ReversingWithMe's profile picture. Object File Analysis, Programming Scientist.

I use [lol, haha, :), !] to deal with Poe's Law.

Reserve right to be wrong sometimes.

Ryan

@ReversingWithMe

Object File Analysis, Programming Scientist. I use [lol, haha, :), !] to deal with Poe's Law. Reserve right to be wrong sometimes.

Ryan reposted

woot nice vuln find from @joernchen .. Anyone using LangGraph better upgrade. RCE via json deserialization in graph.invoke() which is the main api github.com/langchain-ai/l…


Ryan reposted

As part of the research process, the Big Sleep team has been looking at different code bases that present the models with unique technical challenges to solve. We believe transparency is very important, so these findings are shared in the Big Sleep tracker and currently include…


Ryan reposted

We’re excited to see the security and OSS communities engage on vulnerability disclosure in light of new AI technologies that we believe will enable both defenders and attackers alike. Existing and emerging norms around disclosure are important debates, and we’ve noted the…


Ryan reposted

To secure the future of software, we must first understand it! A new white paper from @__winn & @sergeybratus touches on a timely ask: "Invest in Research on Software Understanding"

🚨 NEW PAPER 🚨: “From Chaos to Capability: Building the U.S. Market for Offensive Cyber” by myself and @SergeyBratus 👉 ists.dartmouth.edu/programs/publi… Should the U.S. outsource its cyberattacks? We talked to 30 experts across gov, VC, and industry to find out.

__winn's tweet image. 🚨 NEW PAPER 🚨: “From Chaos to Capability: Building the U.S. Market for Offensive Cyber”
by myself and @SergeyBratus
👉 ists.dartmouth.edu/programs/publi… 
Should the U.S. outsource its cyberattacks? We talked to 30 experts across gov, VC, and industry to find out.


Ryan reposted

A few months ago, @rootxharsh and I gave a talk, sharing the slides here in case they’re helpful to anyone.

S1r1u5_'s tweet image. A few months ago, @rootxharsh and I gave a talk, sharing the slides here in case they’re helpful to anyone.

Ryan reposted

oh shiiittttttt

OMG.. whatsapp 0c in pwn2own

l33d0hyun's tweet image. OMG.. whatsapp 0c in pwn2own


Ryan reposted

It was a huge honor to give the keynote for this excellent workshop! Thanks so much to @mahal0z for inviting me; I'm delighted to see that the RE research community is thriving!

CCS has come to a close, and so has the first-ever SURE Workshop. We want to thank the authors, the PC, @moyix, our panel, and CCS for making SURE a success. We felt the support for this research area (the room was packed out for more than half the day). See you all next year!

sureworkshop's tweet image. CCS has come to a close, and so has the first-ever SURE Workshop. We want to thank the authors, the PC, @moyix, our panel, and CCS for making SURE a success. We felt the support for this research area (the room was packed out for more than half the day).

See you all next year!


Ryan reposted

Finally done with #flareon12. The 9th task was quite a ride. I need some tips from those who did the whole thing in less than a week.

hasherezade's tweet image. Finally done with #flareon12. The 9th task was quite a ride. I need some tips from those who did the whole thing in less than a week.

Ryan reposted

No gonna lie, I'm the biggest Apple hater for very very good reasons, but their last research paper explaining why they weren't interested in pursuing LLMs seems more and more like its gonna be correct.


Ryan reposted

It's been about a week since we completed DARPA's AIxCC, where we came in 5th and had the most accurate autonomous patching system in the competition. In the coming days, I'll be describing how we achieved it on the patching side. Stay tuned. Our CRS: github.com/shellphish/art…


Ryan reposted

I’ve looked through the AIxCC repos. If you are going to get started and try to adapt for your use, I suggest looking at @trailofbits and @theori_io CRS first. And ofc anyone who takes my AI Agents for Cybersecurity class will get a deep dive on this along with my own agents!


