Tweetovi

Blokirali ste korisnika/cu @yoavalon

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @yoavalon

  1. proslijedio/la je Tweet
    30. sij

    HWASAN (think of it as ASAN v2) has become available to developers on Android outside of Google. If you use C or C++ on Android, please give it a try. HWASAN is also available on Aarch64 Linux with a recent kernel.

    Poništi
  2. 30. sij

    I had the privilege of assisting on this research, great researcher and very interesting research! You should check it out if you're interested to know a bit of how a cloud provider works

    Poništi
  3. proslijedio/la je Tweet
    27. sij

    Throw in with 692 more repros for kernel bugs: Russian Roulette variation: you pick one of these, compile and run on your physical desktop/laptop; if it does not panic, your opponent picks one, and so on. (say, an out-of-bounds read may not crash)

    Poništi
  4. proslijedio/la je Tweet
    27. sij

    This KCOV extension by Andrey allows syzkaller to collect coverage from background kernel threads e.g. parsing incoming USB packets and unambiguously associate it with one of multiple parallel test processes running. To some degree unique for fuzzing coverage. Moar bugs coming!

    Poništi
  5. proslijedio/la je Tweet
    21. sij
    Poništi
  6. proslijedio/la je Tweet
    20. sij

    The wait is finally over! Registration & schedule for 2020 are live. Places are limited so register NOW:

    Poništi
  7. proslijedio/la je Tweet
    16. sij

    📢 Announcing better support for fuzzing with structured inputs in Rust! 📢 New releases of `cargo fuzz`, `libfuzzer-sys`, and `arbitrary` better support writing fuzz targets that take well-formed instances of custom input types. Details:

    Poništi
  8. proslijedio/la je Tweet
    18. sij

    RDP to RCE: When Fragmentation Goes Wrong AKA: What we know about CVE-2020-0609 and CVE-2020-0610.

    Poništi
  9. proslijedio/la je Tweet
    12. sij

    A bit late to the party but our write to Sicher² is up Thanks to , the magician of flags.

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    26. pro 2019.

    New blogpost: Sanitized Emulation with QEMU-AddressSanitizer I just open-sourced my QEMU patches to fuzz binaries with ASan, QASan. You can also use it with ARM targets on Linux, a thing that you can't do with LLVM ASan!

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    24. pro 2019.

    Is there anyone I know that happens to have a spare ticket :<?

    Poništi
  12. proslijedio/la je Tweet
    12. pro 2019.

    New WinDbg Preview rolling out! Biggest addition - a new timelines window for visualizing when things like exceptions, memory accesses, breakpoints, and function calls occur in your trace. Also quick at-a-glance tooltips for each event just by hovering!

    Poništi
  13. 4. pro 2019.
    Poništi
  14. 27. stu 2019.

    Already mentioned GWP-ASan before, Matt made a very short and concise talk about it

    Poništi
  15. 19. stu 2019.

    AWS's response to the Capital one Hacking - TL;DR - You have to issue a PUT request to get a token. The token must be used in all subsequent requests. requests with XFF are blocked.

    Poništi
  16. 19. stu 2019.
    Poništi
  17. 6. stu 2019.

    A writeup for the Gomium a 2019 challenge that I helped to solve

    Poništi
  18. proslijedio/la je Tweet
    4. stu 2019.

    2nd time at the 2nd place at , an honor, thank you for another awesome CTF, see you next year.

    Poništi
  19. 3. stu 2019.

    My team and I participated in and got to 2nd place! Very challenging CTF, thanks to the organizers

    Poništi
  20. proslijedio/la je Tweet
    24. lis 2019.

    ANNOUNCEMENT: Now open sourcing - coverage guided for . ported from our which is in turn inspired by go-fuzz which is in turn inspired by AFL:) Already found a bug in python stdLib.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·