Nicholas Renner (@nicholasrenner) 's Twitter Profile
Nicholas Renner

@nicholasrenner

Ph.D. Student @nyutandon | Operating Systems and Security | SecureSystemsLab | Personal @rennergade

ID: 1323112667767283717

calendar_today02-11-2020 04:00:28

72 Tweet

45 Followers

85 Following

Brendan Dolan-Gavitt (@moyix) 's Twitter Profile Photo

I pitched MESS Lab projects today at NYU's Undergraduate Research Expo! This kind of talk is a lot of fun and I had a great time :) You can see the presentation slides with notes here: moyix.net/~moyix/messlab…

Zhenghao Hu (@highw4y2h3ll) 's Twitter Profile Photo

Our paper is finally out! We've built this to automatically find IRQ handlers and patch the firmware to remove/bypass certain hardware features (e.g. bluetooth, UART etc.) live tweet updates happening now👇

Brendan Dolan-Gavitt (@moyix) 's Twitter Profile Photo

I am very excited and honored to announce that I've received an U.S. National Science Foundation CAREER award that will let my lab spend the next five years working on new ways to generate highly realistic vulnerability corpora! nsf.gov/awardsearch/sh…

I am very excited and honored to announce that I've received an <a href="/NSF/">U.S. National Science Foundation</a> CAREER award that will let my lab spend the next five years working on new ways to generate highly realistic vulnerability corpora! nsf.gov/awardsearch/sh…
Brendan Dolan-Gavitt (@moyix) 's Twitter Profile Photo

Excited that the MESS lab will have two papers at NDSS workshops this year! – "Beyond the C: Retargetable Decompilation using Neural Machine Translation" with Iman Hosseini at BAR – "What the Fork? Finding and Analyzing Malware in GitHub Forks" with Alan Cao at MADWeb

Brendan Dolan-Gavitt (@moyix) 's Twitter Profile Photo

Congratulations to Zekun Shen (@Bruceshenzk) who just successfully defended his PhD thesis, "Facilitating Bug-Finding with Code Transformation"! His work helped close gaps in coverage for UAF detection and found bugs lurking in Linux kernel device drivers :)

Congratulations to Zekun Shen (@Bruceshenzk) who just successfully defended his PhD thesis, "Facilitating Bug-Finding with Code Transformation"! His work helped close gaps in coverage for UAF detection and found bugs lurking in Linux kernel device drivers :)
Marcela Melara, PhD (@mas0mel) 's Twitter Profile Photo

📣 Call for papers - SCORED ‘22 📣 Excited to announce this new workshop on all things SW supply chain security ACM CCS 2024 ‘22! Website: scored.dev. Short papers and demos welcome! Santiago laurent and I are looking forward to your submissions!

Dan Lorenc (@lorenc_dan) 's Twitter Profile Photo

The three hard problems in supply chain security today are: 1) vulnerability management, 2) key management, 3) the UNIX process model, and of course 4) off-by-one errors.

Mara (@m_ou_se) 's Twitter Profile Photo

🦀📕 In the foreword of Rust Atomics and Locks, Paul E. McKenney explains how not only Rust developers might find my book useful: marabos.nl/atomics/forewo…

Brendan Dolan-Gavitt (@moyix) 's Twitter Profile Photo

Really lovely news to start the new year with - I’ve been promoted to Associate Professor with tenure! I’m so grateful to my friends, colleagues, students and collaborators at NYU and beyond for helping me get here! <3

Nicholas Renner (@nicholasrenner) 's Twitter Profile Photo

Hello from #atc23 and #osdi23 ! If you see me and want to talk about software fault isolation, library oses, unikernels, or anything Rust related, say hi! Or say hi regardless!

Maarten Boone 🇪🇺🇺🇦 (@staatsgeheim) 's Twitter Profile Photo

The Linux kernel has been accidentally hardcoded to a maximum of 8 cores for the past 15 years and nobody noticed 🤐 thehftguy.com/2023/11/14/the…

Molly White (@molly0xfff) 's Twitter Profile Photo

twitter not paying whitehats. what could go wrong? this one just disclosed a vulnerability that would have allowed people to gain control of the twitter accounts of users who merely clicked malicious links

twitter not paying whitehats. what could go wrong?

this one just disclosed a vulnerability that would have allowed people to gain control of the twitter accounts of users who merely clicked malicious links