Twitter | Pretraživanje | |
Alex “neat” A.
Security engineering by day; reversing, exploiting and tools development by night. You can find all of my projects at
133
Tweetovi
183
Pratim
505
Osobe koje vas prate
Tweetovi
Alex “neat” A. proslijedio/la je tweet
Panda 27. pro
If you're interested in Samsung's TrustZone, the talk I gave at is online. It presents the work we did with and at . We are at if you want to come say hi. :)
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. proslijedio/la je tweet
quarkslab 17. pro
[BLOG] A Deep Dive Into Samsung's TrustZone (Part 2) by ,   and
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. proslijedio/la je tweet
quarkslab 10. pro
[BLOG] A Deep Dive Into Samsung's TrustZone (Part 1) by , and
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. 1. stu
Odgovor korisniku/ci @Fox0x01
Would you mind submitting a Pull Request in the original repository?
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. 25. lis
Odgovor korisniku/ci @Amossys_labs @Amossys
Content de savoir que MCExplorer a pu vous être utile avant que l'API Python soit disponible. :-)
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. proslijedio/la je tweet
Yifan 17. kol
Glitching a $20k Piece of History
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. proslijedio/la je tweet
Mobile Security 12. kol
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. proslijedio/la je tweet
Siguza 8. kol
APRR: Of Apple hardware secrets. Might include a free 0day.
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. 6. kol
Odgovor korisniku/ci @BlackHatEvents @pandasec_
Breaking Samsung's ARM TrustZone
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. 6. kol
Sad to not being able to make it to this year. Huge thanks to my colleague and friend for presenting our work on his own. Don't miss his talk, he has a put a lot of work into it!
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. 4. srp
Odgovor korisniku/ci @alisaesage
I'm currently writing a Ghidra disassembler/decompiler plugin for Hexagon. If anyone's willing to help, fell free to ping me.
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. proslijedio/la je tweet
hardwear.io 11. lip
Odgovor korisniku/ci @hardwear_io
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. 5. lip
Odgovor korisniku/ci @MrNbaYoh
It would have been a pleasure talking to you. Mais ce n'est que partie remise, as we'd say. :)
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. proslijedio/la je tweet
Black Hat 3. lip
Using Samsung's TrustZone implementation as a target, & & explain and demonstrate how this new attack surface can be leveraged to hijack and exploit trusted components in their Briefing at
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. proslijedio/la je tweet
hardwear.io 9. svi
Gain a solid understanding of the underlying mechanisms used in popular ARM TrustZone implementations by & at US. More training info:
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. proslijedio/la je tweet
Panda 9. svi
Our talk "Attacking Samsung's ARM TrustZone" has been accepted at ! \o/ cc
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. proslijedio/la je tweet
Samuel Groß 7. svi
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. proslijedio/la je tweet
Sébastien Dudek 2. svi
My NGI slides about 'mobile devices attacks in practice' have been update! This fixes mistakes reported by (thanks again!) on the introduction slide and adds up few more information + few asked links:
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. proslijedio/la je tweet
Keegan Ryan 23. tra
I used high-powered branch-predictor and memory side channels to extract private keys from Qualcomm's TrustZone keystore. Check it out:
Reply Retweet Označi sa "sviđa mi se"
Alex “neat” A. proslijedio/la je tweet
quarkslab 17. tra
[BLOG] Reverse-engineering Broadcom wireless chipsets by The long and good trip of an intern, then the long and sad disclosure timeline of 5 vulnerabilities. Thx to we dont know what is vulnerable...
Reply Retweet Označi sa "sviđa mi se"