Tyler

37 posts

Tyler banner
Tyler

Tyler

@cvediver

views are my own RT ≠ endorsement

Washington, DC Katılım Şubat 2018
332 Takip Edilen54 Takipçiler
Tyler retweetledi
Tejas Kumar
Tejas Kumar@tejask·
Apple has become a true disgrace.
GIF
English
1.2K
870
20.5K
1.7M
Tyler retweetledi
Grant Slatton
Grant Slatton@GrantSlatton·
The junior dev asked the senior dev “why are you pushing this code with no abstraction? What if you want to change it in the future?” The senior dev responded “then I will change it in the future” In that moment the junior dev was enlightened
English
119
794
12.8K
1.1M
Tyler retweetledi
is-eqv.bsky.social
is-eqv.bsky.social@is_eqv·
@robertswiecki @mboehme_ I think there's still tons of work to do in harnessing complex targets E2E. Automatically extracting unit-test style harnesses for individual functions from a E2E, whole-process harness (think chrome, acrobat etc) would be a huge improvement and likely won't require ML/solvers
English
0
2
6
787
Tyler retweetledi
Marcel Böhme👨‍🔬
Marcel Böhme👨‍🔬@mboehme_·
@is_eqv @dvyukov Great point and Nyx-Net is an amazing work! When your input is a sequence of things, in order to maximize execs/sec you probably reduce the length of your sequences at the cost of missing interesting states reached only via long sequences. 1/2
English
1
1
1
404
Tyler
Tyler@cvediver·
So much for staged rollouts…
English
0
0
1
86
Julien Vanegue
Julien Vanegue@jvanegue·
We’re looking for software security experts to join us full time at @TechAtBloomberg ! If you love fuzzing, static analysis and security research, please reach out! :)
Manhattan, NY 🇺🇸 English
3
7
25
4.3K
Tyler
Tyler@cvediver·
The fact that @Starbucks has this sign but no paper towels has bothered me for years
Tyler tweet media
English
0
0
1
124
Tyler retweetledi
is-eqv.bsky.social
is-eqv.bsky.social@is_eqv·
download.vusec.net/papers/snappy_… <- cool paper on snapshot fuzzing! TL;DR: "taint trace how the input is used, snapshot at the point where it actually affects things". I think placing snapshots deeper in the code is how we automatically get "libfuzzer-perf" on "Nyx-complexity"-targets.
English
0
8
30
0
Tyler
Tyler@cvediver·
@seanhn @bas_van_schaik This was the idea behind @cetfor's PaperMachete, which is a pretty cool POC. I think that newer features in binja and performance improvements in the graph database could really help build on the approach
English
0
0
1
0
Sean Heelan
Sean Heelan@seanhn·
@bas_van_schaik Yep, what I am hoping to find though is something similar to CodeQL but for binaries. I have a property that I can, in theory, search for in source, but it would be way cleaner if I could express it over assembly code.
English
1
0
1
0
Sean Heelan
Sean Heelan@seanhn·
Just making sure I haven't missed something: There's no 'CodeQL, but for binaries', right? i.e. some sort of binary to database importer + a declarative datalog-esque language to describe search patterns.
English
11
3
46
0
Tyler retweetledi
Khaled Yakdan
Khaled Yakdan@KhaledYakdan·
Speaking of making #fuzzing more effective, we've extended #jazzer's API to give the fuzzer new signals depending on the program state. @fhenneke created an example showing how this helps #jazzer to solve the maze game discussed in the #IJON paper. GitHub: github.com/CodeIntelligen…
GIF
Khaled Yakdan@KhaledYakdan

Code coverage alone is often insufficient as a signal for fuzzers to trigger deep bugs. Integrating more signals representing the program state into the feedback loop can help the fuzzer to make more progress. This paper is an excellent example of how to do that.

English
1
8
41
0
Tyler retweetledi
Brandon Falk
Brandon Falk@gamozolabs·
Y'all should be striving to fuzz the binaries you run in prod, not some random cut out function in a hot loop without the rest of the system. Snapshot fuzzing is kind of the only way.
English
6
5
77
0
Tyler
Tyler@cvediver·
Now @Fidelity is asking for full account password over the phone using the numpad and symbols as stars. Best-case scenario is massively reduced search space for bruteforcing passwords in the event of a breach. What about phone auth is so challenging?
Tyler@cvediver

Criticizing @united's flagrant disregard for information security best practices devtty1er.com/20200713-unite…

English
0
0
0
0
Andrew Case
Andrew Case@attrc·
I am looking for resources (papers, blog posts, tools) related to static/dynamic program analysis that has the goal of getting malware to execute real payloads in non-intended environments (sandboxes, VMs, emulators). RTs appreciated! @BSaltaformaggio @moyix @pagabuc #DFIR
English
12
28
79
0
Tyler
Tyler@cvediver·
Since “Real ID” is trending, I thought I’d share something that has always amused me: the only documentation difference required for a Real ID vs a standard ID can essentially be “privilege escalated” by getting the standard ID and using the standard ID to get the Real ID.
Tyler tweet media
English
1
0
0
0
Creature Comforts
Creature Comforts@creaturebeer·
We’re excited to announce we are expanding our distribution footprint outside of Georgia for the first time! Be on the lookout for our beer in the Charleston and Hilton Head Island markets mid-May.
Creature Comforts tweet media
English
8
6
96
0
Tyler retweetledi
@joeycastillo@mastodon.social
@[email protected]@josecastillo·
Selected machine learning attacks; first in a series. 1. Cyberpunk 2. Looney Tunes 3. Magritte 4. Witchcraft
@joeycastillo@mastodon.social tweet media@joeycastillo@mastodon.social tweet media@joeycastillo@mastodon.social tweet media@joeycastillo@mastodon.social tweet media
English
42
5.4K
15.6K
0