Aravind Machiry
@machiry_msidc
a.k.a donfos. Assistant Professor, Electrical and Computer Engineering, Purdue University. Mastodon: @[email protected]
Bạn có thể thích
We at @emproofsecurity open-sourced a free firmware reverse engineering workshop for self-study. Topics: ELF analysis, cracking, malware triage, embedded-Linux, bare-metal, crypto-key extraction, anti-analysis. Docker setup and solutions included. github.com/emproof-com/wo…
I've been working in cybersecurity for over 25 years. Here are my key insights.
Python library for creating math animations
For those who would like to learn fundamentals of how computers & different computing paradigms (e.g., CPUs, GPUs, systolic arrays, SRAM, DRAM) work, I recommend our beginner course, Digital Design & Computer Architecture. Lecture videos Spring 2023: youtube.com/watch?v=VcKjvw…
youtube.com
YouTube
Digital Design and Computer Architecture - Lecture 1: Introduction...
ECE's Bagchi finalist for global engineering award 💡 Saurabh Bagchi, professor in the Elmore School of Electrical and Computer Engineering (@PurdueECE), is a finalist for the Institution of Engineering and Technology (@TheIET) Achievement Medal, a global award in engineering.…
Ouch. "Authors should: (1) not pick an important problem, (2) not challenge existing beliefs, (3) not obtain surprising results, (4) not use simple methods, (5) not provide full disclosure, and (6) not write clearly." journals.sagepub.com/doi/full/10.11…
CCS notifications are all out! We are looking forward to meeting you all in Utah in October!
As part of the Shellphish team, we qualified for the DARPA/ARPA-H AIxCC Final Event and got a $2,000,000 gift! Thank you to all the Purdue's students and faculties involved and to the entire Shellphish team! #aixcc @LifeAtPurdue @shellphish shellphish.net/aixcc/shellphi…
WE QUALIFIED FOR AIxCC FINALS!!!!
Our paper on ARVO, a huge (5000+) dataset of reproducible (w/PoC), recompilable vulns in open-source C/C++ projects is now up on arXiv! Awesome work by @n132XxX, @X3eRo0, Jordi Del Castillo, Haoran Xi, Abdelouahab Benchikh, & profs from NYU/ASU/UNSW arxiv.org/abs/2408.02153
Introducing ARTIPHISHELL! An LLM-Based Cyber Reasoning System made by @shellphish that autonomously finds and patches vulnerabilities for the @DARPA AIxCC competition (support.shellphish.net)
Want to join a newly funded NSF Center on resilient and secure Cyber-Physical Systems? Our team is hiring for at least 2 post-doctoral scholars. Center spans @LifeAtPurdue @GeorgiaTech @USC @UWMadison Apply through bit.ly/purduepostdoc24
I will repeat: PhD stipends are not supposed to be treated as salaries. You get paid while you are learning how to do research, as an RA. You get paid for learning how to teach as a TA.
PhD students do Teaching Assistantship and share teaching loads. Plus Research is work and it should be treated as work.
[1] arxiv.org/pdf/2311.05063 by @machiry_msidc et al. [2] blog.rust-embedded.org/embedded-hal-v… by @rustembedded [3] blog.theembeddedrustacean.com/demystifying-r… by @apollolabsbin [4] dl.acm.org/doi/pdf/10.114… by Schuermann et al. [5] youtube.com/watch?v=hmQr4f… by @LinaroOrg [6] ferrous-systems.com/ferrocene/ by…
George Hotz says that everyone should learn C and Assembly.
Check out this really cool binary patching tool developed right here in our lab @PurSecLab
I am happy to announce Patcherex2 (github.com/purseclab/Patc…), an easy-to-use, Python-based binary patching tool, designed to be extensible and compatible with multiple architectures. The code was mainly written by my student @__Han_Dai__ at @PurdueCS, for the DARPA AMP program.
SyzRetrospector: A Large-Scale Retrospective Study of Syzbot arxiv.org/pdf/2401.11642… by @pkqzy888 @arrdalan13 Lots of great detailed data and insights on kernel fuzzing bugs found by syzbot
How can you show that a bug is exploitable without actually writing an exploit? Exploit equivalence classes. blog.isosceles.com/exploit-equiva…
Congrats to the 7 companies that will receive $1 million each to develop AI-enabled cyber reasoning systems that automatically find and fix software vulnerabilities as part of the #AIxCC Small Business Track! Full announcement: darpa.mil/news-events/20….
The video of my presentation at GPCE '23 is now online. Learn about generating "conforming" programs with Xsmith! youtu.be/m1p8y1IRsIs
youtube.com
YouTube
[GPCE23] Generating Conforming Programs With Xsmith
United States Xu hướng
- 1. FIFA 389K posts
- 2. FINALLY DID IT 437K posts
- 3. The WET 117K posts
- 4. Frank Gehry 5,295 posts
- 5. Paraguay 29K posts
- 6. Hep B 16.6K posts
- 7. Argentina 239K posts
- 8. Portugal 109K posts
- 9. Brazil 82.7K posts
- 10. Warner Bros 255K posts
- 11. Matt Campbell 11.5K posts
- 12. Sherman 4,857 posts
- 13. Iowa State 9,749 posts
- 14. #Mundial2026 43.9K posts
- 15. Morocco 69.2K posts
- 16. Croatia 26.5K posts
- 17. Infantino 80.3K posts
- 18. Vizio N/A
- 19. Burden 26.2K posts
- 20. Group L 18.6K posts
Bạn có thể thích
-
Antonio Bianchi
@anton00b -
Adam Doupé
@adamdoupe -
[email protected]
@Zardus -
Davide Balzarotti
@balzarot -
Alexandros Kapravelos
@kapravel -
Zion Leonahenahe Basque
@mahal0z -
László Szekeres
@lszekeres -
AttackIQ
@AttackIQ -
Nilo Redini
@badnack -
Grant H
@Digital_Cold -
Fabio Pagani
@pagabuc -
Stefan Nagy
@snagycs -
Aurélien Francillon
@aurelsec -
Victor van der Veen
@vvdveen
Something went wrong.
Something went wrong.