__kpsingh's profile picture. Works at Google on Linux Kernel + Security (he/him). Views are my own.

KP Singh

@__kpsingh

Works at Google on Linux Kernel + Security (he/him). Views are my own.

KP Singh 已轉發

LSM Updates, Dependency Management, and much more to see today at #OSSummit EU! 📺 Tune in now 👉 goo.gle/45O3viR

GoogleOSS's tweet image. LSM Updates, Dependency Management, and much more to see today at #OSSummit EU!

📺 Tune in now 👉 goo.gle/45O3viR

KP Singh 已轉發

Linux kernel logic allowed Spectre attack on 'major cloud provider' reg.cx/488Y?utm_sourc…


KP Singh 已轉發

Today we take you behind the scenes like never before, learn about the work @Google's security experts do behind closed doors to keep billions safe every day. The HACKING GOOGLE docuseries is streaming NOW on @YouTube → g.co/safety/Hacking…


KP Singh 已轉發

Made my Monday. ♥️🦖🌵

此推文已無法使用。

KP Singh 已轉發

I just learned what eBPF is from a technical perspective. A superpower for the Linux Kernel.


KP Singh 已轉發

Honestly, it would be neat if potential users of kernel features could e.g., answer with: Used-by: systemd Supported-by: Bla Blu <[email protected]>


KP Singh 已轉發

vmtest.sh being checked into bpf selftest tree is so nice


KP Singh 已轉發

If you know, don't say it. If you don't know, find out. GOO.GLE/H4CK1NGG00GL3 🧑‍💻⏱️🕹️


KP Singh 已轉發

AI generated logo

sirdarckcat's tweet image. AI generated logo
sirdarckcat's tweet image. AI generated logo
sirdarckcat's tweet image. AI generated logo

Today @kavehrazavi and I are finally allowed to talk about #Retbleed. In 2018, #SpectreV2 was fixed by replacing indirect jumps with returns. But, returns can be poisoned like indirect jumps, throwing us us back to 2018 again. Paper, demo, addendum, code @ comsec.ethz.ch/retbleed



Thank you so much for attending the talk!

If you're looking for updates on BPF LSM, you've come to the right place. Staff Software Engineer @Google, KP Singh is sharing new features, and what's still to come for the BPF LSM right now at #OSSummit. Come watch ↓ goo.gle/39H6bah



KP Singh 已轉發

Learn how to patch Linux security vulnerabilities without rebooting the hardware and how to tighten the security of your Linux operating system with eBPF Linux Security Module. cfl.re/3Ab7ngG


KP Singh 已轉發

KP Singh on BPF LSM

xjamesmorris's tweet image. KP Singh on BPF LSM

KP Singh 已轉發

Great talk by Alexei, and many takeaways from folks looking to upstream work. This is how it's done. Watch the video.

If you're looking for updates on BPF LSM, you've come to the right place. Staff Software Engineer @Google, KP Singh is sharing new features, and what's still to come for the BPF LSM right now at #OSSummit. Come watch ↓ goo.gle/39H6bah



KP Singh 已轉發

📢 The LSS-NA 2022 schedule is now published: events.linuxfoundation.org/linux-security… Event: 23-24 June, Austin TX.


KP Singh 已轉發

A debugging technique I've been perfecting recently: when it's late at night and I've been banging my head on some bug (but have my mind fully wrapped around the symptoms), go to sleep. In the morning, usually solve it within 15 minutes. Subconscious really knows what it's doing.


My first Wordle 206 3/6 ⬛⬛⬛⬛⬛ ⬛⬛🟨⬛⬛ 🟩🟩🟩🟩🟩


KP Singh 已轉發

✨New RCA by @tehjh! 📱CVE-2021-1048 in the Android/Linux kernel #itw0days googleprojectzero.github.io/0days-in-the-w…


KP Singh 已轉發

What’s your favorite Linux joke? Mine is: Where do Russian Hackers store their exploits? /ussr/bin/


Loading...

Something went wrong.


Something went wrong.