Duc Dat Dau (@ducdatdau) 's Twitter Profile
Duc Dat Dau

@ducdatdau

🇻🇳hardware & *nix

ID: 1518281536063238144

linkhttp://ducdatdau.github.io calendar_today24-04-2022 17:31:56

56 Tweet

17 Takipçi

156 Takip Edilen

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

Intel Hardware Shield deep dive: part 1 is user-mode System Management Mode (ISRD). tandasat.github.io/blog/2024/02/2… ISRD is beautifully architected, and I have enjoyed studying it a lot. Excellent work by Intel.

Intel Hardware Shield deep dive: part 1 is user-mode System Management Mode (ISRD).
tandasat.github.io/blog/2024/02/2…

ISRD is beautifully architected, and I have enjoyed studying it a lot. Excellent work by Intel.
Theori (@theori_io) 's Twitter Profile Photo

Do you use a virtual machine to browse dangerous links safely? If you use the Chrome browser inside that virtual machine, is it secure enough? As you might have guessed, the answer is not so much. We chained six unique CVEs from 2023 listed below. • Chrome Renderer RCE :

Andrew Côté (@andercot) 's Twitter Profile Photo

Few people realize Apple has quietly patented an AirPod capable of detecting electrical signals from brain activity and extracting features. Millions of neural-tech I/O devices may be hitting the markets sooner than we think

Few people realize Apple has quietly patented an AirPod capable of detecting electrical signals from brain activity and extracting features.

Millions of neural-tech I/O devices may be hitting the markets sooner than we think
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Compilers, linkers, JITs and assemblers Internals (focus on software security hardening) Low-Level Software Security for Compiler Developers: llsoftsec.github.io/llsoftsecbook/ #compilers #cybersecurity

Compilers, linkers, JITs and assemblers Internals (focus on software security hardening)

Low-Level Software Security for Compiler Developers:
llsoftsec.github.io/llsoftsecbook/

#compilers #cybersecurity
zhiniang peng (@edwardzpeng) 's Twitter Profile Photo

Here is our slides for Zer0con 2024, Escaping the Sandbox (Chrome and Adobe Pdf Reader) on Windows sites.google.com/site/zhiniangp…

Here is our slides for Zer0con 2024, Escaping the Sandbox (Chrome and Adobe Pdf Reader) on Windows sites.google.com/site/zhiniangp…
2019 (@r3tr0spect2019) 's Twitter Profile Photo

Haven't played CTF and V8 for a while, but recently solved the V8 SBX challenge in the HITCON CTF. This is my write-up: mem2019.github.io/jekyll/update/…

Pumpkin 🎃 (@u1f383) 's Twitter Profile Photo

I was curious about how the Linux kernel implements RCU, so I analyzed the source code to understand the execution flow. Feel free to check it out and let me know if you find any mistakes.🙂 u1f383.github.io/linux/2024/09/…

Denis Laskov 🇮🇱 (@it4sec) 's Twitter Profile Photo

SIMurai is software that emulates a SIM card, which helps in fuzzing modem firmware for vulnerabilities or testing SIM spyware. 🚗📡🔨 Connected cars included :) Research Paper: usenix.org/system/files/u… Presentation: usenix.org/system/files/u… Source code: github.com/tomasz-lisowsk…

SIMurai is software that emulates a SIM card, which helps in fuzzing modem firmware for vulnerabilities or testing SIM spyware. 🚗📡🔨

Connected cars included :)

Research Paper: usenix.org/system/files/u…
Presentation: usenix.org/system/files/u…
Source code: github.com/tomasz-lisowsk…
Dor (@dor00tkit) 's Twitter Profile Photo

Debugging the Windows Hypervisor and dissecting Secure Kernel calls – my latest blog post takes you through the process, step-by-step. dor00tkit.github.io/Dor00tkit/post… #Hyperv #ReverseEngineering

Pumpkin 🎃 (@u1f383) 's Twitter Profile Photo

Dropped my slide for POC2024 on Linux kernel exploitation, including a journal from Pwn2Own Vancouver earlier this year. Enjoy 🙂. u1f383.github.io/slides/talks/2…

r3kapig (@r3kapig) 's Twitter Profile Photo

Happy New Year! We spent some time backing up most of the CTF challenges for 2024 (there are bound to be incomplete cases) The attachments and title descriptions we have compiled and some writeup. Now We open it to the community. hope it can help u r3kapig-not1on.notion.site/2024-6ad9c7554…

Mustufa Khan (@themustufakhan) 's Twitter Profile Photo

This tiny team tricked Silicon Valley: Overhyped their AI Reached $2 BILLION valuation Invited to elite tech conferences Created mass panic among developers But one software engineer spotted a fatal flaw—and everything unraveled. Here's the outrageous story:🧵

This tiny team tricked Silicon Valley:

Overhyped their AI
Reached $2 BILLION valuation
Invited to elite tech conferences
Created mass panic among developers

But one software engineer spotted a fatal flaw—and everything unraveled.

Here's the outrageous story:🧵
Crusaders of Rust (@cor_ctf) 's Twitter Profile Photo

Here is our 0day for kernelCTF🩸 - 82k bounty - quickest submission ever - all instances pwned😎 syst3mfailure.io/rbtree-family-… Disclaimer: We apologize for abusing the red black tree family. Turning grandparents against grandchildren is only acceptable in the context of pwn😤

International Cybersecurity Challenge TOKYO 2025 (@icctokyo2025) 's Twitter Profile Photo

【The official website of the ICC2025 is OPEN】 We have launched our website of the International Cybersecurity Challenge TOKYO 2025. Please visit us to find out the latest information about the ICC2025. icctokyo2025.nisc.go.jp/en/ #icctokyo2025

【The official website of the ICC2025 is OPEN】
We have launched our website of the International Cybersecurity Challenge TOKYO 2025. Please visit us to find out the latest information about the ICC2025.
icctokyo2025.nisc.go.jp/en/
#icctokyo2025
Lukasz Olejnik (@lukolejnik) 's Twitter Profile Photo

Chinese scientists have developed the best shortest-path algorithm in 41 years! A team from Tsinghua University has broken Dijkstra’s “sorting barrier” — the first improvement since 1984. The new algorithm runs in O(m \log^{2/3} n) time. Potential applications? Faster shorter

Chinese scientists have developed the best shortest-path algorithm in 41 years! A team from Tsinghua University has broken Dijkstra’s “sorting barrier” — the first improvement since 1984. 
The new algorithm runs in O(m \log^{2/3} n) time. Potential applications? Faster shorter