Virtualization Based Security – Part 1: The boot process
This blog post is the first part of a collection of articles covering Virtualization Based Security and Device Guard features.
An introduction of Use-After-Free detection in binary code by static analysis
Use-After-Free is a well-known class of vulnerabilities that is commonly used by modern exploits. In the research project […]
A recap of 32C3
AMOSSYS attended the 32nd edition of the Chaos Communication Congress (CCC), which took place from December 27th to 30th in Hambourg. […]
Tutorial: How to reverse unknown protocols using Netzob
This article presents the main features of Netzob on how to reverse engineer unknown protocols. It goes through learning the message formats of a simple protocol as well as […]
Automated Reverse Engineering of Cryptographic Algorithms
In this article we present a practical case of automated reverse engineering of cryptographic algorithms.
Design and usage of OpenDTeX DRTM Secure Boot
In this article we present the OpenDTeX research project which leverages trusted computing technologies to ensure strong security properties either at boot time or at OS runtime.
A tale of 31C3 – Part 1
The Chaos Communication Congress (CCC) is an enormous conference taking place each year from December 27th to 30th in Hambourg. This year was the 31st congress
A tale of 31C3 – Part 2
This is the second part of a serie of two articles about the 31C3 conference. This part summers up talks about bugs’ mining, code pointer integrity, ICS pwning, or Perl / SS7 / XRayScanner vulnerabilities.