Twitter | Search | |
Maxim Goryachy
Hardware/Software/Firmware/Intel ME Researcher PGP:7084 4A8B 4D47 9B7C
338
Tweets
154
Following
3,027
Followers
Tweets
Maxim Goryachy retweeted
Mark Ermolov Jul 17
Intel quietly fixes RCE in AMT (CVE-2018-3628): . Admin credentials aren't needed
Reply Retweet Like
Maxim Goryachy retweeted
Mark Ermolov Jul 17
One more abitrary code execution in Intel ME 11.x for attacker with local access (CVE-2018-3627)
Reply Retweet Like
Maxim Goryachy retweeted
Mark Ermolov Jul 3
Intel datasheets for Apollo Lake SoC have leaked a large amount of information concering internal workings of PCH and Management Engine. In particular, they revealed Minute IA System Agent (MISA), a first device from which CSME starts working with HW in ROM
Reply Retweet Like
Maxim Goryachy retweeted
The Hacker News Jun 29
Warning—Github Account of Gentoo Distribution Hacked Yesterday; Source Code Replaced with "All Gentoo Code Hosted on Should for the Moment be Considered Compromised." | by
Reply Retweet Like
Maxim Goryachy retweeted
Rodrigo Branco Jun 21
We’ve recently presented () a paper () in the IEEE LangSec 2018 workshop. In that, we’ve made a huge mistake of not properly crediting for the exploit primitive properties we use in the model. 1/3
Reply Retweet Like
Maxim Goryachy retweeted
j00ru//vx Jun 21
In summary of the last ~1.5 years of my work, I wrote a comprehensive whitepaper on the limitations of C language, kernel infoleaks, Bochspwn Reloaded and many related topics. It's out now! Thanks to all involved. Feels good 😎
Reply Retweet Like
Maxim Goryachy Jun 20
Reply Retweet Like
Maxim Goryachy retweeted
Alexander Popov Jun 19
I've just published the 'kconfig-hardened-check' - a script for checking the hardening options in the Linux kernel config. Nobody likes checking configs manually. So let the computers do their job!
Reply Retweet Like
Maxim Goryachy retweeted
Rodrigo Branco Jun 16
We've just published the video for Matrosov's ( ) talk in (Betraying the BIOS: Where the Guardians of the BIOS are Failing) - ()
Reply Retweet Like
Maxim Goryachy retweeted
Noise Security Bit Jun 6
Грядёт новый эпизод 🎙 0x19 “о ML/AI и его реальной применимости в задачах ИБ”. С участием: Прямая трансляция на твич канале в 23:00 по МСК 📺 Приходите в чат задавать вопросы и услышать нас первыми!
Reply Retweet Like
Maxim Goryachy Jun 6
Hm, Does ME-core have a something interesting capabilities?)
Reply Retweet Like
Maxim Goryachy retweeted
Frank Denis Jun 5
Intel will launch a 28-core 5GHz CPU by the end of the year
Reply Retweet Like
Maxim Goryachy retweeted
Hardened-GNU/Linux Jun 5
Secure Processors Part II: Intel SGX Security Analysis and MIT Sanctum Architecture
Reply Retweet Like
Maxim Goryachy retweeted
Hardened-GNU/Linux Jun 5
Secure Processors Part I: Background, Taxonomy for Secure Enclaves and Intel SGX Architecture
Reply Retweet Like
Maxim Goryachy Jun 4
Our (with & ) new presentation about security keys in ME11 and DLMP partition which allows to get a main ME secret.
Reply Retweet Like
Maxim Goryachy Jun 1
Apple fixes vulnerability which we found in MacBook’s EFI. Great thanks to . We will disclose details in the near future.
Reply Retweet Like
Maxim Goryachy retweeted
Matt Suiche May 31
Color syntaxing in Windbg! Finally!!
Reply Retweet Like
Maxim Goryachy May 29
I think not;)
Reply Retweet Like
Maxim Goryachy retweeted
Jonathan Jogenfors May 28
Very nice write-up on the lack of collision resistance in the Curl hash function previously used by the cryptocurrency. Includes source code for generating collisions, formal proofs, and will be the final say in this debate.
Reply Retweet Like
Maxim Goryachy retweeted
Plato Mavropoulos May 28
Replying to @platomaniac
Update. From what I can tell CVE-2018-3627/3628/3629/3632 relate to Field Programmable Fuse (FPF, Intel's OTP implementation) issues which should be disclosed on June 11th (~6 months window) with their own detection utility. Firmware fixes available since February (VCN >= 278).
Reply Retweet Like