
Aravind Machiry
@machiry_msidc
a.k.a donfos. Assistant Professor, Electrical and Computer Engineering, Purdue University. Mastodon: @[email protected]
You might like
We at @emproofsecurity open-sourced a free firmware reverse engineering workshop for self-study. Topics: ELF analysis, cracking, malware triage, embedded-Linux, bare-metal, crypto-key extraction, anti-analysis. Docker setup and solutions included. github.com/emproof-com/wo…
I've been working in cybersecurity for over 25 years. Here are my key insights.




Python library for creating math animations

For those who would like to learn fundamentals of how computers & different computing paradigms (e.g., CPUs, GPUs, systolic arrays, SRAM, DRAM) work, I recommend our beginner course, Digital Design & Computer Architecture. Lecture videos Spring 2023: youtube.com/watch?v=VcKjvw…
youtube.com
YouTube
Digital Design and Computer Architecture - Lecture 1: Introduction...
ECE's Bagchi finalist for global engineering award 💡 Saurabh Bagchi, professor in the Elmore School of Electrical and Computer Engineering (@PurdueECE), is a finalist for the Institution of Engineering and Technology (@TheIET) Achievement Medal, a global award in engineering.…

Ouch. "Authors should: (1) not pick an important problem, (2) not challenge existing beliefs, (3) not obtain surprising results, (4) not use simple methods, (5) not provide full disclosure, and (6) not write clearly." journals.sagepub.com/doi/full/10.11…
CCS notifications are all out! We are looking forward to meeting you all in Utah in October!
As part of the Shellphish team, we qualified for the DARPA/ARPA-H AIxCC Final Event and got a $2,000,000 gift! Thank you to all the Purdue's students and faculties involved and to the entire Shellphish team! #aixcc @LifeAtPurdue @shellphish shellphish.net/aixcc/shellphi…
WE QUALIFIED FOR AIxCC FINALS!!!!
Our paper on ARVO, a huge (5000+) dataset of reproducible (w/PoC), recompilable vulns in open-source C/C++ projects is now up on arXiv! Awesome work by @n132XxX, @X3eRo0, Jordi Del Castillo, Haoran Xi, Abdelouahab Benchikh, & profs from NYU/ASU/UNSW arxiv.org/abs/2408.02153

Introducing ARTIPHISHELL! An LLM-Based Cyber Reasoning System made by @shellphish that autonomously finds and patches vulnerabilities for the @DARPA AIxCC competition (support.shellphish.net)



Want to join a newly funded NSF Center on resilient and secure Cyber-Physical Systems? Our team is hiring for at least 2 post-doctoral scholars. Center spans @LifeAtPurdue @GeorgiaTech @USC @UWMadison Apply through bit.ly/purduepostdoc24

I will repeat: PhD stipends are not supposed to be treated as salaries. You get paid while you are learning how to do research, as an RA. You get paid for learning how to teach as a TA.
PhD students do Teaching Assistantship and share teaching loads. Plus Research is work and it should be treated as work.
[1] arxiv.org/pdf/2311.05063 by @machiry_msidc et al. [2] blog.rust-embedded.org/embedded-hal-v… by @rustembedded [3] blog.theembeddedrustacean.com/demystifying-r… by @apollolabsbin [4] dl.acm.org/doi/pdf/10.114… by Schuermann et al. [5] youtube.com/watch?v=hmQr4f… by @LinaroOrg [6] ferrous-systems.com/ferrocene/ by…
George Hotz says that everyone should learn C and Assembly.
Check out this really cool binary patching tool developed right here in our lab @PurSecLab
I am happy to announce Patcherex2 (github.com/purseclab/Patc…), an easy-to-use, Python-based binary patching tool, designed to be extensible and compatible with multiple architectures. The code was mainly written by my student @__Han_Dai__ at @PurdueCS, for the DARPA AMP program.
SyzRetrospector: A Large-Scale Retrospective Study of Syzbot arxiv.org/pdf/2401.11642… by @pkqzy888 @arrdalan13 Lots of great detailed data and insights on kernel fuzzing bugs found by syzbot
How can you show that a bug is exploitable without actually writing an exploit? Exploit equivalence classes. blog.isosceles.com/exploit-equiva…
Congrats to the 7 companies that will receive $1 million each to develop AI-enabled cyber reasoning systems that automatically find and fix software vulnerabilities as part of the #AIxCC Small Business Track! Full announcement: darpa.mil/news-events/20….

The video of my presentation at GPCE '23 is now online. Learn about generating "conforming" programs with Xsmith! youtu.be/m1p8y1IRsIs
youtube.com
YouTube
[GPCE23] Generating Conforming Programs With Xsmith
United States Trends
- 1. #เพียงเธอตอนจบ 1.07M posts
- 2. LINGORM ONLY YOU FINAL EP 1.09M posts
- 3. #FanCashDropPromotion 1,043 posts
- 4. Apple TV 8,769 posts
- 5. #FridayVibes 6,420 posts
- 6. Good Friday 58.3K posts
- 7. No Kings 216K posts
- 8. trisha paytas N/A
- 9. #FursuitFriday 13.6K posts
- 10. Mamdani 277K posts
- 11. Cuomo 118K posts
- 12. F1 TV 2,465 posts
- 13. #LastFourWatched N/A
- 14. Shabbat Shalom 3,796 posts
- 15. Justice 344K posts
- 16. Ayla 147K posts
- 17. Happy Friyay 1,420 posts
- 18. New Yorkers 48K posts
- 19. Arc Raiders 4,329 posts
- 20. My President 63.3K posts
You might like
-
Antonio Bianchi
@anton00b -
Adam Doupé
@adamdoupe -
[email protected]
@Zardus -
Davide Balzarotti
@balzarot -
Alexandros Kapravelos
@kapravel -
RAID Conference
@RAID_Conference -
Zion Leonahenahe Basque
@mahal0z -
László Szekeres
@lszekeres -
lukas
@dreselli -
AttackIQ
@AttackIQ -
Grant H
@Digital_Cold -
Fabio Pagani
@pagabuc -
Stefan Nagy
@snagycs -
Aurélien Francillon
@aurelsec -
Andrea Continella
@_conand
Something went wrong.
Something went wrong.