michaelmarcozzi's profile picture. Permanent researcher in cybersecurity (fuzzing) @UnivParisSaclay
I make software safer by viciously torturing it to reveal its flaws
I can be kind too

Michaël Marcozzi 🇪🇺🇧🇪

@michaelmarcozzi

Permanent researcher in cybersecurity (fuzzing) @UnivParisSaclay I make software safer by viciously torturing it to reveal its flaws I can be kind too

The Annual French Research Day on Software Testing will be held in beautiful Grenoble on Dec 11! See you there! 😀 Info and registration: gdr-gpl.cnrs.fr/?cat=25

michaelmarcozzi's tweet image. The Annual French Research Day on Software Testing will be held in beautiful Grenoble on Dec 11!

See you there! 😀

Info and registration: gdr-gpl.cnrs.fr/?cat=25

Michaël Marcozzi 🇪🇺🇧🇪 reposted

The details of the Trump administration's methodical destruction of American science. nytimes.com/interactive/20…


Happy to have presented our SECUBIC project to the French research community in system security (RESSI'25)! 🏠 secubic-ptcc.github.io 🧑‍🔬 @Seb_Bardin @Jean_YvesMarion Stefano Zacchiroli Thanks to the RESSI organizers who had even provided a pool to finish my #OOPSLA reviews! 😇

michaelmarcozzi's tweet image. Happy to have presented our SECUBIC project to the French research community in system security (RESSI'25)!

🏠 secubic-ptcc.github.io
🧑‍🔬 @Seb_Bardin @Jean_YvesMarion Stefano Zacchiroli

Thanks to the RESSI organizers who had even provided a pool to finish my #OOPSLA reviews! 😇
michaelmarcozzi's tweet image. Happy to have presented our SECUBIC project to the French research community in system security (RESSI'25)!

🏠 secubic-ptcc.github.io
🧑‍🔬 @Seb_Bardin @Jean_YvesMarion Stefano Zacchiroli

Thanks to the RESSI organizers who had even provided a pool to finish my #OOPSLA reviews! 😇
michaelmarcozzi's tweet image. Happy to have presented our SECUBIC project to the French research community in system security (RESSI'25)!

🏠 secubic-ptcc.github.io
🧑‍🔬 @Seb_Bardin @Jean_YvesMarion Stefano Zacchiroli

Thanks to the RESSI organizers who had even provided a pool to finish my #OOPSLA reviews! 😇
michaelmarcozzi's tweet image. Happy to have presented our SECUBIC project to the French research community in system security (RESSI'25)!

🏠 secubic-ptcc.github.io
🧑‍🔬 @Seb_Bardin @Jean_YvesMarion Stefano Zacchiroli

Thanks to the RESSI organizers who had even provided a pool to finish my #OOPSLA reviews! 😇

Check out our ROSARUM benchmark, part of our #icse2025 paper on backdoors and fuzzing: ▶️ It is a fuzzing benchmark (can fuzzers trigger backdoors reliably and fast?) ▶️ It is a backdoor detection benchmark (can code analyses find backdoors reliably?) ⬇️ github.com/binsec/rosarum


Michaël Marcozzi 🇪🇺🇧🇪 reposted

How to detect backdoors efficiently? 🗣️ The slides of our #icse2025 presentation on "Finding Backdoors with Fuzzing" are now available at ⬇️ binsec.github.io/assets/publica…

BinsecTool's tweet image. How to detect backdoors efficiently?

🗣️ The slides of our #icse2025 presentation on "Finding Backdoors with Fuzzing" are now available at

⬇️ binsec.github.io/assets/publica…

Michaël Marcozzi 🇪🇺🇧🇪 reposted

Very honored to receive the Best Artifact award at #icse2025 🥳 Congrats and thank you to my coauthors! @michaelmarcozzi, Emilien Decoux, Stefano Zacchiroli

plumtrie's tweet image. Very honored to receive the Best Artifact award at #icse2025 🥳

Congrats and thank you to my coauthors! @michaelmarcozzi, Emilien Decoux, Stefano Zacchiroli