Ryan reposted

Veracode just dropped a bombshell of a 2025 GenAI Code Security Report showing AI codegen consistently produces code with high rate of vulnerabilities

richinseattle's tweet image. Veracode just dropped a bombshell of a 2025 GenAI Code Security Report showing AI codegen consistently produces code with high rate of vulnerabilities

“Veracode found Java to be the riskiest language for AI code generation, with a security failure rate over 70 percent. Other major languages, like Python, C#, and JavaScript, still presented significant risk, with failure rates between 38 percent and 45 percent. The research also…

businesswire.com

AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks, Veracode...

Veracode today unveiled its 2025 GenAI Code Security Report, revealing that AI-generated code introduces security vulnerabilities in 45% of cases.



Ryan reposted

Evaluating LLM-based Agents This report has a comprehensive list of methods for evaluating AI Agents. Don't ignore evals. If done right, they are a game-changer. Highly recommend it to AI devs. (bookmark it)

omarsar0's tweet image. Evaluating LLM-based Agents

This report has a comprehensive list of methods for evaluating AI Agents. 

Don't ignore evals. If done right, they are a game-changer.

Highly recommend it to AI devs. (bookmark it)

Ryan reposted

I think it's about time we have a talk about timestamp field in PE and the problem with platforms using it as a detection metric. Let's start off by explaining what "timestamp" field we're talking about here. In a standard compiled PE, a field exists called TimeDateStamp in the…

AzakaSekai_'s tweet image. I think it's about time we have a talk about timestamp field in PE and the problem with platforms using it as a detection metric. Let's start off by explaining what "timestamp" field we're talking about here. 

In a standard compiled PE, a field exists called TimeDateStamp in the…
AzakaSekai_'s tweet image. I think it's about time we have a talk about timestamp field in PE and the problem with platforms using it as a detection metric. Let's start off by explaining what "timestamp" field we're talking about here. 

In a standard compiled PE, a field exists called TimeDateStamp in the…
AzakaSekai_'s tweet image. I think it's about time we have a talk about timestamp field in PE and the problem with platforms using it as a detection metric. Let's start off by explaining what "timestamp" field we're talking about here. 

In a standard compiled PE, a field exists called TimeDateStamp in the…
AzakaSekai_'s tweet image. I think it's about time we have a talk about timestamp field in PE and the problem with platforms using it as a detection metric. Let's start off by explaining what "timestamp" field we're talking about here. 

In a standard compiled PE, a field exists called TimeDateStamp in the…

Ryan reposted

The code for building and updating the ARVO dataset, a collection of over 5000 memory safety vulnerabilities in open source software, is now open source! Link in reply :)

moyix's tweet image. The code for building and updating the ARVO dataset, a collection of over 5000 memory safety vulnerabilities in open source software, is now open source! Link in reply :)

Ryan reposted

1/ 🔥 AI agents are reaching a breakthrough moment in cybersecurity. In our latest work: 🔓 CyberGym: AI agents discovered 15 zero-days in major open-source projects 💰 BountyBench: AI agents solved real-world bug bounty tasks worth tens of thousands of dollars 🤖…

dawnsongtweets's tweet image. 1/ 🔥 AI agents are reaching a breakthrough moment in cybersecurity.
 In our latest work:

 🔓 CyberGym: AI agents discovered 15 zero-days in major open-source projects

 💰 BountyBench: AI agents solved real-world bug bounty tasks worth tens of thousands of dollars
🤖…

Ryan reposted

Our engineering & research team put together a deep dive on the multi-agent system that powers our Research capability in Claude[dot]ai; lots of fun details architectural diagrams, and prompting learnings here: anthropic.com/engineering/bu…


Ryan reposted

In my recent conference talks on browser security, I showed a calc-popping exploit demo that targets Firefox 135.0. For educational purpuses, to try to demistify some of that calc popping magic, the demo code is now public project-zero.issues.chromium.org/issues/3890794…


Ryan reposted

👋 Please join us in welcoming @RolfRolles as Hex-Rays’ new Chief Scientist! Rolf brings decades of RE expertise, with standout work in obfuscation, decompilation, and software protection. At Hex-Rays, he’ll lead research into next-gen decompilation and automated program…


Loading...

Something went wrong.


Something went wrong.