BINSEC Team @ Université Paris-Saclay, CEA, List (@binsectool) 's Twitter Profile
BINSEC Team @ Université Paris-Saclay, CEA, List

@binsectool

Binary code analysis for security / Academic research (Infosec, SE, FM, AI) / Open-source tool / Applied in industry / Posts by @michaelmarcozzi and @Seb_Bardin

ID: 1308475666506149888

linkhttps://binsec.github.io calendar_today22-09-2020 18:38:20

632 Tweet

908 Followers

359 Following

Michaël Marcozzi 🇪🇺🇧🇪 (@michaelmarcozzi) 's Twitter Profile Photo

Happy to read such enthusiastic reactions to our ICSE paper! ☺️ "ROSA Sets a New Standard for Backdoor Detection." "If you work in cybersecurity, penetration testing, or software auditing, ROSA is a must-try in the fight against hidden threats." medium.com/@itsissachar/r…

Dimitri Kokkonis (@plumtrie) 's Twitter Profile Photo

We (myself, Michaël Marcozzi 🇪🇺🇧🇪, Stefano Zacchiroli, Emilien Decoux) release the ROSA toolchain, enabling fuzzing-based backdoor detection 🎉 Tool: github.com/binsec/rosa Benchmark: github.com/binsec/rosarum This work received both Available & Reusable badges at ICSE 🥳

Michaël Marcozzi 🇪🇺🇧🇪 (@michaelmarcozzi) 's Twitter Profile Photo

🏆 Our ROSA tool for backdoor detection has won a best artifact award at ICSE! Try it out: github.com/binsec/rosa Huge thanks and congrats to my student Dimitri Kokkonis for his huge and great work! 👏👏👏

🏆 Our ROSA tool for backdoor detection has won a best artifact award at <a href="/ICSEconf/">ICSE</a>! 

Try it out: github.com/binsec/rosa

Huge thanks and congrats to my student <a href="/plumtrie/">Dimitri Kokkonis</a> for his huge and great work! 👏👏👏
Michaël Marcozzi 🇪🇺🇧🇪 (@michaelmarcozzi) 's Twitter Profile Photo

📢 I am looking for a postdoc on fuzzing, to prevent backdoors and supply-chain attacks! Come and join the team here in Paris (or spread the word)! 🙂 Details and application: secubic-ptcc.github.io/jobs/open/2025…

📢 I am looking for a postdoc on fuzzing, to prevent backdoors and supply-chain attacks!

Come and join the team here in Paris (or spread the word)! 🙂

Details and application: secubic-ptcc.github.io/jobs/open/2025…
BINSEC Team @ Université Paris-Saclay, CEA, List (@binsectool) 's Twitter Profile Photo

JOB OFFER! - Liked our work on finding backdoors with fuzzing? Then, join the team as a postdoc and help us fight binary supply-chain attacks! We offer a stimulating and open-minded scientific environment in English, in wonderful Paris! APPLY AT secubic-ptcc.github.io/jobs/open/2025…

JOB OFFER! - Liked our work on finding backdoors with fuzzing? Then, join the team as a postdoc and help us fight binary supply-chain attacks!

We offer a stimulating and open-minded scientific environment in English, in wonderful Paris!

APPLY AT secubic-ptcc.github.io/jobs/open/2025…
Sébastien Bardin (@seb_bardin) 's Twitter Profile Photo

Too many bugs in the queue, not enough time to fix them all? Happy to share that our work on automated bug priorization has been accepted at USENIX Security 2025 -- joint work with Guilhem Lacombe binsec.github.io/nutshells/usen…

Too many bugs in the queue, not enough time to fix them all?  Happy to share that our work on automated bug priorization has been accepted at <a href="/USENIXSecurity/">USENIX Security</a>  2025 -- joint work with Guilhem Lacombe   binsec.github.io/nutshells/usen…
BINSEC Team @ Université Paris-Saclay, CEA, List (@binsectool) 's Twitter Profile Photo

How to detect backdoors efficiently? 🗣️ The slides of our #icse2025 presentation on "Finding Backdoors with Fuzzing" are now available at ⬇️ binsec.github.io/assets/publica…

How to detect backdoors efficiently?

🗣️ The slides of our #icse2025 presentation on "Finding Backdoors with Fuzzing" are now available at

⬇️ binsec.github.io/assets/publica…
Michaël Marcozzi 🇪🇺🇧🇪 (@michaelmarcozzi) 's Twitter Profile Photo

Check out our ROSARUM benchmark, part of our #icse2025 paper on backdoors and fuzzing: ▶️ It is a fuzzing benchmark (can fuzzers trigger backdoors reliably and fast?) ▶️ It is a backdoor detection benchmark (can code analyses find backdoors reliably?) ⬇️ github.com/binsec/rosarum

Michaël Marcozzi 🇪🇺🇧🇪 (@michaelmarcozzi) 's Twitter Profile Photo

Happy to have presented our SECUBIC project to the French research community in system security (RESSI'25)! 🏠 secubic-ptcc.github.io 🧑‍🔬 Sébastien Bardin Jean-Yves Marion Stefano Zacchiroli Thanks to the RESSI organizers who had even provided a pool to finish my #OOPSLA reviews! 😇

Happy to have presented our SECUBIC project to the French research community in system security (RESSI'25)!

🏠 secubic-ptcc.github.io
🧑‍🔬 <a href="/Seb_Bardin/">Sébastien Bardin</a> <a href="/Jean_YvesMarion/">Jean-Yves Marion</a> Stefano Zacchiroli

Thanks to the RESSI organizers who had even provided a pool to finish my #OOPSLA reviews! 😇
Sébastien Bardin (@seb_bardin) 's Twitter Profile Photo

Back from PLDI 2025, where Frédéric Recoules and I had the pleasure to give a tutorial on BINSEC and binary-level symbolic execution. Here it is, playable in your browser: binsec.github.io/tutorial-pldi2…

Back from <a href="/PLDI/">PLDI</a> 2025,  where Frédéric Recoules and I had the pleasure to give a tutorial on  BINSEC and binary-level symbolic execution.  Here it is, playable in your browser: binsec.github.io/tutorial-pldi2…