Twitter | Pretraživanje | |
Alexander Ermolov
Security researcher. Low-level design, BIOS and other firmwares, system software
143
Tweetovi
69
Pratim
642
Osobe koje vas prate
Tweetovi
Alexander Ermolov proslijedio/la je tweet
Daniel Maslowski 1. velj
I am quite exhausted from the sheer complexity of the research I have been doing, having just spoken about the ME at . Now it's your turn: Please look into it as well and post your follow-up insights! ✨👩🏻‍💻 Slides: Video will follow.
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov proslijedio/la je tweet
offensivecon 21. sij
Untrusted Roots: exploiting vulnerabilities in Intel ACMs by
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov proslijedio/la je tweet
Peter Bosch 31. pro
Slightly late, but here's the slides to my talk: . Contains some useful bonus slides and links, somewhere in the next few days I will add more references to prior work on this subject.
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov proslijedio/la je tweet
Nikolaj Schlej 19. pro
A new set of "Mac firmware security" pages are finally out, thanks to . Check it out, it's what me and my teammates at Apple had beet working on really damn hard for the last several years.
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov proslijedio/la je tweet
Xeno Kovah 22. stu
Check it out for more about the first-in-the-world work & Rafal Wojtczuk have done for UEFI DMA protection and UEFI sandboxing of PCIe Option ROMs
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov proslijedio/la je tweet
axi0mX 🌧️📲 24. lis
": The iPhone Exploit That Hackers Use to Research Apple’s Most Sensitive Code" This is what the title of this write-up would be if it was a VICE article. This is a detailed write-up of the vulnerability I found and how the exploit really works.
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov proslijedio/la je tweet
Platform Security Summit 22. lis
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov proslijedio/la je tweet
Digital Security 18. lis
checkm8-arduino PoC - the checkm8 port for Arduino and USB Host Shield.
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov proslijedio/la je tweet
Peter Bosch 11. lis
I've started writing a series of articles about reverse engineering the Management Engine, I've just uploaded the first two: , and
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov proslijedio/la je tweet
axi0mX 🌧️📲 27. ruj
EPIC JAILBREAK: Introducing checkm8 (read "checkmate"), a permanent unpatchable bootrom exploit for hundreds of millions of iOS devices. Most generations of iPhones and iPads are vulnerable: from iPhone 4S (A5 chip) to iPhone 8 and iPhone X (A11 chip).
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov proslijedio/la je tweet
Intel STORM 26. ruj
We've just released a new paper "New Memory Type Against Speculative Side-Channel Attacks". Read it here:
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov proslijedio/la je tweet
Piotr Bania 17. ruj
Some new bug of mine: AMD Radeon Shader Functionality Remote Code Execution -
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov proslijedio/la je tweet
dump_stack() 30. kol
lpe is a collection of verified Linux kernel exploits. Exploit testing is fully automated. Feel free to make a pull request with a new exploit to see it by yourself 😉 The end goal is to collect all public exploits that actually work.
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov proslijedio/la je tweet
Check Point Research 20. kol
[CPR-Zero] CVE-2019-1159 (Windows 10 Kernel): Use-After-Free in the GetDCEx function in win32kfull.sys.
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov proslijedio/la je tweet
Alex Matrosov 18. kol
I wrote a blog post "Breaking Through Another Side: Bypassing Firmware Security Boundaries". It's a first part of the series based on our research with Alexandre Gazet. HW/FW Security != Summary of all Security Boundaries
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov 15. kol
Odgovor korisniku/ci @hardenedlinux @yanaimoyal @hasarfaty
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov 15. kol
Odgovor korisniku/ci @hardenedlinux
Does it support System Management Mode? :)
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov proslijedio/la je tweet
HITBMedia 14. kol
presents a flaw in the UEFI microcode loader which tricks it into downgrading the CPU microcode, opening up exploitation of patched vulnerabilities in Authenticated Code Modules and the bypassing of hardware-based trusted/measure boot
Reply Retweet Označi sa "sviđa mi se"
Alexander Ermolov proslijedio/la je tweet
Mobile Security 12. kol
Reply Retweet Označi sa "sviđa mi se"