|
Alex “neat” A.
@
NeatMonster_
Toulouse, France
|
|
Security engineering by day; reversing, exploiting and tools development by night. You can find all of my projects at github.com/NeatMonster
|
|
|
133
Tweetovi
|
183
Pratim
|
505
Osobe koje vas prate
|
| Tweetovi |
| Alex “neat” A. proslijedio/la je tweet | ||
|
Panda
@pandasec_
|
27. pro |
|
If you're interested in Samsung's TrustZone, the talk I gave at #BHUSA2019 is online. It presents the work we did with @NeatMonster_ and @patateQbool at @quarkslab.
We are at #36c3 if you want to come say hi. :)
youtu.be/uXH5LJGRwXI
|
||
|
|
||
| Alex “neat” A. proslijedio/la je tweet | ||
|
quarkslab
@quarkslab
|
17. pro |
|
[BLOG] A Deep Dive Into Samsung's TrustZone (Part 2) blog.quarkslab.com/a-deep-dive-in… by @NeatMonster_, @patateQbool and @pandasec_
|
||
|
|
||
| Alex “neat” A. proslijedio/la je tweet | ||
|
quarkslab
@quarkslab
|
10. pro |
|
[BLOG] A Deep Dive Into Samsung's TrustZone (Part 1) blog.quarkslab.com/a-deep-dive-in… by @NeatMonster_, @patateQbool and @pandasec_
|
||
|
|
||
|
Alex “neat” A.
@NeatMonster_
|
1. stu |
|
Would you mind submitting a Pull Request in the original repository?
github.com/NeatMonster/mc…
|
||
|
|
||
|
Alex “neat” A.
@NeatMonster_
|
25. lis |
|
Content de savoir que MCExplorer a pu vous être utile avant que l'API Python soit disponible. :-)
|
||
|
|
||
| Alex “neat” A. proslijedio/la je tweet | ||
|
|
Yifan
@yifanlu
|
17. kol |
|
Glitching a $20k Piece of History yifan.lu/2019/08/16/gli…
|
||
|
|
||
| Alex “neat” A. proslijedio/la je tweet | ||
|
Mobile Security
@mobilesecurity_
|
12. kol |
|
Breaking Samsung's ARM TrustZone
#MobileSecurity #AndroidSecurity
#BHUSA2019 [SLIDES] by @quarkslab
(@pandasec_ @NeatMonster_ @patateQbool)
i.blackhat.com/USA-19/Thursda… pic.twitter.com/H3oHhk67T9
|
||
|
|
||
| Alex “neat” A. proslijedio/la je tweet | ||
|
Siguza
@s1guza
|
8. kol |
|
APRR: Of Apple hardware secrets. siguza.github.io/APRR/
Might include a free 0day.
|
||
|
|
||
|
Alex “neat” A.
@NeatMonster_
|
6. kol |
|
Breaking Samsung's ARM TrustZone
blackhat.com/us-19/briefing…
|
||
|
|
||
|
Alex “neat” A.
@NeatMonster_
|
6. kol |
|
Sad to not being able to make it to @BlackHatEvents this year. Huge thanks to my colleague and friend @pandasec_ for presenting our work on his own. Don't miss his talk, he has a put a lot of work into it!
|
||
|
|
||
|
Alex “neat” A.
@NeatMonster_
|
4. srp |
|
I'm currently writing a Ghidra disassembler/decompiler plugin for Hexagon. If anyone's willing to help, fell free to ping me.
|
||
|
|
||
| Alex “neat” A. proslijedio/la je tweet | ||
|
hardwear.io
@hardwear_io
|
11. lip |
|
|
||
|
Alex “neat” A.
@NeatMonster_
|
5. lip |
|
It would have been a pleasure talking to you. Mais ce n'est que partie remise, as we'd say. :)
|
||
|
|
||
| Alex “neat” A. proslijedio/la je tweet | ||
|
Black Hat
@BlackHatEvents
|
3. lip |
|
Using Samsung's TrustZone implementation as a target, @pandasec_ & @NeatMonster_ & @patateQbool explain and demonstrate how this new attack surface can be leveraged to hijack and exploit trusted components in their Briefing at #BHUSA ow.ly/7gmI30oRAXm
|
||
|
|
||
| Alex “neat” A. proslijedio/la je tweet | ||
|
hardwear.io
@hardwear_io
|
9. svi |
|
Gain a solid understanding of the underlying mechanisms used in popular ARM TrustZone implementations by @NeatMonster_ & @patateQbool at #hardwear_io US. More training info: bit.ly/2TAR9V8 pic.twitter.com/BVZS7u9Pz7
|
||
|
|
||
| Alex “neat” A. proslijedio/la je tweet | ||
|
Panda
@pandasec_
|
9. svi |
|
Our talk "Attacking Samsung's ARM TrustZone" has been accepted at #BHUSA! \o/
cc @patateQbool @NeatMonster_ @BlackHatEvents
blackhat.com/us-19/briefing…
|
||
|
|
||
| Alex “neat” A. proslijedio/la je tweet | ||
|
Samuel Groß
@5aelo
|
7. svi |
|
|
||
| Alex “neat” A. proslijedio/la je tweet | ||
|
Sébastien Dudek
@FlUxIuS
|
2. svi |
|
My #TR19 NGI slides about 'mobile devices attacks in practice' have been update! This fixes mistakes reported by @lapinhib0u (thanks again!) on the introduction slide and adds up few more information + few asked links: synacktiv.com/ressources/Tro…
|
||
|
|
||
| Alex “neat” A. proslijedio/la je tweet | ||
|
Keegan Ryan
@inf_0_
|
23. tra |
|
I used high-powered branch-predictor and memory side channels to extract private keys from Qualcomm's TrustZone keystore. Check it out: nccgroup.trust/us/our-researc…
|
||
|
|
||
| Alex “neat” A. proslijedio/la je tweet | ||
|
quarkslab
@quarkslab
|
17. tra |
|
[BLOG] Reverse-engineering Broadcom wireless chipsets by @Phenol__ blog.quarkslab.com/reverse-engine… The long and good trip of an intern, then the long and sad disclosure timeline of 5 vulnerabilities. Thx to @Broadcom we dont know what is vulnerable...
|
||
|
|
||