Michaël Marcozzi 🇪🇺🇧🇪 reposted

Too many bugs in the queue, not enough time to fix them all? Happy to share that our work on automated bug priorization has been accepted at @USENIXSecurity 2025 -- joint work with Guilhem Lacombe binsec.github.io/nutshells/usen…

Seb_Bardin's tweet image. Too many bugs in the queue, not enough time to fix them all?  Happy to share that our work on automated bug priorization has been accepted at @USENIXSecurity  2025 -- joint work with Guilhem Lacombe   binsec.github.io/nutshells/usen…

"Finding backdoors with fuzzing" --> presentation at @ICSEconf on Friday at 4pm by the great @plumtrie! 👇

On my way to Ottawa and @ICSEconf 🍁 Presenting on Friday (May 2nd) at 16:00 local time in room 210, come say hi ☺️



Michaël Marcozzi 🇪🇺🇧🇪 reposted

JOB OFFER! - Liked our work on finding backdoors with fuzzing? Then, join the team as a postdoc and help us fight binary supply-chain attacks! We offer a stimulating and open-minded scientific environment in English, in wonderful Paris! APPLY AT secubic-ptcc.github.io/jobs/open/2025…

BinsecTool's tweet image. JOB OFFER! - Liked our work on finding backdoors with fuzzing? Then, join the team as a postdoc and help us fight binary supply-chain attacks!

We offer a stimulating and open-minded scientific environment in English, in wonderful Paris!

APPLY AT secubic-ptcc.github.io/jobs/open/2025…

How to detect backdoors efficiently? ▶️ Backdoors were found in firmware & open-source code ▶️ Detection requires much manual reverse-engineering ▶️ Fuzzers cannot see backdoors Our @ICSEconf preprint on finding backdoors with fuzzing is at binsec.github.io/nutshells/icse… A thread ⬇️

BinsecTool's tweet image. How to detect backdoors efficiently?

▶️ Backdoors were found in firmware & open-source code
▶️ Detection requires much manual reverse-engineering 
▶️ Fuzzers cannot see backdoors

Our @ICSEconf preprint on finding backdoors with fuzzing is at binsec.github.io/nutshells/icse…

A thread ⬇️


📢 I am looking for a postdoc on fuzzing, to prevent backdoors and supply-chain attacks! Come and join the team here in Paris (or spread the word)! 🙂 Details and application: secubic-ptcc.github.io/jobs/open/2025…

michaelmarcozzi's tweet image. 📢 I am looking for a postdoc on fuzzing, to prevent backdoors and supply-chain attacks!

Come and join the team here in Paris (or spread the word)! 🙂

Details and application: secubic-ptcc.github.io/jobs/open/2025…

US CISA cybersecurity agency could lose 1300 employees (about a third of its workforce)...

🔴 Trump révoque les habilitations de Chris Krebs, ex-directeur de la CISA (l’Agence de cybersécurité et de sécurité des infrastructures.) ➡️ Il l’accuse d’avoir censuré les conservateurs et dissimulé l’affaire Hunter Biden. ➡️ L’agence pourrait perdre 1 300 employés. #CISA



🏆 Our ROSA tool for backdoor detection has won a best artifact award at @ICSEconf! Try it out: github.com/binsec/rosa Huge thanks and congrats to my student @plumtrie for his huge and great work! 👏👏👏

michaelmarcozzi's tweet image. 🏆 Our ROSA tool for backdoor detection has won a best artifact award at @ICSEconf! 

Try it out: github.com/binsec/rosa

Huge thanks and congrats to my student @plumtrie for his huge and great work! 👏👏👏

Michaël Marcozzi 🇪🇺🇧🇪 reposted

#FUZZING'25 Deadline Extension ────── If you have not finished your #FUZZING paper yet, you are in luck! :) We decided to extend the deadline to March 26, 2025! 🔗 fuzzingworkshop.github.io //cc Rohan Padhye (@moarbugs), László Szekeres (@lszekeres), @RuijieMeng, @mboehme_


