My keynote at RE//Verse went great!
(it will be released online later if you missed it!)
My keynote at RE//Verse went great!
(it will be released online later if you missed it!)
Dr. Gladys West, the pioneering mathematician whose work laid the foundation for modern GPS technology, has died. She was 95.
Today's cool visualization of the day is brought to you by arxiv.org/pdf/2512.14045
The world needs more Sankey diagrams.
For types etc to see what the decompiler had for those, that does require not just dwarf eval.
An undefined function that would have referenced an undefined global struct canβt be evaluated.
I think itβs fair to say some structures especially those unidentified in stripped binary by decomp, and whole functions left as undefined data canβt be mapped or meaningless to map in those cases. I think for a majority of the technique you would be able to still do that eval, and you can use xref
Iβm not sure I follow, stripping a binary would leave you with a debug binary and a new stripped binary, and you can tie debug symbols to new one, alternatively using the external debug symbols does the same thing?
This DecompileBench paper is pretty slick, especially how they test for semantic equivalence: arxiv.org/pdf/2505.11340
Unfortunately, there's a pretty big limitation that isn't addressed anywhere that I can see. Can you tell what it is?
Episode 23: War Stories with Brendan Dolan-Gavitt (XBOW)!
@tib3rius.bsky.social & @swiftsecur.bsky.social are joined by @moyix.net who shares some AI and human war stories with us!
Links below!
ποΈ #ASE2025 Keynote Speaker Series (2 of 3)
Dr. Cristina Cifuentes, Vice President @ Oracle Software Assurance
βOracle Parfait β Detecting Application Vulnerabilities at Scale β Past, Present and Futureβ
ποΈ ASE 2025 Keynote Speaker Series (3 of 3)
Prof. Taesoo Kim (Georgia Tech)
βHyperscale Bug Finding and Fixing: DARPA AIxCCβ
conf.researchr.org/track/ase-20...
ποΈ #ASE2025 Keynote Speaker Series (1 of 3)
What do symbolic model checking, path profiling, and quantum simulation have in common? π€
Find out from Prof. Reps (University of Wisconsin-Madison) in his ASE2025 Keynote βWe Will Publish No Algorithm Before Its Timeβ!
conf.researchr.org/track/ase-20...
You've seen the trends in AIxCC: LLMs can hack source, find vulns, and patch them. But what about on binaries without source? Do decompilers close the gap, or is there more to grow?
Come see my talk at DistrctCon where I merge and dissect these two fields: AI Hacking + Decomp.
Must-read for fuzzing folks (read: tooling/algorithms/academia) by Addison Crump
addisoncrump.info/research/wha...
We at @emproofsecurity.bsky.social open-sourced a free firmware reverse engineering workshop for self-study.
Topics: ELF analysis, cracking, malware triage, embedded-Linux, bare-metal, crypto-key extraction, anti-analysis. Docker setup and solutions included.
github.com/emproof-com/...
Screenshot of the blog post intro: Permissive vs Copyleft Open Source Published on Jul 9, 2025. The premise of copyleft licenses is attractive: Create more open source! With permissive licenses, someone can take the code and make proprietary modifications to it and sell it to other people without releasing the modifications. We want people to publish their improvements, right? With copyleft, we can force people to publish their improvements to copyleft code. Businesses will want to use our code because creating it was so much work in the first place. We need copyleft if we want more contributors, more open source, more code re-use, more freedom. Right? Wrong. In this post, I break down all the ways copyleft licenses fail to achieve their stated goals, and explain why permissive licenses succeed where copyleft fails.
I wrote a comprehensive post dispelling many incorrect assumptions about Copyleft vs Permissive open source licenses.
If you author/contribute to open source code, it's worth reading and understanding these nuances!
shazow.net/posts/permis...
New blog post on implementing patchelf-like functionalities using LIEF's Rust bindings:
lief.re/blog/2025-07...
Cool blog of how @aendra.com built @xblock.aendra.dev her automoderation tuned screenshot classifier AI model and pipeline, including all the manual work behind it.
www.aendra.com/xblock-summe...
It was great to see the community come together again at our 4th #FUZZING workshop in Trondheim this year! We drew a big crowd. Enjoyed the super lively discussions.
Thanks to the organizers:
* @rohan.padhye.org
* @yannicnoller.bsky.social
* @ruijiemeng.bsky.social and
* LΓ‘szlΓ³ Szekeres (Google)
π¨ Our amazing #FUZZING'25 keynotes are online!
"Constraining Fuzzing without Paying Too Much" by Miryung Kim
youtu.be/L90MBb6NLBE
"Are you sure you belong in academia?" by Will Wilson
youtu.be/qQGuQ_4V6WI
// @mboehme.bsky.social, LΓ‘szlΓ³ Szekeres, @rohan.padhye.org, @ruijiemeng.bsky.social
HF space for the Nova neural decompiler: huggingface.co/spaces/ejsch...
A small slide deck for a 15 minute impulse talk at Cycon 2025 in Talinn: docs.google.com/presentation...
[Blog Post] New high-level API in LIEF that allows the
creation of DWARF files. Additionally, I present two plugins designed to export
program information from Ghidra and BinaryNinja into a DWARF file.
lief.re/blog/2025-05...
(Bonus: DWARF file detailing my reverse engineering work on DroidGuard)
All papers should publish their code. Help realize this by becoming an artifact reviewer at NDSS'26, apply here: docs.google.com/forms/d/e/1F...
You'll review artifacts of accepted papers. We especially encourage junior/senior PhD students & PostDocs to help. Distinguished reviews will get awards!
Excited to see my LLM CLI tool used by Sean Heelan to help identify a remote zeroday vulnerability in the Linux kernel!
simonwillison.net/2025/May/24/...
Artisinal software
There is LLM free licenses though I think
We're are happy to announce a new release of our #Rust bindings for idalib.
What's new:
- New APIs for working with IDBs, segments, and more
- Rust 2024 support
- New homepage: idalib.rs
H/T to our contributors @yeggor.bsky.social & @raptor.infosec.exchange.ap.brid.gy
github.com/binarly-io/i...
this is still the Best Post about symbolic execution. it uses some cursed python to make a tiny but illustrative symbolic execution engine
kqueue.org/blog/2015/05...