shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

268
active users

#fuzzing

0 posts0 participants0 posts today

Trying real hard to build a fuzzer targeting the CPython JIT, lots of features implemented but not a single crash or bug discovered so far.

Such is life when hunting for crashes in robust code.

This weekend I'll be spinning off a new fuzzer that grew from fusil. Wish me luck 🙂

#Python#CPython#JIT

My colleagues at CEA in #Paris, France, are hiring a 2-year #postdoc to work on the joint research project #SECUBIC about #fuzzing binaries to identify #backdoors. (See this recently joint work at #ICSE2025 for previous results: upsilon.cc/~zack/research/publ )

If you're interested, or know interested candidates, head to: secubic-ptcc.github.io/jobs/op for details.

For @Xdebug's native path mapping, I need to parse a file.

This afternoon I played around with AFL++, a fuzzing tool to see if I had missed a few edge cases. It works a little like Infection PHP, but then for C programs.

Turned out I had missed egde cases that the fuzzer found, and I ended up fixing four bugs!

Replied in thread

Ach ja: Kurzversion der Erkenntnisse und Versprechungen von #CrowdStrike:

1️⃣ Wir (das Internet und DNIP) lagen erstaunlich gut bei der Analyse der Ursachen
2️⃣ Sie setzen Etliches von dem um, was mein Artikel fordert: Bessere Tests (inkl. #Fuzzing) von Software, gründlichere Validierung der Daten beim Laden sowie #StagedRollout (vom Kunden zu steuern; mit Feedback)

Aktuelle Kunden, die bei CrowdStrike bleiben wollen (und potenzielle Neukunden) sollten das aber überprüfen.
dnip.ch/2024/07/23/zweites-cro

Das Netz ist politisch · Wie können wir ein zweites «CrowdStrike» vermeiden? - Das Netz ist politischAm Freitag hatte ein Update der Sicherheitsfirma CrowdStrike über 8 Millionen Windows-Systeme weltweit auf wohl eine der mühsamsten Arten lahmgelegt.

Hello everyone :)

Since it seems to be a requirement, here is my #introduction for anyone willing to follow a full-time lurker o_o

- I do #fuzzing research, and this will make up most of what I post here
- I live in Germany

Please do not follow if you cannot be kind :) I will likely mistype things or be overly passionate sometimes ._.

It's been a while since I've given any talks or lectures, and after trying out streaming, I've been wanting to give other forms of creations a try too.

So, here is a short video about a side project I've been working on recently: Skuld a timeline fuzzer for NES games.

#fuzzing #nes #skuld

youtube.com/watch?v=HXsayxdf3R

YouTubeFuzzing Mario (Part 1) - Paths and TimelinesThis is skuld, a timeline fuzzer I've been working on for fuzzing NES games.

#introduction ฅ^•ﻌ•^ฅ

I do graphics security for a chip manufacturer. #fuzzing is my weapon of choice. I've done Security Development Lifecycle policy, auditing, and execution for long enough to be absolutely numb to corporate security culture.

#rust 🦀

My hobby is collecting hobbies but #cooking, #3DPrinting, and #mechanicalkeyboards are my most active ones now. Most of my projects have in common that they are about better instrumentation, tools, and infrastructure, not so much about the end result, e.g., I spend more time tuning my printer than using it to print things I need. My hope is that what I do and learn will help others create.

I absolutely hate intellectual property and the current school systems. Knowledge is everyone's and should be available for everyone to learn and use. Telling you what, how, and when to learn has to be one of the worst ways to transmit knowledge.

I love teaching and learning with others who love to learn. If you think I might know about something feel free to ask directly.

#cats are the only authority I recognize.

Hi, I'm Dominik 🙃

I had always worked for product security teams on the side (WiFi SoHo routers, Smartcard readers, random software, ..) during uni/PhD, but finally quit #academia completely a while ago.

Now I'm doing #connectivity security and vuln research, trying to improve archaic low level protocols and implementations in #phones 😬.

Before that, I did a lot of #fuzzing (still do) and co-authored a bunch of papers I personally like, about #snapshot and #network fuzzing (FitM), #binary-only baseband fuzzing (FirmWire), Nvidia #driver fuzzing (BSOD) and many more.

Also, stumbled into @aflplusplus, the team maintaining #AFL++ and the fuzzing library #LibAFL we wrote in #rust (github.com/AFLplusplus/LibAFL) that currently dominates benchmarks! Enjoying this a lot :)

Apart from that, I travel, play games, organize CTFs, and just do whatever activities friends spontaneously throw at me

GitHubGitHub - AFLplusplus/LibAFL: Advanced Fuzzing Library - Slot your Fuzzer together in Rust! Scales across cores and machines. For Windows, Android, MacOS, Linux, no_std, ...Advanced Fuzzing Library - Slot your Fuzzer together in Rust! Scales across cores and machines. For Windows, Android, MacOS, Linux, no_std, ... - AFLplusplus/LibAFL