Our ROSA tool for backdoor detection is available! Try it out! 👇

We (myself, @michaelmarcozzi, Stefano Zacchiroli, Emilien Decoux) release the ROSA toolchain, enabling fuzzing-based backdoor detection 🎉 Tool: github.com/binsec/rosa Benchmark: github.com/binsec/rosarum This work received both Available & Reusable badges at @ICSEconf 🥳



Happy to read such enthusiastic reactions to our @ICSEconf paper! ☺️ "ROSA Sets a New Standard for Backdoor Detection." "If you work in cybersecurity, penetration testing, or software auditing, ROSA is a must-try in the fight against hidden threats." medium.com/@itsissachar/r…


Michaël Marcozzi 🇪🇺🇧🇪 reposted

How to detect backdoors efficiently? ▶️ Backdoors were found in firmware & open-source code ▶️ Detection requires much manual reverse-engineering ▶️ Fuzzers cannot see backdoors Our @ICSEconf preprint on finding backdoors with fuzzing is at binsec.github.io/nutshells/icse… A thread ⬇️

BinsecTool's tweet image. How to detect backdoors efficiently?

▶️ Backdoors were found in firmware & open-source code
▶️ Detection requires much manual reverse-engineering 
▶️ Fuzzers cannot see backdoors

Our @ICSEconf preprint on finding backdoors with fuzzing is at binsec.github.io/nutshells/icse…

A thread ⬇️

Michaël Marcozzi 🇪🇺🇧🇪 reposted

Timely topic, elegant solution. What else?

How to detect backdoors efficiently? ▶️ Backdoors were found in firmware & open-source code ▶️ Detection requires much manual reverse-engineering ▶️ Fuzzers cannot see backdoors Our @ICSEconf preprint on finding backdoors with fuzzing is at binsec.github.io/nutshells/icse… A thread ⬇️

BinsecTool's tweet image. How to detect backdoors efficiently?

▶️ Backdoors were found in firmware & open-source code
▶️ Detection requires much manual reverse-engineering 
▶️ Fuzzers cannot see backdoors

Our @ICSEconf preprint on finding backdoors with fuzzing is at binsec.github.io/nutshells/icse…

A thread ⬇️


One of the @ICSEconf reviewer said that our paper on finding backdoors with fuzzing was "a joy to read"! 🙂 The preprint is here! Give it a try by yourself! 🔽

How to detect backdoors efficiently? ▶️ Backdoors were found in firmware & open-source code ▶️ Detection requires much manual reverse-engineering ▶️ Fuzzers cannot see backdoors Our @ICSEconf preprint on finding backdoors with fuzzing is at binsec.github.io/nutshells/icse… A thread ⬇️

BinsecTool's tweet image. How to detect backdoors efficiently?

▶️ Backdoors were found in firmware & open-source code
▶️ Detection requires much manual reverse-engineering 
▶️ Fuzzers cannot see backdoors

Our @ICSEconf preprint on finding backdoors with fuzzing is at binsec.github.io/nutshells/icse…

A thread ⬇️


Welcome Andy! Looking foward to doing fun research with you! 🥳

We are happy to welcome Andy Zalcman as a new PhD student in the team! He will be working with @michaelmarcozzi on better fuzzing guidance. Details: binsec.github.io/people/zalcman…

BinsecTool's tweet image. We are happy to welcome Andy Zalcman as a new PhD student in the team!

He will be working with @michaelmarcozzi on better fuzzing guidance.

Details: binsec.github.io/people/zalcman…


Michaël Marcozzi 🇪🇺🇧🇪 reposted

🥳📰Very happy and proud that our paper (my first!) in fuzzing-based backdoor detection was accepted at @ICSEconf! More details to follow soon 🙂 in the meantime, congratulations and thank you to @michaelmarcozzi, Stefano Zacchiroli and Emilien Decoux!

plumtrie's tweet image. 🥳📰Very happy and proud that our paper (my first!) in fuzzing-based backdoor detection was accepted at @ICSEconf!
 
More details to follow soon 🙂 in the meantime, congratulations and  thank you to @michaelmarcozzi, Stefano Zacchiroli and Emilien Decoux!

Loading...

Something went wrong.


Something went wrong.