nSinus-R (@[email protected])

663 posts

nSinus-R (@nsr@infosec.exchange)

nSinus-R (@[email protected])

@nSinusR

Captures flags with @TeamTasteless. Assistant Professor at @unibirmingham and maintainer of FirmWire & avatar2.

Katılım Ağustos 2011
447 Takip Edilen2K Takipçiler
nSinus-R (@[email protected]) retweetledi
Tobias Scharnowski
Tobias Scharnowski@ScepticCtf·
A virtual iteration of our training on fuzzing custom embedded systems is coming up end of March. One cool story about this: The participants of our training in 2024 exploited a bunch of devices at Pwn2Own Tokyo 2026!🔥 Details: ringzer0.training/countermeasure…
Tobias Scharnowski tweet media
English
0
1
10
1.1K
nSinus-R (@[email protected]) retweetledi
stacksmashing
stacksmashing@ghidraninja·
En route to #39c3 - come to our talk at 4pm! I will only be there today and tomorrow, but happy to meet-up & chat. Also, if you are at #39c3 and often dump SPI flash-chips please let me know, I might have something for you that I'm looking for feedback on 🙂
stacksmashing tweet media
English
2
7
54
11.5K
nSinus-R (@[email protected]) retweetledi
hardwear.io
hardwear.io@hardwear_io·
🤩A hush settles as the RP2350’s challengers—Marius Muench and Thomas Roth—begin their story What started as a public hacking challenge became a trail of breakthroughs, from unverified vector boots to secrets pulled straight out of OTP memory. 👉hardwear.io/netherlands-20… #RP2350
hardwear.io tweet media
English
0
1
4
600
nSinus-R (@[email protected]) retweetledi
lukas seidel
lukas seidel@pr0me·
I absolutely love this paper, so much reverse engineering alpha the researchers who won the rpi hacking challenge came together to describe in detail how they overcame the defenses of a secure-by-design chip, incl. custom laser fault injection and single instruction skips
lukas seidel tweet media
English
4
48
189
15.4K
nSinus-R (@[email protected]) retweetledi
Google VRP (Google Bug Hunters)
We have an exciting piece of vulnerability research 🕵️‍♂️ to share, conducted in collaboration with external researchers from VU Amsterdam. Find out more about the L1TF vulnerability, a CPU vulnerability on some Intel CPUs (Skylake and older). goo.gle/3I69VDv
English
4
41
147
15.7K
nSinus-R (@[email protected]) retweetledi
lukas seidel
lukas seidel@pr0me·
new baseband rehosting research just dropped! BaseBridge dynamically identifies relevant regions from a memory dump which are then loaded into the FirmWire emulator to enrich global state. this leads to way higher fidelity, more coverage during fuzzing, and finally more bugs.
lukas seidel tweet media
English
1
22
101
8.5K
nSinus-R (@[email protected]) retweetledi
Daniel Klischies
Daniel Klischies@danielklischies·
📢 Excited to announce that the results on BaseBridge, our project on improving cellular baseband emulation, are going public this week. @dyonwg_ will present at @IEEESSP on Monday 3pm, while David and I will be on stage at @offensive_con on Saturday 11am with more details! 1/6
English
1
4
28
3.1K
nSinus-R (@[email protected]) retweetledi
ACM SURE Workshop
ACM SURE Workshop@sureworkshop·
We are excited to announce that the 1st Workshop on Software Understanding and Reverse Engineering (SURE) will be co-located at ACM CCS 2025 in Taiwan! We invite the community to submit their awesome research sure-workshop.org. So, what is SURE? More in the 🧵
English
1
10
27
2.6K
nSinus-R (@nsr@infosec.exchange)
Results of the RP2350 Hacking Challenge are now public - I'm happy that my entry qualified as one of the winning breaks! Also huge shout out to the other winners: @aedancullen, Kévin Courdesses, @IOActive & @hextreeio - awesome work! Thanks for the challenge @Raspberry_Pi!
Raspberry Pi@Raspberry_Pi

Security through transparency: all chips have vulnerabilities, and most vendors' strategy is not to talk about them. In contrast, we aim to find and fix them. Read the results of our RP2350 Hacking Challenge: rpltd.co/rp2350-challen…

English
3
4
38
2.3K