Raelize (@raelizecom) 's Twitter Profile
Raelize

@raelizecom

Top-notch device security expertise at your service.

ID: 1240283307763523584

linkhttps://raelize.com calendar_today18-03-2020 14:26:19

403 Tweet

828 Followers

2 Following

USENIX WOOT Conference on Offensive Technologies (@wootsecurity) 's Twitter Profile Photo

Exciting news! 🤩 18 papers were accepted and will be part of an amazing WOOT program on August 12-13 in Philadelphia! usenix.org/conference/woo… Stay tuned for more details on the program!

POC_Crew 👨‍👩‍👦‍👦 (@poc_crew) 's Twitter Profile Photo

[#POC2024 Training] 👤 Cristofaro Mune & Niek Timmers - The Art of Fault Injection: Advanced Techniques & Attacks 📅 Date: 4th ~ 6th Nov (3days) 🇰🇷 Venue: Four Seasons Hotel, Seoul, South Korea ‼️Registration ends on the "20th Sept"

[#POC2024 Training]

👤 <a href="/pulsoid/">Cristofaro Mune</a> &amp; <a href="/tieknimmers/">Niek Timmers</a>  - The Art of Fault Injection: Advanced Techniques &amp; Attacks

đź“… Date: 4th ~ 6th Nov (3days)
🇰🇷 Venue: Four Seasons Hotel, Seoul, South Korea

‼️Registration ends on the "20th Sept"
Raelize (@raelizecom) 's Twitter Profile Photo

We are looking forward to bring our The Art of Fault Injection experience to Seoul. The students will be breaking Secure Boot with various vulnerabilities using @NewAE's ChipWhipserer Husky!⚡️⚡️⚡️

hardwear.io (@hardwear_io) 's Twitter Profile Photo

🚀 Ready to master Fault Injection attacks? Apply your knowledge of concepts, methodologies, and techniques to develop cutting-edge attacks on various systems. Join Niek Timmers and Cristofaro Mune at #hw_ioNL2024 Training Objective: hardwear.io/netherlands-20… #faultinjection #hardware

🚀  Ready to master Fault Injection attacks? Apply your knowledge of concepts, methodologies, and techniques to develop cutting-edge attacks on various systems.

Join <a href="/tieknimmers/">Niek Timmers</a> and <a href="/pulsoid/">Cristofaro Mune</a> at #hw_ioNL2024

Training Objective: hardwear.io/netherlands-20…

#faultinjection #hardware
USENIX WOOT Conference on Offensive Technologies (@wootsecurity) 's Twitter Profile Photo

The air in Philadelphia is feeling very charged right now, as Jeroen Delvaux talks about using electromagnetic glitches that they used for “Breaking Espressif’s ESP32 V3: Program Counter Control with Computed Values using Fault Injection” #woot24

The air in Philadelphia is feeling very charged right now, as Jeroen Delvaux talks about using electromagnetic glitches that they used for “Breaking Espressif’s ESP32 V3: Program Counter Control with Computed Values using Fault Injection”
#woot24
Joe Rozner (@jrozner) 's Twitter Profile Photo

This paper was the perfect length for my flight home. Such an awesome attack. A little lost in the linear equation section but excited to try replicating it and seeing if it’s possible with voltage instead of EMFI or with much lower cost EMFI tooling

Cristofaro Mune (@pulsoid) 's Twitter Profile Photo

Honored to be a hardwear.io review board member and part of such an outstanding lineup. #hw_io is definitely THE conference for hardware and firmware security. Hope to meet you there! Now back to reviewing submissions ;)

NewAE Technology Inc (@newaetech) 's Twitter Profile Photo

If you are looking for the #ChipWhisperer Husky, there is currently stock on Crowd Supply. The Husky will be back in stock on Mouser Electronics shortly. crowdsupply.com/newae/chipwhis…

Raelize (@raelizecom) 's Twitter Profile Photo

We are grateful to give a keynote at #H2HC2024. We will give the audience an insightful peek into the wonderful world of Fault Injection!

ringzerø.training && @ringzer0@infosec.exchange (@_ringzer0) 's Twitter Profile Photo

Join Niek Timmers for his advanced course, The Art of Fault Injection: Advanced Techniques and attacks. Come to BOOTSTRAP25 in Austin, TX, March 2025 and get complimentary access to our BOOTSTRAP25 event! ringzer0.training/bootstrap25-th…

Cristofaro Mune (@pulsoid) 's Twitter Profile Photo

It's been a great honor for me to give a keynote at H2HC Big thanks to all the staff for such an awesome experience! The heartwarming welcome, the great atmosphere, the amazing talks, the wonderful chats all along the conference. Thank you. It's been one of a kind. 🙏

Raelize (@raelizecom) 's Twitter Profile Photo

The slides for the keynote our Cristofaro Mune(Cristofaro Mune) has given at H2HC "False Injections: Tales of Physics, Misconceptions and Weird Machines" are now available here: raelize.com/upload/researc… Enjoy!

Matthias Kesenheimer (@bartimaeusvuruk) 's Twitter Profile Photo

The new multiplexing method of the #PicoGlitcher to do #VoltageGlitching is finally working! Can't wait to try it out on a real target. fault-injection-library.readthedocs.io/en/latest/mult…

The new multiplexing method of the #PicoGlitcher to do #VoltageGlitching is finally working! Can't wait to try it out on a real target.

fault-injection-library.readthedocs.io/en/latest/mult…
Cyber Saiyan | RomHack Conference, Training, Camp (@cybersaiyanit) 's Twitter Profile Photo

What if... You could force a system to make a mistake—on purpose? That's the essence of #faultinjection—and it's changing the game in #hardwaresecurity. 🛠 Ready to explore the dark art of hardware #exploitation? romhack.io/training/2025/… #RomHack2025 #CyberSecurity

What if... You could force a system to make a mistake—on purpose?
That's the essence of #faultinjection—and it's changing the game in #hardwaresecurity.

đź›  Ready to explore the dark art of hardware #exploitation?
romhack.io/training/2025/…

#RomHack2025 #CyberSecurity
Raelize (@raelizecom) 's Twitter Profile Photo

Our Cristofaro Mune will be keynoting at the 11th Language-theoretic IEEE Security & Privacy workshop (LangSec). We are honored to contribute with our research on #faultinjection. We will keep exploring the fine line between #hardware and #software and its #security implications.

Raelize (@raelizecom) 's Twitter Profile Photo

At hardwear.io , we will be sharing how we achieved maximum privileges on the Google WiFi Pro! By combining #faultinjection, software exploits and knowledge of TEEs, we managed to execute arbitrary code in the Secure Monitor (EL3). See you at #hw_ioUSA2025 !