danliew.co.uk
Projects
http://danliew.co.uk/projects
Daniel.liew ZZ@imperial.ac.uk (remove the ZZ). Here are a list of projects I have contributed to. A framework for static verification. A static analysis tool for proving race, barrier divergence and assertion failure freedom of OpenCL and CUDA kernels. A domain specific language and compiler for image processing. A small bash script the automates downloading files from a server using ssh and rsync. A symbolic virtual machine built on top of LLVM. A fork of KLEE that supports using SMTLIBv2 solvers.
sean.heelan.io
seanhn – Sean Heelan's Blog
https://sean.heelan.io/author/seanhn
Sean Heelan's Blog. Program analysis, verification and security. Tracking Down Heap Overflows with rr. May 31, 2016. June 1, 2016. Anyone who’s spent time doing vulnerability analysis on C/C has had the experience of floundering around in a debugger for hours on end trying to figure out the source of a mysterious crash. For example, lets say we’re analysing an interpreter, e.g. And the following occurs: an API call triggers a function containing a bug, and a write to buffer. 8217; Taint tracking solution...
blog.trailofbits.com
Close Encounters with Symbolic Execution (Part 2) – Trail of Bits Blog
https://blog.trailofbits.com/2014/12/04/close-encounters-with-symbolic-execution-part-2
Trail of Bits Blog. 4E78 641E 4054 5085 81B6 5712 6BA3 5E19 0B22 E10F. Close Encounters with Symbolic Execution (Part 2). December 4, 2014. This is part two of a two-part blog post that shows how to use KLEE. To symbolically execute Linux binaries (see the first post. As a visual example, we’ll show how to get from an empty maze to a solved maze:. Building KLEE with LLVM 3.2 on Ubuntu 14.04. We will be using the i386 version of Ubuntu 14.04. The 32-bit version of Ubuntu is required to build a 32-bit KLEE...
kqueue.org
A mini symbolic execution engine
http://kqueue.org/blog/2015/05/26/mini-mc
A mini symbolic execution engine. It has been a while since I blogged last time. One change is that I started to have nightmares about me forgetting to prepare for lecture, rather than forgetting to turn in homework as in the past 20(? Years life does get better. This post is about teaching. Last week in grad OS class ( CSE 551. We talked about symbolic execution, using the papers of KLEE. To illustrate the basic idea, I wrote a mini symbolic execution implementation ( 20 lines of Python code), mini-mc.
vzimmer.blogspot.com
Vincent Zimmer's blog: August 2015
http://vzimmer.blogspot.com/2015_08_01_archive.html
This blog has musings on technology, firmware, UEFI, etc. Tuesday, August 18, 2015. SMI Transfer Monitor (STM) Unleashed. I'm happy to announce today that the SMI Transfer Monitor (STM) documentation and code have been released today. This aligns with my Intel Developer Forum (IDF) presentation " STTS003 - Developing Best-in-Class Security Principles with Open Source Firmware. That is now available from http:/ www.intel.com/idfsessionsSF. The information can be found at https:/. We created a companion do...
blog.l4ys.tw
DEFCON CTF QUALS 2016 - amadhj · Lazy Project
http://blog.l4ys.tw/2016/05/defcon-ctf-quals-2016-amadhj
A place for potato chips. DEFCON CTF QUALS 2016 - amadhj. Reverse me and get the flag. Get it here. Amadhj b76a229964d83e06b7978d0237d4d2b0.quals.shallweplayaga.me:4567. ELF64 reverse 題,程式行為很簡單,讀 32 byte 當成四個 QWORD 個別進行一連串運算,. 最後得到的 4 個值 xor 必須等於特定值,乍看之下就是個 z3 題. 但比賽時跟 lucas 將程式重新用 python implement 後. KLEE is a symbolic virtual machine built on top of the LLVM compiler infrastructure, and available under the UIUC open source license. 因此寫了這篇 writeup 來記錄一下 用 KLEE 配合 hexrays 的快速解法! Built May 18 2016 (.
zv.github.io
A new kind of sentience
http://zv.github.io/about.html
I've been having fun using computers since I first read the StarLogo docs in a middleschool typing course. This is the tree you (should be) seeing now! This tree is algorithmically generated without. Any sort of base texture and modeled off of Inconvergent Trees, the outline is generated from a modified L-System and the shading is a stochastic process. You can find both it's source and formal description in the repo. An encoding, decoding and utility library for S-expressions in Rust. A quick-n-dirty too...
vzimmer.blogspot.com
Vincent Zimmer's blog: EFI Byte Code
http://vzimmer.blogspot.com/2015/08/efi-byte-code.html
This blog has musings on technology, firmware, UEFI, etc. Saturday, August 1, 2015. This short post will provide some history around the EFI Byte Code (EBC). There were some interesting questions around this at http:/ www.blacklodgeresearch.org/archive/defending-uefi-tools-lab-july-19th-2015/. BLR would like to thank @. For braving the heat and teaching us about the UEFI security model today. Thank you Vincent! Image with a subsystem type of IMAGE SUBSYSTEM EFI BOOT SERVICE DRIVER and Machine Type of IMA...