alvise (@hbitmasks) 's Twitter Profile
alvise

@hbitmasks

PhD Student @vu5ec (Systems Security). Previously: decompilers @_revng, rockets @skyward_er

ID: 1037869000410189824

calendar_today07-09-2018 01:03:47

51 Tweet

185 Followers

251 Following

JinBlack (Mario Polino) (@jinblackx) 's Twitter Profile Photo

I am at ACM CCS 2025 , where alvise is about to present "Canflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks". Thanks to all coauthors: alvise, Stefano Longari, Michele Carminati, Stefano Zanero Full paper: dl.acm.org/doi/pdf/10.114…

I am at <a href="/acm_ccs/">ACM CCS 2025</a> , where <a href="/HBitmasks/">alvise</a> is about to present "Canflict: Exploiting Peripheral Conflicts for Data-Link Layer Attacks on Automotive Networks".

Thanks to all coauthors: <a href="/HBitmasks/">alvise</a>, <a href="/aScarecrowHat/">Stefano Longari</a>, <a href="/mcarminati1988/">Michele Carminati</a>, <a href="/raistolo/">Stefano Zanero</a> 
Full paper: dl.acm.org/doi/pdf/10.114…
VUSec (@vu5ec) 's Twitter Profile Photo

Disclosing CHOP, aka how attackers can bypass commodity return address protections such as stack cookies by hijacking the exception handling process. Paper to appear NDSS Symposium: download.vusec.net/papers/chop_nd…. Joint work by Duta Victor Fabian Freyer Fabio Pagani nSinus-R (@[email protected]) Cristiano Giuffrida

NDSS Symposium (@ndsssymposium) 's Twitter Profile Photo

Should we lose hope already on Rowhammer attacks? Andrea Di Dio from Vrije Universiteit Amsterdam is showing us at #NDSS23 that it is feasible to devise a software-based design to mitigate ECC-aware Rowhammer attacks.

Should we lose hope already on Rowhammer attacks? Andrea Di Dio from Vrije Universiteit Amsterdam is showing us at #NDSS23 that it is feasible to devise a software-based design to mitigate ECC-aware Rowhammer attacks.
Djordje Todorovic (@djtodoro) 's Twitter Profile Photo

Debug Location coverage for the variables in the optimized binaries compiled with the newest release of LLVM look nice. A bit longer post is at djolertrk.github.io/2023/05/14/Deb…. We started from 45%, and now we are at 71%, nice! llvm.org

Debug Location coverage for the variables in the optimized binaries compiled with the newest release of LLVM look nice. A bit longer post is at djolertrk.github.io/2023/05/14/Deb…. We started from 45%, and now we are at 71%, nice! <a href="/llvmorg/">llvm.org</a>
Stefano Zanero (@raistolo) 's Twitter Profile Photo

I am extremely happy about this paper, which is the brainchild of my PhD student Law and my colleague JinBlack (Mario Polino). BINO addresses the irksome problem of identifying inlined functions (specifically from C++ template classes) in binaries. authors.elsevier.com/c/1hD5Kc43v0Znn

Emanuele Vannacci (@vanema94) 's Twitter Profile Photo

I'm thrilled to announce that our paper "Speculation@Fault" USENIX Security is online! Read about how we automatically find information leakages arising from CPU exceptions by fuzzing against speculative contracts.

VUSec (@vu5ec) 's Twitter Profile Photo

Disclosing #SLAM, aka how to combine Spectre and Intel LAM (& co.) to leak kernel memory on future CPUs (demo below). Thousands of exploitable "unmasked" (or pointer chasing) gadgets in the Linux kernel. Joint work by Mathé Hertogh Sander Wiebing Cristiano Giuffrida: vusec.net/projects/slam

alvise (@hbitmasks) 's Twitter Profile Photo

If you ever happen to look for Spectre gadgets manually and feel pain and loneliness, you should check github.com/vusec/inspectr… ... It's been a wild ride, but working with Sander Wiebing was the best thing ever :) Also, BHI is back baby

rev.ng (@_revng) 's Twitter Profile Photo

😎 We’re going to REcon 2024! 😎 This will be the first talk in which we introduce the decompiler since the open source release. It will be very much an hands on talk. Don’t miss it. See you in June in Montreal! ⚜️🌹☘️ cfp.recon.cx/recon2024/talk…

Erik van der Kouwe (@ekouwe) 's Twitter Profile Photo

Just a few days left to apply to our PhD and PostDoc positions available at VUSec. If you love low-level systems hacking and would you like to work at a top systems security research group in Amsterdam, consider applying: workingat.vu.nl/vacancies/phd-…

alvise (@hbitmasks) 's Twitter Profile Photo

The Spectre exploit chef Sander Wiebing just gave an impeccable talk at USENIX Security about our work on Spectre gadgets analysis and native BHI exploitation. Very happy - and proud of the Distinguished Paper award too :)