Advertisement · 728 × 90

Posts by Ryan

Preview
Bringing Rust to the Pixel Baseband Posted by Jiacheng Lu, Software Engineer, Google Pixel Team Google is continuously advancing the security of Pixel devices. We have been f...

2 years ago I did a PoC to run #rust 🦀 in the #pixel modem

Today it shipped in millions of devices!

They grow up to fast! 🥲

security.googleblog.com/2026/04/brin...

#rust #security #smartphone #baseband

1 week ago 98 17 5 1
AI vs AI - Binary Ninja Live Stream
AI vs AI - Binary Ninja Live Stream YouTube video by VECTOR 35

Thanks to @elykdeer.bsky.social and the @binary.ninja team for having me on the AI vs AI Binary Ninja stream. Great discussion on agentic RE, tooling, and feedback loops.

www.youtube.com/watch?v=TBqB...

2 weeks ago 2 2 0 0

I passed my defense! After a small celebration, it's time to get back to work.

Too many supply chain attacks in one year...

3 weeks ago 1 1 0 0

I think the recent iOS exploit kit leaks are a hint of what's to come. I'm less worried about 0-days (since LLMs benefit attackers and defenders roughly symmetrically) and more worried about ubiquitous exploits for n-days.

3 weeks ago 9 2 2 1
Vulnerability Research Is Cooked

I wrote something: sockpuppet.org/blog/2026/03...

3 weeks ago 93 40 7 7

That is awesome news!!

1 month ago 0 0 0 0
Post image

This Fall, I’m joining the University of Georgia as an Assistant Professor!

I want to push on the fundamentals of software reverse engineering, from decompilation to how humans actually understand code.

I’m looking for PhD students, collaborators, and sponsors. More below.

1 month ago 3 4 3 0

Congratulations Zion!

1 month ago 0 2 1 0
Preview
Why Codex Security Doesn’t Include a SAST Report A deep dive into why Codex Security doesn’t rely on traditional SAST, instead using AI-driven constraint reasoning and validation to find real vulnerabilities with fewer false positives.

openai.com/index/why-co... a Monday morning blogpost for your perusal and enjoyment !

1 month ago 2 2 0 0
Advertisement
Preview
Rare Not Random: Using Token Efficiency for Secrets Scanning Entropy often struggles with generic secrets and short strings. We look at how token efficiency can better identify strings that don’t look like normal text.

That is really clever use of AI tokenizers

www.aikido.dev/blog/token-e...

1 month ago 0 0 0 0

"Theory building and evaluation can guide the design and analysis of surveys, and surveys can also be applied to test theories."

1 month ago 0 2 1 0
Post image Post image

My keynote at RE//Verse went great!

(it will be released online later if you missed it!)

1 month ago 133 3 5 0
Preview
Dr. Gladys West, Mathematician Whose Work Made GPS Possible, Dies at 95 ALEXANDRIA, VA — Dr. Gladys West, the pioneering mathematician whose work laid the foundation for modern GPS technology, has died. She passed away

Dr. Gladys West, the pioneering mathematician whose work laid the foundation for modern GPS technology, has died. She was 95.

3 months ago 27239 9603 550 501
Post image

Today's cool visualization of the day is brought to you by arxiv.org/pdf/2512.14045

The world needs more Sankey diagrams.

3 months ago 0 1 0 0

For types etc to see what the decompiler had for those, that does require not just dwarf eval.

An undefined function that would have referenced an undefined global struct can’t be evaluated.

4 months ago 1 0 0 0

I think it’s fair to say some structures especially those unidentified in stripped binary by decomp, and whole functions left as undefined data can’t be mapped or meaningless to map in those cases. I think for a majority of the technique you would be able to still do that eval, and you can use xref

4 months ago 1 0 2 0
Advertisement

I’m not sure I follow, stripping a binary would leave you with a debug binary and a new stripped binary, and you can tie debug symbols to new one, alternatively using the external debug symbols does the same thing?

4 months ago 0 0 1 0

This DecompileBench paper is pretty slick, especially how they test for semantic equivalence: arxiv.org/pdf/2505.11340

Unfortunately, there's a pretty big limitation that isn't addressed anywhere that I can see. Can you tell what it is?

4 months ago 1 1 1 0

Episode 23: War Stories with Brendan Dolan-Gavitt (XBOW)!

@tib3rius.bsky.social & @swiftsecur.bsky.social are joined by @moyix.net who shares some AI and human war stories with us!

Links below!

