Sergej Schumilo (@ms_s3c) 's Twitter Profile
Sergej Schumilo

@ms_s3c

Security Researcher sh -c ‘﹤&$1’

ID: 2318840439

linkhttps://schumilo.de calendar_today01-02-2014 21:53:54

223 Tweet

1,1K Takipçi

378 Takip Edilen

Cornelius Aschermann (@is_eqv) 's Twitter Profile Photo

sneak peak time! Stuff that ☁️🖥️, Sergej Schumilo and I have been working on. What if your debugger has a fuzzing harness and can run the target 100s to 10000s of times per second? Why bother with breakpoints? Watch expressions get evaluated live as you type.

sneak peak time! Stuff that  
<a href="/klautcomputing/">☁️🖥️</a>, <a href="/ms_s3c/">Sergej Schumilo</a> and I have been working on. What if your debugger has a fuzzing harness and can run the target 100s to 10000s of times per second? Why bother with breakpoints? Watch expressions get evaluated live as you type.
Cornelius Aschermann (@is_eqv) 's Twitter Profile Photo

Sergej Schumilo and I just published the code of our snapshot based hypervisor fuzzer Nyx github.com/RUB-SysSec/Nyx. Paper and talk: usenix.org/conference/use…. Stay tuned for a much more polished version at nyx-fuzz.com

<a href="/ms_s3c/">Sergej Schumilo</a> and I just published the code of our snapshot based hypervisor fuzzer Nyx github.com/RUB-SysSec/Nyx. Paper and talk: usenix.org/conference/use…. Stay tuned for a much more polished version at nyx-fuzz.com
Sergej Schumilo (@ms_s3c) 's Twitter Profile Photo

Our (Cornelius Aschermann, Andrea Jemmett, @bl4ckic3 and Thorsten Holz) paper on robust snapshot based network fuzzing has landed on ArXiv, check it out here: arxiv.org/abs/2111.03013

Thorsten Holz (@thorstenholz) 's Twitter Profile Photo

Except from the Mozilla Security Firefox Security Newsletter/FSN-2021-Q3 (wiki.mozilla.org/Firefox_Securi…): "Now, we have received and successfully evaluated a research prototype for fuzzing the IPC Layer. " - Congratulations Sergej Schumilo and Cornelius Aschermann!

Sergej Schumilo (@ms_s3c) 's Twitter Profile Photo

Want to fuzz complex targets with AFL++ and snapshots? Cornelius Aschermann and I now got you covered: there is a Nyx implementation for AFL++ available here github.com/nyx-fuzz/Nyx/b…

Richard Johnson (@richinseattle) 's Twitter Profile Photo

Full system, hypervisor accelerated, incremental snapshot fuzzing with Intel PT coverage engine enabling full protocol stateful fuzzing via Nyx-Net! Getting roughly 1000 exec/s/core on dnsmasq. This is followup work to kAFL/RedQueen. Kudos to the authors Cornelius Aschermann and Sergej Schumilo!

Full system, hypervisor accelerated, incremental snapshot fuzzing with Intel PT coverage engine enabling full protocol stateful fuzzing via Nyx-Net! Getting roughly 1000 exec/s/core on dnsmasq. This is followup work to kAFL/RedQueen. Kudos to the authors <a href="/is_eqv/">Cornelius Aschermann</a> and <a href="/ms_s3c/">Sergej Schumilo</a>!
Richard Johnson (@richinseattle) 's Twitter Profile Photo

expy Cornelius Aschermann Sergej Schumilo Here is Nyx backend powering the familiar AFL++ frontend. This is still using intelpt + full system snapshots and achieving similar to inlined source instrumentation performance.

<a href="/expend20/">expy</a> <a href="/is_eqv/">Cornelius Aschermann</a> <a href="/ms_s3c/">Sergej Schumilo</a> Here is Nyx backend powering the familiar AFL++ frontend. This is still using intelpt + full system snapshots and achieving similar to inlined source instrumentation performance.
Advanced Fuzzing League (@aflplusplus) 's Twitter Profile Photo

AFL++ v4.00c was just released! Nyx VM snapshot & ARM coresight mode, improved cmplog, lots of fixes and better handling :) github.com/AFLplusplus/AF… #afl #fuzzing

dmnk@infosec.exchange (@domenuk) 's Twitter Profile Photo

We just released FitM, the Fuzzer in the Middle!🎉🎉 Together with otto, Liikt and mmunier we added snapshotting and a network emulator to qemuafl. It fuzzes multiple stages of client-server interactions independently. Paper @ BAR'22, Code here: github.com/FGSect/FitM

Mathieu Tarral (@mtarral) 's Twitter Profile Photo

It's been a while since I've given updates here, especially since I started at Intel one year ago ! I've taken over the maintainership of kAFL 🛠️🚀 kAFL is a HW assisted feedback fuzzer for x86 VMs ✨ github.com/IntelLabs/kAFL ⬇️ (1/x)

Mathieu Tarral (@mtarral) 's Twitter Profile Photo

🚀 kAFL release v0.8 1⃣ New Linux tutorial based on the Damned Vulnerable Kernel Module (DVKM) by Hardik Shah 2⃣ Docs how to use the kAFL "agent.sh" and sharedir based workflow to fuzz Linux targets 3⃣ A simplified kAFL agent in the Linux kernel !

🚀 kAFL release v0.8

1⃣ New Linux tutorial based on the Damned Vulnerable Kernel Module (DVKM) by <a href="/hardik05/">Hardik Shah</a> 
2⃣ Docs how to use the kAFL "agent.sh" and sharedir based workflow to fuzz Linux targets
3⃣ A simplified kAFL agent in the Linux kernel !
h0mbre (@h0mbre_) 's Twitter Profile Photo

starting a new fuzzer project on the blog that is based on an old Brandon Falk idea. in the first post, we load a statically built Bochs emulator ELF into our fuzzer process and execute it. there is some code and the humble beginnings of a repo. lets gooo h0mbre.github.io/New_Fuzzer_Pro…

Christian Holler (@mozdeco) 's Twitter Profile Photo

I know I'm late for Christmas presents but I've added dynamic instrumentation filtering to AFL++. You can now select which parts of the (llvmnative) instrumentation you want to use at runtime, without rebuilding: github.com/AFLplusplus/AF… #fuzzing

Moritz Schloegel (@m_u00d8) 's Twitter Profile Photo

Fuzzing is hard, evaluating fuzzing is harder 🔥 For our new IEEE S&P paper, we studied 150 fuzzing evals and found issues such as lackluster documentation, bad experiment setups, or questionable CVEs 📄 Paper mschloegel.me/paper/schloege… 🔧 Help us fix this github.com/fuzz-evaluator…

TyphoonCon🌪️ (@typhooncon) 's Twitter Profile Photo

📷We’re excited to announce the second training session for #TyphoonCon24: “Fuzzing & Attacking Deeply Embedded Devices” by Tobias Scharnowski (Tobias Scharnowski) & Marius Muench (nSinus-R (@[email protected])). Learn more and register: eventbrite.com/e/typhooncon-2…

📷We’re excited to announce the second training session for #TyphoonCon24: “Fuzzing &amp; Attacking Deeply Embedded Devices” by Tobias Scharnowski (<a href="/ScepticCtf/">Tobias Scharnowski</a>) &amp; Marius Muench (<a href="/nSinusR/">nSinus-R (@nsr@infosec.exchange)</a>).

Learn more and register: eventbrite.com/e/typhooncon-2…