the grugq's newsletter

Subscribe
Archives
January 4, 2024

December 4, 2023

December 4, 2023

30 Years of Decompilation and the Unsolved Structuring Problem: Part 1

30 Years of Decompilation and the Unsolved Structuring Problem: Part 1

A two-part series on the history of decompiler research and the fight against the unsolved control flow structuring problem. In part 1, we revisit the history of foundational decompilers and techniques, concluding on a look at modern works. In part 2, we deep-dive into the fundamentals of modern control flow structuring techniques, and their limitations, and look to the future.


https://archive.is/C13Xh


Tickled to oblivion pic.twitter.com/fQhmnkNHND

— ġєиєяλኗʞ✇ḄยፕɎLġץΨ☍lʎʇnᙠⓇⓃⒶT҉๏เɭєፕ↫ (@Rubber0Cement) January 2, 2024

I can't believe we're still doing this. Any information extracted from Elmo in this way would be useless for most purposes. Someone under this much duress will say anything you want them to. These are not legitimate intelligence-gathering methods.

— Las Pasiones de Gundam (@Egregious_XII) January 2, 2024


Absolutely in awe of a) this story about a guy in the fifties testing the human limits of endurance of G force by crashing a sled at 600 miles an hour and b) the choice of pull quote in this write-up. pic.twitter.com/RukLW2P3fn

— ~ (@daniel_barker) October 8, 2021


Came across this awesome talk by @LargeCardinal :
"Bot-in-the-Middle: How to Hack LLMs and what modern #AI means for CyberSecurity"#AISecurity#HackGPThttps://t.co/MaAGqsnbjE

— Sam Stepanyan (@securestep9) January 3, 2024


Security: [0-day] heap overflow in vp8_encode_frame after frame re-sizing https://t.co/kIoqwwij1j

— Chromium Disclosed Security Bugs (@BugsChromium) January 3, 2024


Orange Spain has had their /12 (+others) broken by (what appears to be) someone breaking into their RIPE account and making RPKI ROA's to somewhere else.

Current reach ability of impacted prefixes is pretty poor

The current ROA is pointing to AS49581 https://t.co/MM8QFL5ufr pic.twitter.com/Qz6S8fGk1r

— BGP.Tools (@bgptools) January 3, 2024

https://benjojo.co.uk/u/benjojo/h/r1zj333N4L6cF7P1xv


BITWARDEN HEIST - HOW TO BREAK INTO PASSWORD VAULTS WITHOUT USING PASSWORDS

RedTeam Pentesting - Blog - Bitwarden Heist - How to Break Into Password Vaults Without Using Passwords

Sometimes, making particular security design decisions can have unexpected consequences. For security-critical software, such as password managers, this can easily lead to catastrophic failure: In this blog post, we show how Bitwarden’s Windows Hello …


Ummm @Mandiant - you good bro? pic.twitter.com/lXAdTOfQcX

— Information Shrekurity (@infoshrek) January 3, 2024

Yup, not so good. #accounttakeover pic.twitter.com/6Yp2gM6OZi

— Information Shrekurity (@infoshrek) January 3, 2024

pic.twitter.com/ylFrQ1qhQL

— Information Shrekurity (@infoshrek) January 3, 2024


The Curious Case of MD5 | Kate Sills

Recently I came across a puzzling fact: the International Criminal Court hashes electronic evidence with MD5, even though MD5 is badly broken. So, why are lawyers using broken, outdated technology? The answer involves the common law system, cultural isolation, and a single man named Don L. Lewis.


http://antirez.com/news/123


https://www.tandfonline.com/doi/full/10.1080/02684527.2023.2291874


https://mjg59.dreamwidth.org/69070.html


Joseph Gerbils https://t.co/RB90CNLhUk

— Dean Coughlin (@deancoughlin_) January 3, 2024

Looking for a new hide for the hamster and, well. pic.twitter.com/eqwoyDLa9U

— J (@64_hero22) January 2, 2024


Don't miss what's next. Subscribe to the grugq's newsletter:

Start the conversation:

Be the first to share your thoughts

X