Marcos Bajo (@h3xduck) 's Twitter Profile
Marcos Bajo

@h3xduck

PhD student at CISPA, cybersecurity researcher. Passionate about low-level programming, malware and security in general. My projects: github.com/h3xduck

ID: 1541094401497350144

linkhttps://h3xduck.github.io calendar_today26-06-2022 16:22:18

64 Tweet

341 Followers

102 Following

Saar Amar (@amarsaar) 's Twitter Profile Photo

New blogpost! I put together a thorough survey of security mitigations && architectures from the past few years. HW solutions, SW mitigations, and safe languages. CHERI, MTE, Rust, Swift, kalloc_type, Firebloom, GuardedMemcpy, CastGuard, and more! saaramar.github.io/memory_safety_…

Alfonso Muñoz, Phd (@mindcrypt) 's Twitter Profile Photo

Cerramos la semana con nueva ponencia aceptada - "TripleCross: A Linux eBPF Rootkit". Enhorabuena Marcos Sánchez y Juan Tapiador ;) #criptoredCON2023 Criptored /RootedCON Juan Tapiador - criptored.es/con/

Juan Tapiador (@0xjet) 's Twitter Profile Photo

We just published a study on attribution in the Android ecosystem. This is the first large-scale empirical analysis of the availability, volatility and overall suitability of publicly available market and app metadata for author attribution in Android markets. 1/

We just published a study on attribution in the Android ecosystem. This is the first large-scale empirical analysis of the availability, volatility and overall suitability of publicly available market and app metadata for author attribution in Android markets. 1/
Farenain (@farenain) 's Twitter Profile Photo

My friend jeppojeps - Antonio Nappa told me to write a book about Qemu focused on fuzzing some time ago during the worst times of the pandemy. Some months later we started to write something that these days became a real book: amazon.com/dp/B0BSNNBP1D?… that we called: Fuzzing Against the Machine

Juan Tapiador (@0xjet) 's Twitter Profile Photo

One year ago, we noticed that Roskomnadzor---Russia’s media regulator---deployed information control measures to block access to some Western media that were covering the invasion of Ukraine. Information controls are frequent in wartime, and so are manoeuvres to bypass them. 1/

/RootedCON (@rootedcon) 's Twitter Profile Photo

Marcos Bajo y Juan Tapiador nos vienen a contar sobre eBPF y sus usos para crear malware. Resumen, Marcos es un malote, y deduzco que Juan nos enseñará a cómo defendernos de eBPF; el chico bueno

<a href="/h3xduck/">Marcos Bajo</a> y <a href="/0xjet/">Juan Tapiador</a> nos vienen a contar sobre eBPF y sus usos para crear malware.

Resumen, Marcos es un malote, y deduzco que Juan nos enseñará a cómo defendernos de eBPF; el chico bueno
Marcos Bajo (@h3xduck) 's Twitter Profile Photo

If you want to learn about offensive eBPF and you missed our talk at RootedCON this year, you can now watch it on youtube!

Juan Tapiador (@0xjet) 's Twitter Profile Photo

Did you know that there is a powerful debugger embedded in Chromium-based browsers and that extensions can use it by requesting the ‘debugger’ permission? A thread about our upcoming EuroS&P 2023 paper, with Jos� Miguel and Narseo Vallina. (1/n)

Did you know that there is a powerful debugger embedded in Chromium-based browsers and that extensions can use it by requesting the ‘debugger’ permission?

A thread about our upcoming EuroS&amp;P 2023 paper, with <a href="/josemmooo/">Jos� Miguel</a> and <a href="/narseo/">Narseo Vallina</a>.

(1/n)
Juan Tapiador (@0xjet) 's Twitter Profile Photo

📢 PhD Position available in my group. Please RT! I will be recruiting a new PhD student to start soon after the summer break. The position is fully funded for up to 48 months. I will soon post an official announcement, but feel free to DM me for details if you're interested.

Juan Tapiador (@0xjet) 's Twitter Profile Photo

📢I'm hiring! Fully-funded PhD position in my group to work in the area of cyber threat analysis. More details about the position and how to apply here: 0xjet.github.io/openings.html DM || email me if you have questions. Deadline is Feb 20 but may be extended. Please RT for reach!

Christian Rossow (@rossow@infosec.exchange) (@chrossow) 's Twitter Profile Photo

We @CISPA discovered that attackers could trigger infinite message loops at the application layer between servers of popular protocols such as DNS, FTP, or NTP. To trigger such an infinite loop, attackers just have to send a single (!) IP-spoofed trigger message. 1/4

We @CISPA discovered that attackers could trigger infinite message loops at the application layer between servers of popular protocols such as DNS, FTP, or NTP. To trigger such an infinite loop, attackers just have to send a single (!) IP-spoofed trigger message. 1/4
Marcos Bajo (@h3xduck) 's Twitter Profile Photo

This year I'll be giving a talk at Black Hat USA (Las Vegas) and USENIX Security (Seattle). So excited!! We'll share more details soon :)

Black Hat (@blackhatevents) 's Twitter Profile Photo

In the #BHUSA Briefings course "Coroutine Frame-Oriented Programming: Breaking Control Flow Integrity by Abusing Modern C++," speakers will discuss Coroutine Frame-Oriented Programming (CFOP), a new exploitation technique that bypasses key CFI defenses (CET, CFG, LLVM CFI) on

Marcos Bajo (@h3xduck) 's Twitter Profile Photo

It's finally happening! I'm heading to Black Hat USA to discuss our latest public research. There will be data-only attacks, control flow hijacking, CFI bypasses and lots of crazy ideas going on. See you there!! Black Hat

It's finally happening! I'm heading to Black Hat USA to discuss our latest public research. There will be data-only attacks, control flow hijacking, CFI bypasses and lots of crazy ideas going on. See you there!!

<a href="/BlackHatEvents/">Black Hat</a>