candymate

88 posts

candymate banner
candymate

candymate

@siwu_network

Previously was in POSTECH-PLUS, now in KAIST hacking lab

เข้าร่วม Eylül 2011
32 กำลังติดตาม152 ผู้ติดตาม
candymate รีทวีตแล้ว
INSU YUN
INSU YUN@insu_yun·
Everyone wants to fuzz complex optimizations of WebAssembly compilers, but most approaches are simply considering grammars and types. Why can't we fuzz optimizations directly? We will share how we can do if we have systematically written optimization rules in S&P 2025 :)
INSU YUN tweet media
English
3
23
174
16.3K
candymate
candymate@siwu_network·
Just killed a Pixel 7 Pro... Not sure what I did wrong here... I'm very sad..😭
candymate tweet media
English
1
0
8
1.4K
candymate รีทวีตแล้ว
POSTECH PLUS
POSTECH PLUS@POSTECH_PLUS·
Cold Fusion got 6th place at DEF CON CTF Qualifier 2024 💙 Cold Fusion이 DEF CON CTF Qualifier 2024에서 6위를 차지했습니다! 😘 *PLUS is part of the "Cold Fusion", which is a collaboration team from South Korea 🇰🇷
POSTECH PLUS tweet media
English
0
8
26
2.2K
candymate รีทวีตแล้ว
TrendAI Zero Day Initiative
Confirmed!! Seunghyun Lee (@0x10n) of KAIST Hacking Lab used a UAF to RCE in the renderer on both #Micosoft Edge and #Google Chrome. He earns $85,000 and 9 Master of Pwn points. That also puts us over $1,000,000 for the event! #Pwn2Own
TrendAI Zero Day Initiative tweet media
English
1
14
88
21.6K
candymate รีทวีตแล้ว
TrendAI Zero Day Initiative
Boom! Seunghyun Lee (@0x10n) of KAIST Hacking Lab was able to successfully demonstrate his exploit of #Google Chrome. He's off to the disclosure call to provide us all the details before we bring in the Google team for disclosure. #Pwn2Own #P2OVancouver
English
0
15
55
10.1K
candymate รีทวีตแล้ว
Aanjhan Ranganathan
Aanjhan Ranganathan@tuxmaniac·
Big change coming to @USENIXSecurity starting 2025. "Starting with USENIX Security '25, we will be decoupling paper publication from paper presentation, so not all papers will have full-length talk presentations at the conference." usenix.org/blog/2023-usen…
English
2
16
47
43K
candymate รีทวีตแล้ว
candymate รีทวีตแล้ว
Dohyun Lee
Dohyun Lee@l33d0hyun·
This was exploited in the wild and is a Type Confusion vulnerability in Safari DFG JIT (CVE-2023-32439). This vulnerability causes type confusion because `EnumeratorNextUpdateIndexAndMode` and `HasIndexedProperty` are different DFG Nodes but share the same heap location kind.
aSiagaming@vngkv123

github.com/WebKit/WebKit/…

English
0
23
69
18.8K
candymate รีทวีตแล้ว
INSU YUN
INSU YUN@insu_yun·
I am happy to announce that "BaseComp: A Comparative Analysis for Integrity Protection in Cellular Baseband Software" is accepted to Usenix Security '23. This work is related to static analysis to find logical bugs in baseband firmware.
English
1
17
60
7.6K
candymate รีทวีตแล้ว
LaurieWired
LaurieWired@lauriewired·
This is Huge. A UCLA student may have just found the first feasible Indistinguishability Obfuscation (iO) scheme, based on well-understood cryptographic theories. In other words, imagine an obfuscator/packer that is nearly as difficult to crack as AES. The research validates the creation of an (iO) scheme for all polynomial-size circuits (i.e. computer programs of a reasonable size) Malware and DRM could start to get really, really interesting in the next few years. escholarship.org/content/qt7vq3…
LaurieWired tweet media
English
14
289
1K
150K
candymate รีทวีตแล้ว
Michele Campa
Michele Campa@s1ckb017·
I am really happy to announce that my research on adobe sandbox escape exploiting a windows CVE has been published on the Exodus Intelligence's blog blog.exodusintel.com/2023/04/06/esc…
English
3
103
276
37.6K