Pawel

@wipawel

Low Level Security: Hypervisors, Kernels and the like. I mostly break stuff. Offensive side of things.

Dresden, Germany
Vrijeme pridruživanja: siječanj 2013.

Tweetovi

Blokirali ste korisnika/cu @wipawel

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @wipawel

  1. proslijedio/la je Tweet
    20. pro 2019.
    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Branch Prediction – Fundamentals Every Programmer Need Not Know

    Poništi
  3. proslijedio/la je Tweet
    30. sij
    Poništi
  4. proslijedio/la je Tweet
    28. sij

    x86/64 man pages so that you can access documentation straight from the terminal!

    Poništi
  5. 26. sij
    Poništi
  6. proslijedio/la je Tweet
    19. sij
    Poništi
  7. 17. sij
    Poništi
  8. 16. sij

    Only ~70 years till C++ standards will suffer from the Y2K problem. 🤷🏻‍♂️

    Poništi
  9. proslijedio/la je Tweet
    5. sij

    Interesting paper qualitatively analyzing reverse engineering process & methods

    Poništi
  10. proslijedio/la je Tweet
    7. sij

    New blog post. ARM hardware bug. In the specification.

    Poništi
  11. proslijedio/la je Tweet
    7. sij

    Just a few days left until we reveal a huge part of the line up for RuhrSec 2020. Be prepared for our fifth edition – it will be great. 😀

    Poništi
  12. proslijedio/la je Tweet

    It's nice they have opinions about communism now, because once you're living in it you don't get to have an opinion about it anymore.

    Poništi
  13. proslijedio/la je Tweet

    Ever wanted to inject a shared library into an already-running linux process, without using ptrace? Well, now you can...

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    21. pro 2019.

    A short article on using LLDB to analyse a binary

    Poništi
  15. proslijedio/la je Tweet
    19. pro 2019.

    Academic Twitter is for bragging, right? Well, our paper, "SpecFuzz: Bringing Spectre-type vulnerabilities to the surface" has been accepted to 2020! In the paper, we show how you can detect with one simple trick

    Poništi
  16. proslijedio/la je Tweet
    18. pro 2019.
    Odgovor korisniku/ci

    Thanks to , , and from Not me. I just retweet a piece from their blogpost

    Poništi
  17. 18. pro 2019.
    Poništi
  18. 11. pro 2019.
    Poništi
  19. 10. pro 2019.

    Just published my first IDA plugin: analyze-binary-tools/check-init/ida_plugin. It allows to assess non-init to .init section references.

    Poništi
  20. proslijedio/la je Tweet

    "Ever since the discovery of Spectre and Meltdown at the beginning of 2018, my team at IBM Research – Zurich and I have been focusing very closely on the study of transient execution attacks." Speculator: A Microscope for Spectre-like Attacks Learn more:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·