Dr Andrew Fasano (@andrewfasano) 's Twitter Profile
Dr Andrew Fasano

@andrewfasano

Account inactive as of 2022

ID: 15323094

linkhttps://andrewfasano.com calendar_today05-07-2008 03:51:43

438 Tweet

549 Takipçi

618 Takip Edilen

Perri Adams (@perribus) 's Twitter Profile Photo

In which Brandon graces us with his transcendent 🤯 Rust skills 🦀 by leveraging the power of Linux Kernel technology 🐧 and AI 🤖 to solve h0mbre’s parsing question by pulling down a copy of the image he tweeted and OCRing 📖 it as Middle English ⚔️

In which Brandon graces us with his transcendent 🤯 Rust skills 🦀 by leveraging the power of Linux Kernel technology 🐧 and AI 🤖 to solve <a href="/h0mbre_/">h0mbre</a>’s parsing question by pulling down a copy of the image he tweeted and OCRing 📖 it as Middle English ⚔️
Richard Johnson (@richinseattle) 's Twitter Profile Photo

Okay Brandon Falk just blew my mind with this knowledge that x86 is an octal machine. How is this not more commonly understood. The opcode mods use values that are obvious enums when you see them displayed as octal. gist.github.com/seanjensengrey…

Willi Ballenthin (@williballenthin) 's Twitter Profile Photo

short post introducing `biodiff`, a tool by 8051 enthusiast for diffing binary files, and how you might use it to find malware configuration changes. the UI is really quick and the algorithms handle file alignment very well. williballenthin.com/post/2022-03-0…

short post introducing `biodiff`, a tool by <a href="/8051Enthusiast/">8051 enthusiast</a> for diffing binary files, and how you might use it to find malware configuration changes. the UI is really quick and the algorithms handle file alignment very well.

williballenthin.com/post/2022-03-0…
Nick G (@kallsyms) 's Twitter Profile Photo

My turn to add to the Linux security "fun" of the past few weeks :) I walk through the entire process of discovering and exploiting CVE-2022-25636, a 0day in the Linux kernel. nickgregory.me/linux/security…

Tavian Barnes (@tavianator) 's Twitter Profile Photo

vaguely burnt waffle Tyson Key Diadem Salawu Like x86 CPUs booting in real mode, the LLAM (Low Level Actual Machine) will boot in LLVM 1, with higher versions enabled gradually during the boot process

Winnona 💾 (@__winn) 's Twitter Profile Photo

🚨Linux Kernel Security Blog🚨 Corporate, automated bug-finders in the #linux kernel- how much do we know about them? Dave Aitel Ian Roos and I look @ closed source, corporate interests in the world’s biggest open source project. THREAD 🧵 margin.re/media/watching…

Brendan Dolan-Gavitt (@moyix) 's Twitter Profile Photo

In just 10 minutes, Zhenghao Hu will be presenting IRQDebloat, which automatically reverse engineers interrupt handling on embedded devices so that unwanted peripherals can be disabled! If you're at S&P, be sure to check it out in G.Ballroom A!

President Biden Archived (@potus46archive) 's Twitter Profile Photo

The first image from the Webb Space Telescope represents a historic moment for science and technology. For astronomy and space exploration. And for America and all humanity.

The first image from the Webb Space Telescope represents a historic moment for science and technology. For astronomy and space exploration.

And for America and all humanity.
Brendan Dolan-Gavitt (@moyix) 's Twitter Profile Photo

Some cool-looking work on vulnerability injection at USENIX Sec by Mike Hicks et al. this year! Looking forward to reading it! usenix.org/conference/use…

Some cool-looking work on vulnerability injection at USENIX Sec by <a href="/michael_w_hicks/">Mike Hicks</a> et al. this year! Looking forward to reading it! usenix.org/conference/use…
Bahruz Jabiyev (@bahruzjabiyev) 's Twitter Profile Photo

About our USENIX Security paper: HTTP/2-to-HTTP/1 conversion anomalies were first looked at by James Kettle and Emil Lerner in the context of Request Smuggling. To take an in-depth look at the conversion anomalies and their security implications, we developed an HTTP/2 (1/3)

About our <a href="/USENIXSecurity/">USENIX Security</a> paper:

HTTP/2-to-HTTP/1 conversion anomalies were first looked at by <a href="/albinowax/">James Kettle</a>  and <a href="/emil_lerner/">Emil Lerner</a> in 
the context of Request Smuggling. To take an in-depth look at the conversion anomalies and their security implications, we developed an HTTP/2 (1/3)
Felix Krause (@krausefx) 's Twitter Profile Photo

🔥 New Post: Announcing InAppBrowser - see what JavaScript commands get injected through an in-app browser 👀 TikTok, when opening any website in their app, injects tracking code that can monitor all keystrokes, including passwords, and all taps. krausefx.com/blog/announcin…

🔥 New Post: Announcing InAppBrowser - see what JavaScript commands get injected through an in-app browser

👀 TikTok, when opening any website in their app, injects tracking code that can monitor all keystrokes, including passwords, and all taps.

krausefx.com/blog/announcin…
Dr Andrew Fasano (@andrewfasano) 's Twitter Profile Photo

Recently Northeastern U. decided to install an IoT surveillance system in our lab that researches the security and privacy of IoT devices. Turns out these devices lack privacy, security, and more importantly good adhesives.

Mathias Verraes (@mathiasverraes) 's Twitter Profile Photo

That tweet is work of art. I see it as a commentary on passing down rules without principles. The subdued colours with the screaming yellow accents draws the audience's attention to distressing code change.

Ben Edelman (@edelmanben) 's Twitter Profile Photo

1/ Excited to share a new blog post from the U.S. AI Safety Institute! AI agents are becoming increasingly capable. But they are vulnerable to prompt injections in external content – an agent may be given task A, but then be “hijacked” and perform malicious task B instead.

1/ Excited to share a new blog post from the U.S. AI Safety Institute!

AI agents are becoming increasingly capable. But they are vulnerable to prompt injections in external content – an agent may be given task A, but then be “hijacked” and perform malicious task B instead.
Howard Lutnick (@howardlutnick) 's Twitter Profile Photo

Today, thanks to President Trump’s AI Action Plan, U.S. Commerce Dept. and National Institute of Standards and Technology’s Center for AI Standards and Innovation have released a groundbreaking evaluation of American vs. adversary AI. Result: American AI models dominate. Our systems outperform DeepSeek across nearly every