Sam Thomas (@xorpse) 's Twitter Profile
Sam Thomas

@xorpse

Chief Scientist @binarly_io. Program analysis. Reverse engineering. Backdoor detection.

ID: 945357756583890945

linkhttps://xv.ax calendar_today25-12-2017 18:17:07

548 Tweet

369 Takipçi

531 Takip Edilen

BINARLY🔬 (@binarly_io) 's Twitter Profile Photo

🔎From Hidden Semantics to Structured Insights✨ By combining static analysis techniques and tailored heuristic improvements, we've significantly enhanced the precision of type inference, enabling more effective vulnerability triage. lukas seidel Sam Thomas 👏 binarly.io/blog/type-infe…

🔎From Hidden Semantics to Structured Insights✨

By combining static analysis techniques and tailored heuristic improvements, we've significantly enhanced the precision of type inference, enabling more effective vulnerability triage. <a href="/pr0me/">lukas seidel</a> <a href="/xorpse/">Sam Thomas</a> 👏

binarly.io/blog/type-infe…
nba::yoh (@mrnbayoh) 's Twitter Profile Photo

Sooooo, our Usenix Security '25 paper on automated synthesis of code-reuse attacks has been pre-published ✨ usenix.org/conference/use…

BINARLY🔬 (@binarly_io) 's Twitter Profile Photo

Our Deep Vulnerability Analysis (DVA) technology automatically identified 𝗖𝗩𝗘-𝟮𝟬𝟮𝟱-𝟯𝟬𝟱𝟮 as unknown zero-day vulnerability🪄✨ showcase.binarly.io/share/b8XkNJQ6…

Alex Matrosov (@matrosov) 's Twitter Profile Photo

I love Binarly team! To provide better contextualization, we now have full Lua support for semantic-driven code detection rules 🪄✨

I love Binarly team! To provide better contextualization, we now have full Lua support for semantic-driven code detection rules 🪄✨
nba::yoh (@mrnbayoh) 's Twitter Profile Photo

My first blogpost on the Source Engine is out🔥! (hopefully there'll be more heh) Exploiting the Source Engine’s network protocol to leak vtable pointers – protobuf quirks, ConVar abuses, and good old engine weirdness. mrnbayoh.github.io/blog/source-en…

HN Security (@hnsec) 's Twitter Profile Photo

In our last blog post, our colleague Gianluca shares the story of a lucky discovery: a bug initially spotted during a routine assessment turned out to be a high impact vulnerability in Microsoft Graph API — earning a $3,000 bounty. security.humanativaspa.it/export-to-pdf-…

Sam Thomas (@xorpse) 's Twitter Profile Photo

I'm pleased to announce a new version of the Rust bindings for Hex-Rays SA IDA Pro! With: - Improved strings, metadata, and core APIs - Support for the name API Thank you to [email protected] & Willi Ballenthin for contributing! Docs: idalib.rs Code: git.idalib.rs

I'm pleased to announce a new version of the Rust bindings for <a href="/HexRaysSA/">Hex-Rays SA</a> IDA Pro! With:

- Improved strings, metadata, and core APIs
- Support for the name API

Thank you to <a href="/0xdea/">raptor@infosec.exchange</a> &amp; <a href="/williballenthin/">Willi Ballenthin</a> for contributing!

Docs: idalib.rs
Code: git.idalib.rs
Raelize (@raelizecom) 's Twitter Profile Photo

Google Wifi Pro - Glitching from Root to EL3 - Part 1 In this first post, we explain in detail, how we were able to inject EM glitches in order to characterize Qualcomm's IPQ5018 SoC susceptibility to EM glitches. raelize.com/blog/google-wi…

Google Wifi Pro - Glitching from Root to EL3 - Part 1

In this first post, we explain in detail, how we were able to inject EM glitches in order to characterize Qualcomm's IPQ5018 SoC susceptibility to EM glitches.

raelize.com/blog/google-wi…
Galois (@galois) 's Twitter Profile Photo

In his latest article, "Specifications Don't Exist," Galois Principal Scientist Mike Dodds explores formal specifications, informal specifications, and the inescapable burden of having to clarify our ideas. Give it a read! galois.com/articles/speci…

Adam 'pi3' Zabrocki (@adam_pi3) 's Twitter Profile Photo

Forgot to mentioned that our talk "How to secure unique ecosystem shipping 1 billion+ cores?" has been accepted to DEF CON #defcon33 as well! defcon.org/html/defcon-33…

raptor@infosec.exchange (@0xdea) 's Twitter Profile Photo

Today I’m celebrating one year of #Rust! 🦀 I started learning it last summer, and since then, I’ve pretty much stopped programming in any other language. I’ve documented my journey in this series of articles: security.humanativaspa.it/tag/rust/ Here’s to many more years with Rust! 🥂

Today I’m celebrating one year of #Rust! 🦀 

I started learning it last summer, and since then, I’ve pretty much stopped programming in any other language.

I’ve documented my journey in this series of articles: security.humanativaspa.it/tag/rust/ 

Here’s to many more years with Rust! 🥂
Sébastien Bardin (@seb_bardin) 's Twitter Profile Photo

Back from PLDI 2025, where Frédéric Recoules and I had the pleasure to give a tutorial on BINSEC and binary-level symbolic execution. Here it is, playable in your browser: binsec.github.io/tutorial-pldi2…

Back from <a href="/PLDI/">PLDI</a> 2025,  where Frédéric Recoules and I had the pleasure to give a tutorial on  BINSEC and binary-level symbolic execution.  Here it is, playable in your browser: binsec.github.io/tutorial-pldi2…
HN Security (@hnsec) 's Twitter Profile Photo

In our last post, Federico Dotta shares some PoCs of GenAI/LLM security issues found in real-world assessments conducted for corporate clients, with a focus on vulnerabilities that can be exploited to gain unauthorized access to data, resources, and services. security.humanativaspa.it/attacking-gena…

Hex-Rays SA (@hexrayssa) 's Twitter Profile Photo

More news coming to you from the soon-to-be-released IDA 9.2: we're taking the first step toward making development on top of #IDA more accessible—by open-sourcing the C++ SDK and IDAPython: eu1.hubs.ly/H0m1XKc0 #ReverseEngineering #DevTools #Infosec #Cybersecurity

Philip Zucker (@sandmouth) 's Twitter Profile Photo

[New Blog Post] Verified Assembly 2: Memory, RISC-V, Cuts for Invariants, and Ghost Code philipzucker.com/asm_verify2/ #ghidra #assembly

Axel Souchet (@0vercl0k) 's Twitter Profile Photo

If you know junior folks wanting to get into ARM/x86 assembly⚙️but don't quite know how.. or maybe they prefer to consume content in a video form? Get them to check this out!

Sébastien Bardin (@seb_bardin) 's Twitter Profile Photo

USENIX Security 2025 is starting in 1h and something! My amazing student GuilhemLacombe will present our work entitled "Attacker Control and Bug Prioritization" on August 14 (4pm session, track 2). Want to know more about assessing the danger of a vulnerability without

<a href="/USENIXSecurity/">USENIX Security</a>  2025 is starting in 1h and something!    My amazing student GuilhemLacombe will  present our work entitled "Attacker Control and Bug Prioritization" on  August 14 (4pm session, track 2).  Want to know more about assessing the  danger of a vulnerability without