Satoshi Tanda (@standa_t) 's Twitter Profile
Satoshi Tanda

@standa_t

Software security engineer and trainer

satoshi-tanda.bsky.social

ID: 1191740564

linkhttps://tandasat.github.io/ calendar_today18-02-2013 01:56:48

1,1K Tweet

7,7K Followers

392 Following

AstraKernel 💫 (@astrakernel) 's Twitter Profile Photo

🌟 Microsoft is Getting Rusty: A Review of Successes and Challenges - a Talk from Rust Nation UK 2025 - Mark Russinovich, CTO, Deputy CISO, and Technical Fellow for Microsoft Azure youtu.be/1VgptLwP588?si…

🌟 Microsoft is Getting Rusty: A Review of Successes and Challenges

- a Talk from Rust Nation UK 2025

- Mark Russinovich, CTO, Deputy CISO, and Technical Fellow for Microsoft Azure

youtu.be/1VgptLwP588?si…
Tavis Ormandy (@taviso) 's Twitter Profile Photo

You can now jailbreak your AMD CPU! 🔥We've just released a full microcode toolchain, with source code and tutorials. bughunters.google.com/blog/542484235…

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

Nice to see Intel and MSFT's posts on VT-rp / HVPT. If you are interested in playing with the feature, simple example code is here: github.com/tandasat/Hello…

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

Intel SDM rev 87 was out. Updates? Good luck with diffing 5000+ pages of PDF files. Intel forgot to update the Documentation Changes file.

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

The new blog post on supervisor shadow stack restrictions / supervisor shadow-stack control tandasat.github.io/blog/2025/04/0…

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

This is like "VT-x 101". The essence of HW-assisted VT, everything needed to virtualize Windows on-the-fly, and a bit of security in 2 days. It misses a ton of fun discussions and exercises that are in my 4 days class, but I am giving back to the community that helped me learn.

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

My talk about the recent SMM architecture and security at TheSAS2025 : youtube.com/watch?v=AIGj6Q… The conference was well organized and had plenty of networking opportunities. Though, the best thing was the venue :) It is at a beautiful resort again this year, so you will love it.

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

It is amazing to see someone taking a class and then making stellar output by extending what they learned in the class. Obviously, Jael Koh dedication was the key, but also, Cedric Halbronn must have done a fabulous job helping his students learn and get started. Very cool.

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

Just wrapped up teaching my hypervisor development class. Always refreshing to work with sharp folks from diverse backgrounds—and rewarding to help them get started. The next class will be in person at Hexacon. Check out the conference page if you're interested.

Just wrapped up teaching my hypervisor development class. Always refreshing to work with sharp folks from diverse backgrounds—and rewarding to help them get started.

The next class will be in person at <a href="/hexacon_fr/">Hexacon</a>. Check out the conference page if you're interested.
MachineHunter (@infpctechstack) 's Twitter Profile Photo

Our talk at #BHUSA Black Hat Briefings has been accepted! This is a presentation on an initiative to make the BIOS usable even after the OS has booted, enabling malbehavior to occur solely within the BIOS, independent of the OS. blackhat.com/us-25/briefing…

Our talk at #BHUSA <a href="/BlackHatEvents/">Black Hat</a> Briefings has been accepted!

This is a presentation on an initiative to make the BIOS usable even after the OS has booted, enabling malbehavior to occur solely within the BIOS, independent of the OS.

blackhat.com/us-25/briefing…
Satoshi Tanda (@standa_t) 's Twitter Profile Photo

Excellent write-up on stealth hooking with hypervisors on the Intel processors. It discusses two different approaches in detail with actual implementations you can play with.

Nikolaj Schlej (@nikolajschlej) 's Twitter Profile Photo

The embargo (12:00 UTC 2025-06-10) is over, let's start a thread on Hydroph0bia (CVE-2025-4275), a trivial SecureBoot and FW updater signature bypass in almost any Insyde H2O-based UEFI firmware used since 2012 and still in use today. English writeup: coderush.me/hydroph0bia-pa…

Satoshi Tanda (@standa_t) 's Twitter Profile Photo

Looks like a cool project. Do not be confused with NOVA Microhypervisor, which is another fabulous project: github.com/udosteinberg/N…