Twitter | Search | |
Maxim Goryachy
Hardware/Software/Firmware/Intel ME Researcher. Opinions are my own and not the views of my employer.
416
Tweets
188
Following
3,277
Followers
Tweets
Maxim Goryachy retweeted
Black Hat Jan 19
. will present "Modern Secure Boot Attacks: Bypassing Hardware Root of Trust from Software" at 2019 in Singapore, March 26-29
Reply Retweet Like
Maxim Goryachy retweeted
Plato Mavropoulos Jan 19
ME Analyzer v1.80.0 is a big update with initial future platform support, new/improved CSE extensions, robust CSME/CSSPS chipset detection, proper structure revision switching, better CSE File System parsing & output logging, faster/cleaner CSE unpacking.
Reply Retweet Like
Maxim Goryachy retweeted
Black Hat Jan 14
. & detail how one can access the power of Intel’s VISA (Visualization of Internal Signals Architecture) to read PCH internal buses and other security-sensitive internal devices in 2019 Briefing
Reply Retweet Like
Maxim Goryachy Jan 14
Thanks to for the Amazon gift card (presented for the reported vulnerability: ) I've bought the nice books.
Reply Retweet Like
Maxim Goryachy retweeted
Alex Ionescu Jan 11
I made a thing:
Reply Retweet Like
Maxim Goryachy retweeted
InstLatX64 Jan 6
Reply Retweet Like
Maxim Goryachy retweeted
𝙺𝚎𝚎𝚜 𝙲𝚘𝚘𝚔 Dec 24
Linux kernel v4.20 has been released! I'm excited about the stackleak plugin, better kernel memory access faults for improved fuzzing, spectre v2 userspace mitigations, jump labels getting switched to read-only, and the end of VLAs (*whew*)!
Reply Retweet Like
Maxim Goryachy retweeted
Black Hat Dec 22
Modern Platform Controller Hub (PCH) and CPU contain a full-fledged logic signal analyzer, which allows monitoring the state of internal lines and buses in real time—a gold mine for researchers. Briefing by &
Reply Retweet Like
Maxim Goryachy retweeted
LolyRoP Dec 18
Intel CSE / CSME DAL applets SDK documentation are now public
Reply Retweet Like
Maxim Goryachy retweeted
Black Hat Dec 18
ICYMI: The first Briefings for Asia 2019 have been selected! Check out the latest research to be presented at in Singapore, March 26-29, 2019. More talks will be announced in early January.
Reply Retweet Like
Maxim Goryachy Dec 18
Our new talk “Intel VISA: Through the Rabbit Hole“ about Intel internals architecture has been accepted for 2019
Reply Retweet Like
Maxim Goryachy retweeted
Alex Matrosov Dec 13
Happy to announce all the chapters of now available in Early Access (~600 p). 4 years of writing/rewriting. The book almost a double the size from the original proposal (rootkits/bootkits, UEFI threats and modern forensics) Thx and !!
Reply Retweet Like
Maxim Goryachy retweeted
Smith Ilya Dec 2
I've just push my changes to IDA plugin to a branch reconstructable_type. This now allows you to reverse C++ easier, enjoy!
Reply Retweet Like
Maxim Goryachy Nov 28
“The Phantom Menace: Intel ME Manufacturing Mode” slides: team thanks for the good time!
Reply Retweet Like
Maxim Goryachy retweeted
VUSec Nov 21
Our work demonstrating exploits on -enabled systems (along with its companion paper) is now officially public ! Check out our project page and the paper:
Reply Retweet Like
Maxim Goryachy Nov 21
I want to thank organizers for interesting talks and great atmosphere. It was a pleasure to meet and many other people.
Reply Retweet Like
Maxim Goryachy retweeted
Mikhail Davidov Nov 20
Curious about how Secure Boot works with the Apple T2? I was too!
Reply Retweet Like
Maxim Goryachy retweeted
Sn0rkY Nov 21
Slides of our talk “Turning your BMC into a revolving door” are online cc: Alex.G
Reply Retweet Like
Maxim Goryachy retweeted
Maggie Jauregui Nov 20
New release available - CHIPSEC v1.3.6 courtesy of
Reply Retweet Like
Maxim Goryachy retweeted
Hardened-GNU/Linux Nov 18
PCI Express Device Security Enhancements
Reply Retweet Like