5 months ago 5 5 1 0
Post image

🎙️ #ASE2025 Keynote Speaker Series (2 of 3)

Dr. Cristina Cifuentes, Vice President @ Oracle Software Assurance

“Oracle Parfait – Detecting Application Vulnerabilities at Scale – Past, Present and Future”

5 months ago 6 2 1 2
Post image

🎙️ ASE 2025 Keynote Speaker Series (3 of 3)

Prof. Taesoo Kim (Georgia Tech)
“Hyperscale Bug Finding and Fixing: DARPA AIxCC”

conf.researchr.org/track/ase-20...

5 months ago 4 2 1 0
Post image

🎙️ #ASE2025 Keynote Speaker Series (1 of 3)

What do symbolic model checking, path profiling, and quantum simulation have in common? 🤔

Find out from Prof. Reps (University of Wisconsin-Madison) in his ASE2025 Keynote “We Will Publish No Algorithm Before Its Time”!

conf.researchr.org/track/ase-20...

6 months ago 10 3 0 1
Post image

You've seen the trends in AIxCC: LLMs can hack source, find vulns, and patch them. But what about on binaries without source? Do decompilers close the gap, or is there more to grow?

Come see my talk at DistrctCon where I merge and dissect these two fields: AI Hacking + Decomp.

5 months ago 6 4 0 0
What the hell are we doing? · Addison Crump Homepage for Addison Crump

Must-read for fuzzing folks (read: tooling/algorithms/academia) by Addison Crump
addisoncrump.info/research/wha...

5 months ago 30 11 1 1
Preview
GitHub - emproof-com/workshop_firmware_reverse_engineering: Workshop on firmware reverse engineering Workshop on firmware reverse engineering. Contribute to emproof-com/workshop_firmware_reverse_engineering development by creating an account on GitHub.

We at @emproofsecurity.bsky.social open-sourced a free firmware reverse engineering workshop for self-study.

Topics: ELF analysis, cracking, malware triage, embedded-Linux, bare-metal, crypto-key extraction, anti-analysis. Docker setup and solutions included.

github.com/emproof-com/...

6 months ago 5 2 0 0
Screenshot of the blog post intro:

Permissive vs Copyleft Open Source
Published on Jul 9, 2025.
The premise of copyleft licenses is attractive: Create more open source!

With permissive licenses, someone can take the code and make proprietary modifications to it and sell it to other people without releasing the modifications. We want people to publish their improvements, right?

With copyleft, we can force people to publish their improvements to copyleft code. Businesses will want to use our code because creating it was so much work in the first place. We need copyleft if we want more contributors, more open source, more code re-use, more freedom.

Right?

Wrong.

In this post, I break down all the ways copyleft licenses fail to achieve their stated goals, and explain why permissive licenses succeed where copyleft fails.

Screenshot of the blog post intro: Permissive vs Copyleft Open Source Published on Jul 9, 2025. The premise of copyleft licenses is attractive: Create more open source! With permissive licenses, someone can take the code and make proprietary modifications to it and sell it to other people without releasing the modifications. We want people to publish their improvements, right? With copyleft, we can force people to publish their improvements to copyleft code. Businesses will want to use our code because creating it was so much work in the first place. We need copyleft if we want more contributors, more open source, more code re-use, more freedom. Right? Wrong. In this post, I break down all the ways copyleft licenses fail to achieve their stated goals, and explain why permissive licenses succeed where copyleft fails.

I wrote a comprehensive post dispelling many incorrect assumptions about Copyleft vs Permissive open source licenses.

If you author/contribute to open source code, it's worth reading and understanding these nuances!

shazow.net/posts/permis...

9 months ago 69 17 3 3
Advertisement
Preview
LIEF patchelf This blog post introduces a modern LIEF-based version of patchelf

New blog post on implementing patchelf-like functionalities using LIEF's Rust bindings:

lief.re/blog/2025-07...

9 months ago 3 2 0 0
XBlock Summer 2024 Update Howdy! I figure it's probably not the worst idea to do a quick update on XBlock progress, as well as give some indication what I'm planning to do in the future with it. This will be more roadmap-y tha...

Cool blog of how @aendra.com built @xblock.aendra.dev her automoderation tuned screenshot classifier AI model and pipeline, including all the manual work behind it.
www.aendra.com/xblock-summe...

9 months ago 24 6 1 0
Post image

It was great to see the community come together again at our 4th #FUZZING workshop in Trondheim this year! We drew a big crowd. Enjoyed the super lively discussions.

Thanks to the organizers:
* @rohan.padhye.org
* @yannicnoller.bsky.social
* @ruijiemeng.bsky.social and
* László Szekeres (Google)

9 months ago 21 3 2 0