzing module & VM (standalone/browsers)

    Poništi
  17. proslijedio/la je Tweet
    19. stu 2019.

    You can download the slides of here: Some slides are missing because of speakers’ requests. will be held on Nov. 12~13, 2020 in Seoul.

    Poništi
  18. proslijedio/la je Tweet
    19. stu 2019.

    CNC + 's ChipSHOUTER + Xbox controller ⇢ millennial compatible electromagnetic fault injection!

    Poništi
  19. proslijedio/la je Tweet
    18. stu 2019.

    After 2 years, you are allowed to be jealous again! The new V2 is here! And I was lucky enough to receive one of the 1st examples. Awesome work by and \m/

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·