Martijn Bogaard (@jmartijnb) 's Twitter Profile
Martijn Bogaard

@jmartijnb

Reverse engineers source code by day and reviews binaries by night. TEEs, TAs, bootloaders (Secure Boot), RTOSs, firmware blobs and other low-level sw.

ID: 48356444

calendar_today18-06-2009 13:56:57

371 Tweet

977 Takipçi

1,1K Takip Edilen

Min Jang (@skensita) 's Twitter Profile Photo

Now, you can see the Hall of Fame of the Samsung Mobile Security Rewards Program. security.samsungmobile.com/hallOfFameInfo…

dmnk.bsky.social (@domenuk) 's Twitter Profile Photo

We just released FitM, the Fuzzer in the Middle!🎉🎉 Together with otto, Liikt and mmunier we added snapshotting and a network emulator to qemuafl. It fuzzes multiple stages of client-server interactions independently. Paper @ BAR'22, Code here: github.com/FGSect/FitM

Michele Spagnuolo (miki.it) (@mikispag) 's Twitter Profile Photo

I know Ange since the Rosetta Flash days, and can totally vouch for his reverse engineering / file format wizardry. Just look at one of his workshops (pinned tweet). He's looking for a remote job. Let's help him.

quarkslab (@quarkslab) 's Twitter Profile Photo

Attacking Titan M with Only One Byte Code execution and exfiltration of encryption keys from Google Pixel phone's Secure Element now being presented by Damiano Melotti and Maxime Rossi Bellom at Black Hat #BHUSA Full details are now public in their blog post: blog.quarkslab.com/attacking-tita…

Shawn Willden (@shawnwillden) 's Twitter Profile Photo

Some Pixel users are upset by the fact that the Pixel 6 cannot revert from Android 13 back to Android 12. I thought it might be helpful to write a short thread on anti-rollback counters, what they are and why they should be used a lot more. 🧵 1/7

IOActive Labs (@ioalabs) 's Twitter Profile Photo

New writeup about an unlocked TSEG in the Acer Swift 3 model, resulting in full SMM access: labs.ioactive.com/2022/11/explor… You can verify if your system is properly locked with Platbox: github.com/IOActive/Platb… IOActive, Inc #Acer #SMM #AMD #firmware Krzysztof Okupski n3k droogie

Martijn Bogaard (@jmartijnb) 's Twitter Profile Photo

Join me on my journey of finding 2 critical vulnerabilities in the months after the Pixel 6 was launched 😁 I’m very excited to be part of such amazing lineup again!

Eugene Rodionov (@vxradius) 's Twitter Profile Photo

Slide-deck of our talk at BH USA 2023 on attacking & securing Pixel modem are available at i.blackhat.com/BH-US-23/Prese… Farzan Karimi, Xuan & Xiling

dmnk.bsky.social (@domenuk) 's Twitter Profile Photo

New (explicit) addition to Android's VRP: pivot from bare-metal firmware (basebands?) to the main OS! source.android.com/docs/security/…

New (explicit) addition to Android's VRP: pivot from bare-metal firmware (basebands?) to the main OS!

source.android.com/docs/security/…
Martijn Bogaard (@jmartijnb) 's Twitter Profile Photo

More news, as I already told many last weekend / week, my team is expanding to Amsterdam! So if you want to do Offensive research on Pixel devices, ping me! google.com/about/careers/…

Eugene Rodionov (@vxradius) 's Twitter Profile Photo

A big honor to coauthor with abcSup and Gulshan the very first blog from Android Red Team on analysis and exploitation of CVE-2023-20938 in Android Binder driver at androidoffsec.withgoogle.com/posts/attackin… 🔥 The slide-deck presented at offensivecon is available at androidoffsec.withgoogle.com/posts/attackin…

Krzysztof Okupski (@exminium) 's Twitter Profile Photo

Happy and proud to share that our work on the AMD Sinkclose vulnerability has been published by Wired wired.com/story/amd-chip…