Какой сумрачный гений из #GoogleProjectZero решил встроить картинки прямо в atom?
$ curl -s --head https://projectzero.google/feed.xml | grep content-length
content-length: 17723364Более 16 мегабайт, что бы просто обновить ленту публикаций...
Какой сумрачный гений из #GoogleProjectZero решил встроить картинки прямо в atom?
$ curl -s --head https://projectzero.google/feed.xml | grep content-length
content-length: 17723364Более 16 мегабайт, что бы просто обновить ленту публикаций...
I’m looking for a feed that aggregates recent reverse engineering and vulnerability centric security writeups, like the ones posted by Google project zero. I know there are many different security firms and academics that post these kind of articles now and then, but I’m having a hard time with discovery as every news site or feed I find is focused on cybersecurity threats and CVEs, or simply just malware actor reports.
Does anyone have something that fits the bill?
#reverseengineering #googleprojectzero #projectzero #vulnerability #vulnerability_research
#GoogleProjectZero: Address Sanitizer for Bare-metal Firmware
To provide custom implementations for the necessary runtime routines, the Clang toolchain exposes an interface for address sanitization through the-fsanitize=kernel-address compiler option. The KASan runtime routines implemented in the Linux kernel serve as a great example of how to define a KASan runtime for targets which aren’t supported by default with -fsanitize=address. We'll demonstrate how to use the version of address sanitizer originally built for the kernel on other bare-metal targets.
#GoogleProjectZero: First handset with MTE on the market
Since I first heard about ARM's Memory Tagging Extensions, I've said (to far too many people at this point to be able to back out…) that I'd immediately switch to the first available device that supported this feature. It's been a long wait (since late 2017) but with the release of the new Pixel 8 / Pixel 8 Pro handsets, there's finally a production handset that allows you to enable MTE!Analyzing a Modern In-the-wild Android Exploit
Интересный анализ реально эксплуатируемой цепочки уязвимостей в Android.
#GoogleProjectZero: MTE (ARM Memory Tagging Extensions) As Implemented
If I would drive one of the latest #Volkswagen models (including #Audi #Seat #Skoda #Porsche and more) I would be worried a little bit.
Usually in this kind of electronics the Volkswagen brands use the same or similar base tech stack.
I hope they got faster in their defect fixing and roll out.
I would like to know which models are affected as of now.
https://www.sammobile.com/news/three-new-samsung-exynos-automotive-chips-launched-volkswagen/
#ExynosModem #Samsung #GoogleProjectZero #ZeroDayExploit #CVE-2023-24033