Dimitri Kokkonis (@plumtrie) 's Twitter Profile
Dimitri Kokkonis

@plumtrie

PhD student in cybersecurity. Also on mastodon: @[email protected]

ID: 1644250181217538048

linkhttps://kokkonisd.github.io/ calendar_today07-04-2023 08:06:18

16 Tweet

47 Followers

51 Following

Dimitri Kokkonis (@plumtrie) 's Twitter Profile Photo

🥳📰Very happy and proud that our paper (my first!) in fuzzing-based backdoor detection was accepted at ICSE! More details to follow soon 🙂 in the meantime, congratulations and thank you to Michaël Marcozzi 🇪🇺🇧🇪, Stefano Zacchiroli and Emilien Decoux!

🥳📰Very happy and proud that our paper (my first!) in fuzzing-based backdoor detection was accepted at <a href="/ICSEconf/">ICSE</a>!
 
More details to follow soon 🙂 in the meantime, congratulations and  thank you to <a href="/michaelmarcozzi/">Michaël Marcozzi 🇪🇺🇧🇪</a>, Stefano Zacchiroli and Emilien Decoux!
Michaël Marcozzi 🇪🇺🇧🇪 (@michaelmarcozzi) 's Twitter Profile Photo

Happy to read such enthusiastic reactions to our ICSE paper! ☺️ "ROSA Sets a New Standard for Backdoor Detection." "If you work in cybersecurity, penetration testing, or software auditing, ROSA is a must-try in the fight against hidden threats." medium.com/@itsissachar/r…

Michaël Marcozzi 🇪🇺🇧🇪 (@michaelmarcozzi) 's Twitter Profile Photo

🏆 Our ROSA tool for backdoor detection has won a best artifact award at ICSE! Try it out: github.com/binsec/rosa Huge thanks and congrats to my student Dimitri Kokkonis for his huge and great work! 👏👏👏

🏆 Our ROSA tool for backdoor detection has won a best artifact award at <a href="/ICSEconf/">ICSE</a>! 

Try it out: github.com/binsec/rosa

Huge thanks and congrats to my student <a href="/plumtrie/">Dimitri Kokkonis</a> for his huge and great work! 👏👏👏
Michaël Marcozzi 🇪🇺🇧🇪 (@michaelmarcozzi) 's Twitter Profile Photo

📢 I am looking for a postdoc on fuzzing, to prevent backdoors and supply-chain attacks! Come and join the team here in Paris (or spread the word)! 🙂 Details and application: secubic-ptcc.github.io/jobs/open/2025…

📢 I am looking for a postdoc on fuzzing, to prevent backdoors and supply-chain attacks!

Come and join the team here in Paris (or spread the word)! 🙂

Details and application: secubic-ptcc.github.io/jobs/open/2025…
Jason Turner (@lefticus) 's Twitter Profile Photo

git commit -m "attempt to fix CI" ... git commit -m "attempt to fix CI" ... git commit -m "attempt to fix CI" ... git commit -m "attempt to fix CI" ... git commit -m "attempt to fix CI"

Sébastien Bardin (@seb_bardin) 's Twitter Profile Photo

Too many bugs in the queue, not enough time to fix them all? Happy to share that our work on automated bug priorization has been accepted at USENIX Security 2025 -- joint work with Guilhem Lacombe binsec.github.io/nutshells/usen…

Too many bugs in the queue, not enough time to fix them all?  Happy to share that our work on automated bug priorization has been accepted at <a href="/USENIXSecurity/">USENIX Security</a>  2025 -- joint work with Guilhem Lacombe   binsec.github.io/nutshells/usen…
Jonathan Aldrich (@jaldrichpl) 's Twitter Profile Photo

11am today at #ICSE2025: Rust provides memory safety to low-level code, but in practice Rust libraries link to unsafe C. Ian McCormack, Joshua Sunshine, and I used dynamic analysis to find 46 cases where the C code broke Rust's memory rules, causing undefined behavior.

BINSEC Team @ Université Paris-Saclay, CEA, List (@binsectool) 's Twitter Profile Photo

How to detect backdoors efficiently? 🗣️ The slides of our #icse2025 presentation on "Finding Backdoors with Fuzzing" are now available at ⬇️ binsec.github.io/assets/publica…

How to detect backdoors efficiently?

🗣️ The slides of our #icse2025 presentation on "Finding Backdoors with Fuzzing" are now available at

⬇️ binsec.github.io/assets/publica…
Michaël Marcozzi 🇪🇺🇧🇪 (@michaelmarcozzi) 's Twitter Profile Photo

Check out our ROSARUM benchmark, part of our #icse2025 paper on backdoors and fuzzing: ▶️ It is a fuzzing benchmark (can fuzzers trigger backdoors reliably and fast?) ▶️ It is a backdoor detection benchmark (can code analyses find backdoors reliably?) ⬇️ github.com/binsec/rosarum

Michaël Marcozzi 🇪🇺🇧🇪 (@michaelmarcozzi) 's Twitter Profile Photo

Happy to have presented our SECUBIC project to the French research community in system security (RESSI'25)! 🏠 secubic-ptcc.github.io 🧑‍🔬 Sébastien Bardin Jean-Yves Marion Stefano Zacchiroli Thanks to the RESSI organizers who had even provided a pool to finish my #OOPSLA reviews! 😇

Happy to have presented our SECUBIC project to the French research community in system security (RESSI'25)!

🏠 secubic-ptcc.github.io
🧑‍🔬 <a href="/Seb_Bardin/">Sébastien Bardin</a> <a href="/Jean_YvesMarion/">Jean-Yves Marion</a> Stefano Zacchiroli

Thanks to the RESSI organizers who had even provided a pool to finish my #OOPSLA reviews! 😇
Sébastien Bardin (@seb_bardin) 's Twitter Profile Photo

Back from PLDI 2025, where Frédéric Recoules and I had the pleasure to give a tutorial on BINSEC and binary-level symbolic execution. Here it is, playable in your browser: binsec.github.io/tutorial-pldi2…

Back from <a href="/PLDI/">PLDI</a> 2025,  where Frédéric Recoules and I had the pleasure to give a tutorial on  BINSEC and binary-level symbolic execution.  Here it is, playable in your browser: binsec.github.io/tutorial-pldi2…