Advertisement · 728 × 90

Posts by Adrian Herrera

Does HuggingFace spaces give you a DOI? I find services like Zenodo clunky to use but their permanency is often required by the AE process

4 months ago 0 0 1 0
Post image

Check out the latest from our Labs! Gilbert, in our Browsers team, talks us through how he used one-click memory corruption to exploit a patch-gap in the UC Browser.

www.interruptlabs.co.uk/articles/one...

6 months ago 2 2 0 0

Excited to be here with the Interrupt crew!

6 months ago 0 0 0 0

Hmm that makes sense. Unfortunately I don’t have a better solution 😕

6 months ago 0 0 0 0

I was wondering the same thing the other day! For now I’m just copy+pasting rich text from vs code into PowerPoint, which copies across all the syntax highlighting. I don’t like having code as images.

6 months ago 0 0 1 0
Accepted Papers | SURE 2025 Papers and posters accepted for SURE 2025

SURE is proud to announce that we have **9** epic works that have been accepted for presentation at SURE on October 13. Topics span decompilation, (de)obfuscation, debugging, fundamental benchmarks, and more!

sure-workshop.org/pa... (paper links out soon)

7 months ago 1 1 0 0

Jeez these are nightmare-inducing

7 months ago 0 0 0 0
Advertisement

Oh wow that’s so cool 💜

7 months ago 1 0 1 0
GitHub - blacktop/go-hypervisor: Apple Hypervisor.framework bindings for Golang Apple Hypervisor.framework bindings for Golang. Contribute to blacktop/go-hypervisor development by creating an account on GitHub.

Created Go bindings for Apple's Hypervisor.framework.

Why? Because I wanted to test a Pure Go emulator I'm writing against and couldn't get unicorn2 to work on macOS 26. Plus what's going to be faster than Apple's OWN hypervisor 😎

Check it out! 🎉

github.com/blacktop/go-...

7 months ago 6 4 0 0
Post image Post image Post image Post image

Check out our latest blog post on modeling complex control flow with function-level basic block analysis in Binary Ninja 5.1. From DSPs to Brain***k, this update makes it easier to develop plugins for tricky architectures. binary.ninja/2025/08/12/f...

8 months ago 7 3 0 0

🛬 I'm at USENIX Security in Seattle this week, where on Friday at 2pm my former postdoc Tristan Benoit will be presenting our paper "BLens: Contrastive Captioning of Binary Functions using Ensemble Embedding," joint work with Yunru Wang and Moritz Dannehl from my group. Here's the gist:

8 months ago 3 1 1 0
Preview
WOOT '25 Technical Sessions All sessions will be held in Room 611-612 unless otherwise noted.

WOOT 2025 schedule, all papers are now online open access:
usenix.org/conference/w...
Talks are recorded, and should be online in a few weeks.

8 months ago 12 8 0 0
Preview
Exploiting the Synology TC500 at Pwn2Own Ireland 2024 Introduction In October 2024, InfoSect participated in Pwn2Own – a bug bounty competition against embedded devices such as cameras, NAS’, and smart speakers. In this blog, I’ll di…

New blog post: Exploiting the Synology TC500 at Pwn2Own Ireland 2024
We built a format string exploit for the TC500 smart cam. It didn’t get used, but it made for a fun case study.
blog.infosectcbr.com.au/2025/08/01/e...

8 months ago 7 2 0 1
Preview
Add V8SandboxFuzzer · googleprojectzero/fuzzilli@675eccd This is a basic fuzzer for the V8 Sandbox. It uses the memory corruption API to implement a random-but-deterministic (given a seed) traversal through the V8 heap object graph and corrupts some obje...

We released our Fuzzilli-based V8 Sandbox fuzzer: github.com/googleprojec...
It explores the heap to find interesting objects and corrupts them in a deterministic way using V8's memory corruption API. Happy fuzzing!

8 months ago 25 7 0 0

Good luck, and exciting times for XBOW!

8 months ago 2 0 0 0
Post image

Linux Kernel Hardening: Ten Years Deep

Talk by Kees Cook about the relevance of various Linux kernel vulnerability classes and the mitigations that address them.

Video: www.youtube.com/watch?v=c_Nx...
Slides: static.sched.com/hosted_files...

9 months ago 7 3 0 0
Advertisement
CVE-2023-52927: Turning a Forgotten Syzkaller Report into kCTF Exploit Table of Contents I. Introduction II. Netfilter hooks, nf_tables, nf_conntrack, nf_nat and nf_queue 2.1 Netfilter hooks 2.2 nf_tables 2.3 nf_conntrack 2.4 nf_nat 2.5 nf_queue III. The Forgotten Syzkaller Report IV. Root Cause Analysis of a “no reproducer” Syzkaller UAF Report 4.1 Allocation Backtrace 4.2 Free Backtrace 4.3 UAF Backtrace 4.4 Root Cause V. Crafting a Reproducer to Trigger the KASAN UAF 5.1 Allocate a template nf_conn by calling nft_ct_set_zone_eval() 5.2 Setup nf_nat_setup_info() function 5.

