Nightingale: Translating Embedded VM Code in x86 Binary Executables https://loccs.sjtu.edu.cn/~romangol/publications/isc17.pdf #reverse #dukeBarman
Bootloader emulation with Miasm (case of NotPetya) https://github.com/aguinet/miasm-bootloader #reverse #dukeBarman
GitHub
GitHub - aguinet/miasm-bootloader: x86 bootloader emulation with Miasm (case of NotPetya)
x86 bootloader emulation with Miasm (case of NotPetya) - GitHub - aguinet/miasm-bootloader: x86 bootloader emulation with Miasm (case of NotPetya)
Summ3r 0f h4ck: результаты летней стажировки в Digital Security (обновления для популярных и анонс новых opensource программ / плагинов) https://habr.com/company/dsec/blog/421953/
Habr
Summ3r 0f h4ck: результаты летней стажировки в Digital Security
Уже третий год подряд мы успешно продолжаем традицию летних стажировок. Как и в прошлые годы, мы взяли стажеров на два технических направления: в отдел исследований и в отдел анализа защищенности. С...
Open Source Summit 2018 (by Linux Foundation) videos Day 1: https://www.youtube.com/watch?v=56vtkFbhG68&list=PLbzoR-pLrL6prBEQGKkuo4A9lzyJQExcG Day 2: https://www.youtube.com/watch?v=Mv2jXUN4rLs&list=PLbzoR-pLrL6q7MIL57XmT50FYYoF3_obu #conference #dukeBarman
YouTube
Lightning Talk: Closing Remarks - Donnie Berkholz, Robyn Bergeron, & Bryan Liles, OSS Program Chairs
Lightning Talk: Closing Remarks - Donnie Berkholz, Robyn Bergeron, & Bryan Liles, Open Source Summit Program Chairs
Various BIOS Utilities for Modding/Research https://github.com/platomav/BIOSUtilities #bios #hardware #dukeBarman
GitHub
GitHub - platomav/BIOSUtilities: Collection of various BIOS/UEFI-related utilities which aid in research and/or modding purposes.
Collection of various BIOS/UEFI-related utilities which aid in research and/or modding purposes. - platomav/BIOSUtilities
Reversing malware in a custom format: Hidden Bee elements https://blog.malwarebytes.com/threat-analysis/2018/08/reversing-malware-in-a-custom-format-hidden-bee-elements/ #malware #dukeBarman
Malwarebytes
Reversing malware in a custom format: Hidden Bee elements | Malwarebytes Labs
When we recently analyzed payloads related to Hidden Bee (dropped by the Underminer EK), we noticed something unusual. After reversing the malware, we discovered that its authors actually created their own executable format. Follow our step-by-step analysis…
Radare2 and bioinformatics: a good match? http://radare.today/posts/radare2-bioinformatics/ #bioinformatics #reverse #radare2 #dukeBarman
radareorg.github.io
Radare2 and bioinformatics: a good match?
Intro Ahead of this years’ radarecon, pancake nudged me into discussion we both have about how software reverse engineering and bioinformatics compare and might complement each other, if at all. Inspired by Bunnie Huang’s writeups on (computational) biology…
Analysing "Trigger-based" Malware with S2E https://adrianherrera.github.io/post/malware-s2e/ #malware #s2e #dukeBarman
adrianherrera.github.io
Analysing "Trigger-based" Malware with S2E
Introduction This blog post is a quick brain-dump of the work that I was doing during my last month in the Dependable Systems Lab at EPFL. At the time I was working on malware analysis with S2E. While not anything earth-shatteringly novel, I’m hopeful that…
Insecure Firmware Updates in Server Management Systems https://blog.eclypsium.com/2018/09/06/insecure-firmware-updates-in-server-management-systems/ #hardware #dukeBarman
Firmware is the new Software https://www.platformsecuritysummit.com/2018/speaker/hudson/ #hardware #dukeBarman
Platformsecuritysummit
Firmware is the new Software - Trammell Hudson, Two Sigma - Platform Security Summit 2018
Conference on composable software supply chain integrity and hardware-assisted platform security, with OpenEmbedded, OpenXT and other ecosystems
r2dec Version 1.0 has been released in the master. update your version via r2pm install r2dec (it will do a git pull) https://github.com/wargio/r2dec-js #reverse #radare2 #dukeBarman
GitHub
GitHub - wargio/r2dec-js: r2dec-js is a JavaScript-based decompiler that converts assembly code into pseudo-C. It aids users in…
r2dec-js is a JavaScript-based decompiler that converts assembly code into pseudo-C. It aids users in understanding assembly by providing readable high-level explanations, making low-level programm...
R2con talks slides https://github.com/radareorg/r2con/tree/master/2018/talks #radare2 #r2con #jeisonwi
beebug - A tool for checking exploitability https://github.com/invictus1306/beebug #radare2 #reverse #dukeBarman #r2con
GitHub
GitHub - invictus1306/beebug: A tool for checking exploitability
A tool for checking exploitability. Contribute to invictus1306/beebug development by creating an account on GitHub.
Recognition Techniques for Renaming Functions in Windows Malware https://drive.google.com/file/d/1Iipl75M1WaaETwjVE7S5nvi2P_Za1ZFX/view #r2con #radare2 #dukeBarman
Falkervisor (grilled_cheese) - hypervisor written in C https://github.com/gamozolabs/falkervisor_grilled_cheese Using (for fuzzing r2): https://www.youtube.com/watch?v=AqFMSI8e9Qo #radare2 #fuzzing #dukeBarman
GitHub
GitHub - gamozolabs/falkervisor_grilled_cheese
Contribute to gamozolabs/falkervisor_grilled_cheese development by creating an account on GitHub.