Adam Doupé
@adamdoupe
Followers
5K
Following
4K
Media
341
Statuses
5K
Former DEF CON CTF organizer. Associate Professor @ASU. Web, system, and network security. Loves CTFs. Hacks w/ @shellphish. Hosts @ctfradiooo. Open DMs.
Tempe, AZ
Joined February 2009
In celebration JPEG XL being reconsidered for inclusion in Chrome, I created the first ever JPEG XL image which displays its own MD5 hash! $ md5sum hashquine.jxl c0dec0007b5246f7428936d9bed2f446 This website does not render JPEG XL yet, so see the links below
25
110
1K
I know it's not what you're waiting for. But here's an absolutely fascinating conversation with a nuclear history expert about Harry Truman and a completely new way to look at his role in the dropping of the atomic bombs. https://t.co/IrFvBPOaTP
41
37
836
@pwncollege is doing Advent of Pwn ! Everyone should check it out 🤓 We’re excited to announce that our first-ever Advent of Pwn kicks off on Sunday, November 30, 2025 at 7:00 PM (in 5 days) at https://t.co/3EkwNcjNij!
0
15
67
Here's a live example of the helpfulness of @Flighty 1. Delay and why 2. Takeoff slot direct from ATC 3. Airport delays 4. Late plane delays Literally just enter your flight: https://t.co/N1Fh9U4rds
14
27
488
This seat used to sit kylebot. Goodbye SEFCOM. (Finally, I graduated... on Halloween?)
10
5
163
2
87
395
we won!!! grateful for the opportunity, couldn't have done it without my amazing team mates :D
Over the weekend, our team competed in XCTF Finals in China as the only international team among 28. We placed 3rd place overall and 1st in the professional division. Huge thanks to @XCTF_League for the amazing event and high quality challenges. Hope to be back next year!
0
1
25
My exploit at typhoonpwn is finally released :P
🚨 New advisory was just published! 🚨 A Local Privilege Escalation vulnerability was found in Ubuntu, caused by a refcount imbalance in the af_unix subsystem. This vulnerability was disclosed during our TyphoonPWN 2025 Linux category and won first place: https://t.co/gUMlzI9XNk
2
5
93
Federal research funding feeds the innovation engine in the U.S. across a wide range of disciplines, including my own field of computer networking. @nickmckeown1 and I were proud to write this article for @CACMmag. https://t.co/BWyJk4RuiU
3
9
17
Thrilled that our work on scam experiences among international students has been accepted to IEEE S&P 2026 (Oakland). Led by @DattaPubali and Katie Zhang at UMass Amherst, in collaboration with @ZBerkayCelik. Preprint here - https://t.co/0E6nPxFBkq
1
3
16
Apple SEAR is hiring offensive security researchers! We’re looking for talented researchers across multiple areas of security. Check out the job description here: https://t.co/1oOR0H2gEe If you’re interested in low level systems like RTOS, firmware, coprocessors, embedded
jobs.apple.com
Apply for a Offensive Security - Researcher job at Apple. Read about the role and find out if it’s right for you.
12
56
344
Last chance to (self-) nominate for @USENIXSecurity 2026 AEC! You should expect a low load of ~1 artifact for functionality/reproducibility assessments per cycle (max 3 for the whole year). Please support Open Science and fill the form by Oct 17: https://t.co/GDpbg0J5sL 🚀
docs.google.com
For the seventh year, USENIX Security allows the evaluation of artifacts that support a paper: software, hardware, evaluation data and documentation, raw measurement data, raw survey results,...
0
5
7
Have a Furby 0-day? A Juicero exploit? A bewitched 🪄PoC for some cursed, End-of-Life 👻 product that your friends keep begging you to stop reverse engineering & touch grass? We see you: your real friends are at @DistrictCon Junkyard. 9 days to submit your most unhinged bugs!
2
13
54
2005: The Samy worm, the first self-propagating cross-site scripting worm, was released onto the mega-popular MySpace by 19-year-old Samy Kamkar. It spread like wildfire. He's since made numerous impactful security and privacy field contributions. samy is my hero
4
19
55
1990: Clifford Stoll's book "The Cuckoo's Egg" was turned into an episode of NOVA entitled "The KGB, the Computer, and Me". To avoid spoiling it, let's say it's a story of how he tracked down a hacker who broke into his employer's computer. Watch for free! https://t.co/FZSRWwX6Lt
2
8
25