CVE-2023-52927: Turning a Forgotten #Syzkaller Report into #kCTF #Exploit

https://qriousec.github.io/post/cve-2023-52927/

9 months ago 6 2 0 0

Oh cool! I’m probably more interested in different frontends; I’ll leave accelerating to the professionals 😄

9 months ago 2 0 0 0
Preview
GitHub - sandialabs/ctadl: CTADL is a static taint analysis tool CTADL is a static taint analysis tool. Contribute to sandialabs/ctadl development by creating an account on GitHub.

CTADL - a Datalog-based interprocedural static taint analysis engine for Java/Android bytecode (via JADX) and Pcode (via Ghidra)

Code: github.com/sandialabs/c...

Talk (via @krismicinski.bsky.social): youtu.be/3ec9VfMUVa8?...

9 months ago 11 2 1 0

Woah totally missed that CTDL is open source 🥳

9 months ago 3 0 0 0
A side by side comparison of the original output by Ghidra, and the LLM enriched output.

A side by side comparison of the original output by Ghidra, and the LLM enriched output.

Ghidra, scripting, LLM, automagic automation. That should grab the attention for this thread. If you want to read the complete blog, you can do so here: www.trellix.com/blogs/resear...
1/n

9 months ago 9 5 1 0
Preview
Estimating Correctness Without Oracles in LLM-Based Code Generation Generating code from natural language specifications is one of the most successful applications of Large Language Models (LLMs). Yet, they hallucinate: LLMs produce outputs that may be grammatically c...

Can we statistically estimate how likely an LLM-generated program is correct w/o knowing what is a correct program for that task?

Sounds impossible-but it's actually really simple. In fact, our measure of "correctness" called incoherence can be estimated (PAC guarantees).

arxiv.org/abs/2507.00057

9 months ago 12 3 1 2

Firmwire 🤝 LibAFL

10 months ago 8 1 0 0
Advertisement
Preview
Solo: A Pixel 6 Pro Story (When one bug is all you need) During my internship I was tasked to analyze a Mali GPU exploit on Pixel 7/8 devices and adapt it to make it work on another device: the Pixel 6 Pro. While the exploit process itself is relatively straightforward to reproduce (in theory we just need to find the correct symbol offsets and signatures for our target device), what’s interesting about Pixel 6 Pro is that it uses a different Mali GPU from the Pixel 7/8, which lacked support for a feature that one of the two vulnerabilities within the exploit relied on:

Solo: A Pixel 6 Pro Story (When one #bug is all you need)

starlabs.sg/blog/2025/06-solo-a-pixe...

10 months ago 1 1 0 0
Post image Post image

Just Accepted to ACM TOSEM!

The "Havoc Paradox" is about the relationship between byte-level fuzzer mutations and their effect on the inputs produced by generators for structured strings (e.g. XML/SQL). Can disruptive mutations be controlled? Should they be? Find out.

📄 dl.acm.org/doi/pdf/10.1...

10 months ago 21 3 2 1
Preview
DWARF as a Shared Reverse Engineering Format This blog post introduces a new API in LIEF to create DWARF files

[Blog Post] New high-level API in LIEF that allows the
creation of DWARF files. Additionally, I present two plugins designed to export
program information from Ghidra and BinaryNinja into a DWARF file.

lief.re/blog/2025-05...

(Bonus: DWARF file detailing my reverse engineering work on DroidGuard)

10 months ago 22 15 1 0
Preview
Bypassing MTE with CVE-2025-0072 See how a vulnerability in the Arm Mali GPU can be exploited to gain kernel code execution even when Memory Tagging Extension (MTE) is enabled.

Our team member Man Yue Mo is back, showing a new way to bypass MTE protection on Android phones with CVE-2025-0072. github.blog/security/vul...

10 months ago 6 3 0 0

Happy to share my upcoming #ATC25 paper w/ @snagycs.bsky.social: "BIN2WRONG: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers"!

Bin2Wrong creates binaries by mutating source, compiler, optimizations, and format—revealing 48 new bugs in 7 decompilers! 💪

10 months ago 4 2 1 0
Preview
GitHub - binarly-io/idalib: Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib - binarly-io/idalib

We're are happy to announce a new release of our #Rust bindings for idalib.

What's new:
- New APIs for working with IDBs, segments, and more
- Rust 2024 support
- New homepage: idalib.rs

H/T to our contributors @yeggor.bsky.social & @raptor.infosec.exchange.ap.brid.gy

github.com/binarly-io/i...

10 months ago 5 9 0 0

👀

11 months ago 1 0 0 0
Advertisement