developer (@d3ve10per) 's Twitter Profile
developer

@d3ve10per

B.S. in CS & EE, GoN 20 / M.S. Student @ KAIST EE / github.com/rectcoordsystem / keybase.io/rectcoordsystem / @rectcoordsys

ID: 1039693212556746753

calendar_today12-09-2018 01:52:33

533 Tweet

251 Followers

275 Following

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Boom! Seunghyun Lee (Xion) of KAIST Hacking Lab was able to successfully demonstrate his exploit of #Google Chrome. He's off to the disclosure call to provide us all the details before we bring in the Google team for disclosure. #Pwn2Own #P2OVancouver

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed! Seunghyun Lee (Xion) of KAIST Hacking Lab used a UAF to get code execution in the #Google Chrome renderer. He earns $60,000 and 6 Master of Pwn points. #Pwn2Own

Confirmed! Seunghyun Lee (<a href="/0x10n/">Xion</a>) of KAIST Hacking Lab used a UAF to get code execution in the #Google Chrome renderer. He earns $60,000 and 6 Master of Pwn points. #Pwn2Own
Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

Confirmed!! Seunghyun Lee (Xion) of KAIST Hacking Lab used a UAF to RCE in the renderer on both #Micosoft Edge and #Google Chrome. He earns $85,000 and 9 Master of Pwn points. That also puts us over $1,000,000 for the event! #Pwn2Own

Confirmed!! Seunghyun Lee (<a href="/0x10n/">Xion</a>) of KAIST Hacking Lab used a UAF to RCE in the renderer on both #Micosoft Edge and #Google Chrome. He earns $85,000 and 9 Master of Pwn points. That also puts us over $1,000,000 for the event! #Pwn2Own
Yoonho Hwang (@youknow04) 's Twitter Profile Photo

> 업데이트 후 고객님의 비밀번호를 모두 소문자로 변경 해드렸습니다. 예전에 쓰던 증권사에서 암호화 모듈 업데이트 한다더니 점검 이후에 띄웠던 공지인데, 그쪽 IT팀의 최소 2가지의 심각한 문제를 너무 압축적으로 표현해서 이참에 공유해봄 ㅋㅋㅋ

developer (@d3ve10per) 's Twitter Profile Photo

BOJ 1753 최단경로 - 표준 라이브러리 없음 - 전역 변수 없음 (.bss, .data 없음) - 바이트코드에 NULL byte 없음 - 첫 instruction부터 시작 acmicpc.net/source/95732730

BOJ 1753 최단경로

- 표준 라이브러리 없음
- 전역 변수 없음 (.bss, .data 없음)
- 바이트코드에 NULL byte 없음
- 첫 instruction부터 시작

acmicpc.net/source/95732730
c0m0r1 (@c0m0r1) 's Twitter Profile Photo

“CROSS-X: Generalized and Stable Cross-Cache Attack on the Linux Kernel”, extended from my master’s thesis, has been accepted to ACM CCS 🎉 It explores how to make cross-cache attacks more stable and systematic. You can catch the talk on Oct. 14, 11:00–12:00 (Room 102, Track A5)

“CROSS-X: Generalized and Stable Cross-Cache Attack on the Linux Kernel”, extended from my master’s thesis, has been accepted to ACM CCS 🎉
It explores how to make cross-cache attacks more stable and systematic. You can catch the talk on Oct. 14, 11:00–12:00 (Room 102, Track A5)