Kunal Mehta (@kmgkv1) 's Twitter Profile
Kunal Mehta

@kmgkv1

System software and security engineer working @Intel, passionate for cyber security and platform security. Views expressed are my own, not my employer’s.

ID: 1041186962290302976

calendar_today16-09-2018 04:48:10

313 Tweet

221 Takipçi

452 Takip Edilen

Adam 'pi3' Zabrocki (@adam_pi3) 's Twitter Profile Photo

Linux kernel merged the x86 shadow stack support, part of Intel's Control-flow Enforcement Technology (CET): git.kernel.org/pub/scm/linux/…

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

"Bypassing the HVCI memory protection" at #HEXACON2023 discusses remapping attack with an application to code pages. If you wonder what mitigates this, you can check out HLAT (VT-rp) youtube.com/watch?v=WWvd2_…

witeken (@witeken) 's Twitter Profile Photo

Intel Labs Contributes Key Technologies to New Intel Core Ultra and Intel Xeon Scalable Processors -Datapath and Register File Technologies in NPU -DLVR -Side-Channel Resistant AES -Quantum Resistance -Redesign of VT-d -AEX-Notify community.intel.com/t5/Blogs/Tech-…

David Weston (DWIZZZLE) (@dwizzzlemsft) 's Twitter Profile Photo

I'm excited about the progress on Virtualization-based Security being ported from Windows to Linux: lpc.events/event/17/contr… Ubuntu-LVBS is here: github.com/heki-linux/lvb…

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

24H2 enables HVPT (VT-rp / HLAT) to prevent remapping attacks. You can check if it is enabled with msinfo32, systeminfo, or Andrea Allievi 's sktool v1.2+. Here is also sample code for that to save your time with reversing. gist.github.com/tandasat/890d4…

24H2 enables HVPT (VT-rp / HLAT) to prevent remapping attacks.

You can check if it is enabled with msinfo32, systeminfo, or <a href="/aall86/">Andrea Allievi</a> 's sktool v1.2+. Here is also sample code for that to save your time with reversing.
gist.github.com/tandasat/890d4…
David Weston (DWIZZZLE) (@dwizzzlemsft) 's Twitter Profile Photo

Reducing the attack surface in the Azure hypervisor with a Rust VMM and hardware offload: techcommunity.microsoft.com/t5/windows-os-…

Specter (@specterdev) 's Twitter Profile Photo

I've published the repo for Byepervisor (we love named vulns out here). Contains exploit implementation for two PS5 hypervisor bugs for 2.xx and lower. Slides from the talk + vod should hopefully be published soon. github.com/PS5Dev/Byeperv…

x86matthew (@x86matthew) 's Twitter Profile Photo

I created a hypervisor-based emulator for Windows x64 binaries. This project uses Windows Hypervisor Platform to build a virtualized user-mode environment, allowing syscalls and memory accesses to be logged or intercepted. elastic.co/security-labs/… Project: github.com/x86matthew/Win…

Gynvael Coldwind (@gynvael.bsky.social) (@gynvael) 's Twitter Profile Photo

Paged Out! #6 is out! pagedout.institute Totally free, 80 pages, best issue so far! 'nuff said, enjoy! (please RT to help spread out the news!)

Paged Out! #6 is out!
pagedout.institute
Totally free, 80 pages, best issue so far!
'nuff said, enjoy!

(please RT to help spread out the news!)
Satoshi Tanda (@standa_t) 's Twitter Profile Photo

Nice to see Intel and MSFT's posts on VT-rp / HVPT. If you are interested in playing with the feature, simple example code is here: github.com/tandasat/Hello…

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

The new blog post on supervisor shadow stack restrictions / supervisor shadow-stack control tandasat.github.io/blog/2025/04/0…

Brave (@brave) 's Twitter Profile Photo

AI agents that can browse the Web and perform tasks on your behalf have incredible potential but also introduce new security risks. We recently found, and disclosed, a concerning flaw in Perplexity's Comet browser that put users' accounts and other sensitive info in danger.

AI agents that can browse the Web and perform tasks on your behalf have incredible potential but also introduce new security risks.

We recently found, and disclosed, a concerning flaw in Perplexity's Comet browser that put users' accounts and other sensitive info in danger.