Emanuele Cozzi

1.6K posts

Emanuele Cozzi

Emanuele Cozzi

@invano

malware&reversing

Francia Katılım Haziran 2009
691 Takip Edilen737 Takipçiler
Emanuele Cozzi retweetledi
Simone Aonzo
Simone Aonzo@packm4d·
🚨 New research from EURECOM & Univ. of Milan! [1/3] “Unveiling BYOVD Threats: Malware’s Use and Abuse of Kernel Drivers” (to appear at NDSS’26) reveals how malware exploits signed drivers to gain kernel privileges. This work led to the discovery of 7 unknown weaponized drivers💣
English
1
13
24
6.8K
Emanuele Cozzi retweetledi
NinjaLab
NinjaLab@NinjaLabFr·
We are very excited to share our last research work: 𝐄𝐔𝐂𝐋𝐄𝐀𝐊, authored by Thomas Roche. An electromagnetic Side-Channel Vulnerability in the ECDSA implementation of all Infineon security microcontrollers, notably impacting all YubiKey 5 Series. ninjalab.io/eucleak/
English
12
115
274
84K
Emanuele Cozzi retweetledi
Simone Aonzo
Simone Aonzo@packm4d·
In a few minutes I will present our work on Android evasive malware to @ASIACCS2024 [1]. What better occasion to reveal that DroidDungeon, the sandbox developed for this work, has evolved into a commercial product? Join the beta -> tnemesis.com
English
1
3
16
1.6K
Emanuele Cozzi retweetledi
Fabio Pagani
Fabio Pagani@pagabuc·
Excited to share (albeit with a little delay) that our @binarly_io talk about #LogoFAIL at BlackHat EU is available! Check it out to see the vulnerabilities we found in UEFI image parsing and their security implications: youtube.com/watch?v=ch0t2_…
YouTube video
YouTube
English
1
14
41
3.4K
Emanuele Cozzi retweetledi
Simone Aonzo
Simone Aonzo@packm4d·
We are setting up a user study to measure the impact of LLMs during the Reverse Engineering process. If you have ever used LLMs for reversing, click here to start the survey (5 mins) 👉 forms.gle/tKBdNjAKE5oyPq… You can leave your email address for the second phase-with prizes💰
English
0
12
11
2.3K
Emanuele Cozzi retweetledi
vx-underground
vx-underground@vxunderground·
The xz situation is absolutely insane and almost certainly state sponsored. This is an excellent example of a widely used software being maintained by basically one person. Read this web article and then frown and become sad. boehs.org/node/everythin…
English
56
868
5.4K
770K
Emanuele Cozzi retweetledi
rev.ng
rev.ng@_revng·
🚀 BIG ANNOUNCEMENT! 🚀 The full rev.​ng decompiler pipeline is now fully open source! Also, we'll soon start to invite people to participate in the UI closed beta. Check out our latest blog post: rev.ng/blog/open-sour…
rev.ng tweet media
English
1
93
341
32.7K
Emanuele Cozzi retweetledi
Zion Leonahenahe Basque
Zion Leonahenahe Basque@mahal0z·
I'm about 50% done integrating SAILR into angr master: github.com/angr/angr/issu… 🎉 P.S.: You can also use angr's decompiler more easily now. Try this out: ``` pip3 install angr && \ angr decompile /bin/true --functions main ```
English
0
19
59
8.1K
Emanuele Cozzi retweetledi
Antonio 's4tan' Parata
Sono lieto di annunciare la disponibilità del primo corso di malware analysis in italiano: "Introduzione alla malware analysis: Un approccio pratico" Oltre 9 ore di corso: t.ly/WPhap (utilizzate questo link, non cercate il corso su udemy ^^) condivisione gradita :)
Italiano
0
28
26
5K
Emanuele Cozzi retweetledi
Zion Leonahenahe Basque
2024 is the year of the decompiler! Start your year off right by reading a post on the last 30 years of decompilation and one of its hardest problems: structuring! mahaloz.re/dec-history-pt1 Part 2 to be released next week.
English
8
96
270
24.6K
Emanuele Cozzi retweetledi
Aurélien Francillon
Aurélien Francillon@aurelsec·
As WOOT becomes a more formal Conference, we want to keep receiving industry submissions! WOOT experiments a new model: in addition to the academic submissions, there is a practitioner's track. Submit a draft early, inerract with reviewers to get this written as a paper.
USENIX WOOT Conference on Offensive Technologies@wootsecurity

The USENIX WOOT '24 conference(!) draft CfP is out: usenix.org/conference/woo…. March 12 is the ⏰ for your offensive security papers! Or think academics should know about your work, but no experience writing formal papers? Submit a draft to the new practitioner track by Feb 20!

English
1
31
52
14.1K
Emanuele Cozzi retweetledi
Lukasz Olejnik
Lukasz Olejnik@lukOlejnik·
They HACKED A TRAIN. For real. Train operators asked for this to see why their trains didn't run after servicing. Turns out that vendor/producer implemented a geofence lock for trains serviced somewhere else. Amazing story, one of the best hacks in 2023. @q3k/111528165627522619" target="_blank" rel="nofollow noopener">social.hackerspace.pl/@q3k/111528165…
Lukasz Olejnik tweet media
English
29
851
3.4K
311.7K
Emanuele Cozzi retweetledi
tmp.0ut
tmp.0ut@tmpout·
Check it out, it's tmp.0ut Volume 3! tmpout.sh/3/
tmp.0ut tweet media
English
20
406
1K
176.2K
Emanuele Cozzi retweetledi
Tavis Ormandy
Tavis Ormandy@taviso·
New write-up on an Intel Ice Lake CPU vulnerability, we can effectively corrupt the RoB with redundant prefixes! 🔥 An updated microcode is available today for all affected products, cloud providers should patch ASAP. lock.cmpxchg8b.com/reptar.html
English
12
340
1.1K
412.8K
Emanuele Cozzi retweetledi
Zion Leonahenahe Basque
Zion Leonahenahe Basque@mahal0z·
I'm excited to announce a new decompilation control flow structuring algorithm, SAILR, which is the first to precisely revert compiler optimizations in decompilation. Find out how in our USENIX 2024 paper: zionbasque.com/files/publicat…. Code, info, and links in the 🧵
Zion Leonahenahe Basque tweet media
English
11
85
313
39.9K
Emanuele Cozzi retweetledi
Ian Beer
Ian Beer@i41nbeer·
Earlier this year @AmnestyTech and @_clem1 from Google TAG found an in-the-wild iPhone zero day full chain. Today I’m publishing my analysis of the Safari sandbox escape component, the first in-the-wild sample to break into the new Safari GPU process.
English
5
112
398
91.3K