Vitaly Chipounov (@vitalychh) 's Twitter Profile
Vitaly Chipounov

@vitalychh

Chief Architect at Cyberhaven, S2E lead developer

ID: 927912784146436103

linkhttp://s2e.systems calendar_today07-11-2017 14:57:02

72 Tweet

241 Followers

131 Following

Cyberhaven (@cyberhaveninc) 's Twitter Profile Photo

"38% of organizations have an insider threat program. Another 28% plan on adding one in the next 6-12 months". Check out this blog for a quick guide as you formalize your #insiderthreat program. bit.ly/3eOYpsw #dataprotection

Cyberhaven (@cyberhaveninc) 's Twitter Profile Photo

[Wednesday Webinar] 50% of manufacturing executives lack confidence in their #dataprotection. Join Arun DeSouza #CISO of Nexteer Automotive as he shares his insights on Top 3 Security Challenges to Manufacturing #insiderthreats ---> bit.ly/3eHKMLt

[Wednesday Webinar] 50% of manufacturing executives lack confidence in their #dataprotection. Join 
<a href="/arun_desouza/">Arun DeSouza</a> #CISO of Nexteer Automotive as he shares his insights on  Top 3 Security Challenges to Manufacturing
#insiderthreats ---&gt; bit.ly/3eHKMLt
Vitaly Chipounov (@vitalychh) 's Twitter Profile Photo

S2E now supports Ubuntu 20.04 LTS and LLVM 10. We also added Windows 10 1909 guest and upgraded WinXP and 7 images with all the latest patches. s2e.systems/releases/

Cristian Zamfir (@cristi_zamf) 's Twitter Profile Photo

Copies of sensitive data are more spread than expected, so protecting just the data silo where the data originates from is not enough

darell tan (@zxcvgm) 's Twitter Profile Photo

I wrestled with IDA Pro, trying to run an IDAPython analysis script across a filesystem of binaries. Was it a script error? Or the command-line arguments? Old IDAPython code? I wrote a simple walkthrough, which hopefully helps: irq5.io/2020/05/25/bat…

Vitaly Chipounov (@vitalychh) 's Twitter Profile Photo

I built a tool that generates animated maps from GPS traces so that I can overlay them on the videos of my bicycle trips. github.com/vitalych/gpsmap

I built a tool that generates animated maps from GPS traces so that I can overlay them on the videos of my bicycle trips.
github.com/vitalych/gpsmap
Carmela Troncoso (@carmelatroncoso) 's Twitter Profile Photo

Yesterday, I had a business lunch. The restaurant asked me to input my data on SocialPass, an app now mandatory in Canton Vaud for restaurants gastrovaud.ch/coordonnees-de… I get the need for tracking, not the creation of abusive surveillance infrastrutures ignoring data protection👇

Yesterday, I had a business lunch. The restaurant asked me to input my data on SocialPass, an app now mandatory in Canton Vaud for restaurants gastrovaud.ch/coordonnees-de…
I get the need for tracking, not the  creation of abusive surveillance infrastrutures ignoring data protection👇
Vitaly Chipounov (@vitalychh) 's Twitter Profile Photo

Briefly looked at the #socialpass app used in Switzerland for #covid tracing in bars and restaurants. Looks like it also uploads the phone's IMEI. Would have been nice if the T&C were disclosing this. gastro-covid.azurewebsites.net/api/socialpass…

Aurélien Francillon (@aurelsec) 's Twitter Profile Photo

Our new paper (to appear at NDSS 21) with Sebastian Poeplau SymQEMU: Compilation-based symbolic execution for binaries Like for SymCC we directly embed the instrumentation for symbolic execution in the app, but this time in QEMU, so works with binaries PDF: s3.eurecom.fr/docs/ndss21_sy…

Our new paper (to appear at NDSS 21) with <a href="/poeplau/">Sebastian Poeplau</a>

SymQEMU: Compilation-based symbolic execution for binaries

Like for SymCC we directly embed the instrumentation for symbolic execution in the app, but this time in QEMU, so works with binaries 
PDF: s3.eurecom.fr/docs/ndss21_sy…
Vitaly Chipounov (@vitalychh) 's Twitter Profile Photo

S2E has now a control flow integrity checking plugin. You can use it to detect malicious Microsoft Office documents. s2e.systems/docs/Tutorials…

Zhongjie Wang (@zhongjie_wang_x) 's Twitter Profile Photo

Thrilled to announce that our paper "Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison" got accepted at ACM CCS 2025 #ccs2021 #ccs21. Many thanks to all co-authors and also the reviewers for their feedback! Full paper: bit.ly/3tIw7YB

Thrilled to announce that our paper "Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison" got accepted at 
<a href="/acm_ccs/">ACM CCS 2025</a> #ccs2021 #ccs21. Many thanks to all co-authors and also the reviewers for their feedback! 
Full paper: bit.ly/3tIw7YB
Cyberhaven (@cyberhaveninc) 's Twitter Profile Photo

Thrilled to announce our $33M Series B fundraise and welcome Satish Dharmaraj and @redpointvc, William Lin and Forgepoint Capital, and Jake Flomenberg and Wing VC as new Cyberhaven investors! cyberhaven.com/celebrating-cy…

Solal Pirelli (@solalpirelli) 's Twitter Profile Photo

Last week I presented "Automated Verification of Network Function Binaries" at NSDI. The key takeaway: abstracting data structures as maps enables practical automated reasoning for network functions, as tools now only have to deal with maps & their invariants. Thread 🧵 1/7

kleesymex (@kleesymex) 's Twitter Profile Photo

"The S2E Platform: A Journey from a Research Prototype to a Commercial Product" -- delighted to announce the fourth and final keynote at the upcoming KLEE workshop, from Vitaly Chipounov of Cyberhaven. srg.doc.ic.ac.uk/klee22/keynote…

kleesymex (@kleesymex) 's Twitter Profile Photo

Vitaly Chipounov Vitaly Chipounov giving an industry keynote at the kleesymex workshop about the journey of S2E from a research prototype to a commercial product.

Vitaly Chipounov <a href="/vitalychh/">Vitaly Chipounov</a> giving an industry keynote at the <a href="/kleesymex/">kleesymex</a> workshop about the journey of S2E from a research prototype to a commercial product.
Alex Ionescu (@aionescu) 's Twitter Profile Photo

Having spent 10 years architecting, building & running the engineering team for the world’s leading endpoint security product, it was refreshing to be able to put some thoughts down on paper with the Cyberhaven team, especially with the tens of “agents” on corporate machines.