December 4, 2023
December 4, 2023
30 Years of Decompilation and the Unsolved Structuring Problem: Part 1
30 Years of Decompilation and the Unsolved Structuring Problem: Part 1
A two-part series on the history of decompiler research and the fight against the unsolved control flow structuring problem. In part 1, we revisit the history of foundational decompilers and techniques, concluding on a look at modern works. In part 2, we deep-dive into the fundamentals of modern control flow structuring techniques, and their limitations, and look to the future.
https://archive.is/C13Xh
Tickled to oblivion pic.twitter.com/fQhmnkNHND
— ġєиєяλኗʞ✇ḄยፕɎLġץΨ☍lʎʇnᙠⓇⓃⒶT҉๏เɭєፕ↫ (@Rubber0Cement) January 2, 2024
I can't believe we're still doing this. Any information extracted from Elmo in this way would be useless for most purposes. Someone under this much duress will say anything you want them to. These are not legitimate intelligence-gathering methods.
— Las Pasiones de Gundam (@Egregious_XII) January 2, 2024
Absolutely in awe of a) this story about a guy in the fifties testing the human limits of endurance of G force by crashing a sled at 600 miles an hour and b) the choice of pull quote in this write-up. pic.twitter.com/RukLW2P3fn
— ~ (@daniel_barker) October 8, 2021
Came across this awesome talk by @LargeCardinal :
— Sam Stepanyan (@securestep9) January 3, 2024
"Bot-in-the-Middle: How to Hack LLMs and what modern #AI means for CyberSecurity"#AISecurity#HackGPThttps://t.co/MaAGqsnbjE
Security: [0-day] heap overflow in vp8_encode_frame after frame re-sizing https://t.co/kIoqwwij1j
— Chromium Disclosed Security Bugs (@BugsChromium) January 3, 2024
Orange Spain has had their /12 (+others) broken by (what appears to be) someone breaking into their RIPE account and making RPKI ROA's to somewhere else.
— BGP.Tools (@bgptools) January 3, 2024
Current reach ability of impacted prefixes is pretty poor
The current ROA is pointing to AS49581 https://t.co/MM8QFL5ufr pic.twitter.com/Qz6S8fGk1r
BITWARDEN HEIST - HOW TO BREAK INTO PASSWORD VAULTS WITHOUT USING PASSWORDS
RedTeam Pentesting - Blog - Bitwarden Heist - How to Break Into Password Vaults Without Using Passwords
Sometimes, making particular security design decisions can have unexpected consequences. For security-critical software, such as password managers, this can easily lead to catastrophic failure: In this blog post, we show how Bitwardenâs Windows Hello â¦
Ummm @Mandiant - you good bro? pic.twitter.com/lXAdTOfQcX
— Information Shrekurity (@infoshrek) January 3, 2024
Yup, not so good. #accounttakeover pic.twitter.com/6Yp2gM6OZi
— Information Shrekurity (@infoshrek) January 3, 2024
— Information Shrekurity (@infoshrek) January 3, 2024
The Curious Case of MD5 | Kate Sills
Recently I came across a puzzling fact: the International Criminal Court hashes electronic evidence with MD5, even though MD5 is badly broken. So, why are lawyers using broken, outdated technology? The answer involves the common law system, cultural isolation, and a single man named Don L. Lewis.
http://antirez.com/news/123
https://www.tandfonline.com/doi/full/10.1080/02684527.2023.2291874
https://mjg59.dreamwidth.org/69070.html
Joseph Gerbils https://t.co/RB90CNLhUk
— Dean Coughlin (@deancoughlin_) January 3, 2024
Looking for a new hide for the hamster and, well. pic.twitter.com/eqwoyDLa9U
— J (@64_hero22) January 2, 2024