bliutech Profile Banner
Benson Liu Profile
Benson Liu

@bliutech

Followers
311
Following
8K
Media
12
Statuses
145

security engineer @meta

New York City, NY
Joined November 2021
Don't wanna be here? Send us removal request.
@bliutech
Benson Liu
17 days
Fun addition to the daily routine! ⛳️
@AlpacaHack
AlpacaHack
17 days
1日1問出題する常設CTFを始めます🎄 初心者向けの問題を中心に、 ・月〜金は新規の問題 ・土日は新たに移植したCTFの過去問 を公開していきます! 本日より開催です! https://t.co/VJokcIgkGm
0
0
4
@bliutech
Benson Liu
2 months
HTTP request smuggling strikes again! 👀 https://t.co/MYGroxyHM7
microsoft.com
0
0
1
@terjanq
terjanq
3 months
We published a blogpost about SafeContentFrame - a library for rendering untrusted content inside an iframe. The library is a big party of what I've been up to in the few last years! Check out the blog and take a slice of my birthday cake 🎂! https://t.co/9gGEqUuwIX
6
52
195
@garethheyes
Gareth Heyes \u2028
4 months
I discovered how to use CSS to steal attribute data without selectors and stylesheet imports! This means you can now exploit CSS injection via style attributes! Learn how below: https://t.co/Tje8Ce8if0
13
86
362
@bliutech
Benson Liu
4 months
@pbrucla Photos: 1. 🚗 Me trying one of the labs at the Car Hacking Village at my first DEFCON in 2023! 2. ⛳️ @pbrucla's Fall 2023 General Meeting where we shared a lot of exciting stories from DEFCON (some attendees of that meeting are now regulars to Hacker Summer Camp)!
0
0
1
@bliutech
Benson Liu
4 months
I will be attending DEFCON this upcoming weekend (tagging along with some folks from @pbrucla). 👾 It's amazing to look back at all of the memories. ❤️ Looking forward to making some more this year! 🥳 If you are attending, feel free to reach out to chat! ⛳️
1
0
11
@ryanlpeterman
Ryan Peterman
5 months
Carey Nachenberg was a Chief Scientist at a GoogleX moonshot, a Fellow (senior most eng at Symantec) and a professor at UCLA. I interviewed him about his career story and we discussed: • Story behind his growth to IC10 (VP equivalent) • How high-level IC recruiting works •
1
2
13
@bliutech
Benson Liu
5 months
If you are interested in checking out MBASED some more (along with the accompanying IEEE paper), feel free to check out our project repository. 🚀 https://t.co/3LLPNfs1z7 🧵(n/n)
Tweet card summary image
github.com
MIT IEEE URTC 2024. GSET 2024. Repository for the "MBASED: Practical Simplifications of Mixed Boolean-Arithmetic Obfuscation". A Binary Ninja decompiler plugin taking ideas from c...
0
1
10
@bliutech
Benson Liu
5 months
To accelerate deobfuscation, we used SMT solvers like Z3 and sympy to minimize the extracted expressions from BNIL. We had to write visitors to translate our boolean expression intermediate representation into a form that these tools could use. 🧵(3/n)
1
1
5
@bliutech
Benson Liu
5 months
We leveraged ideas from compiler construction to simplify MBA expressions over parse trees. 🌲 Students built an LL(1) parser and AST from scratch and then wrote simplification passes similar to how you would write compiler passes! 💻 🧵(2/n)
1
1
3
@bliutech
Benson Liu
5 months
This has been getting some activity on my GitHub recently so thought I would cross post here. 👀✨Last year I worked on a cool project with some students tackling mixed-boolean arithmetic (MBA) deobfuscation and built a plugin for Binary Ninja (@vector35)! 🐛🥷 🧵(1/n)
2
13
65
@bliutech
Benson Liu
5 months
I recently talked to some students about scaling vulnerability discovery (particularly in the context of developing program analysis tools). 🐛🚀 The following diagram is how I decided to break down the process. 🖌️ What did I get right/miss? 👀
0
0
3
@bliutech
Benson Liu
5 months
Day 2 was equally fun! 👀 All of the novelty challenges were really interesting and blew my mind. 🤯 Wish we had more time to play around with them, it was a blast! ❤️
@bliutech
Benson Liu
5 months
Had a lot of fun at the first day of DiceCTF Finals playing with folks from @pbrucla! ⛳️ Thanks to @dicegangctf for being great hosts and the neat challenges! 🥳
0
0
5
@bliutech
Benson Liu
5 months
Had a lot of fun at the first day of DiceCTF Finals playing with folks from @pbrucla! ⛳️ Thanks to @dicegangctf for being great hosts and the neat challenges! 🥳
1
1
19
@kinugawamasato
Masato Kinugawa
5 months
https://t.co/fIkkSptNXY This is a big change for DOM Clobberers. Firefox Nightly no longer allows native document properties to be overwritten by elements with a name attr, e.g.: <img src=a name=currentScript> <script> alert(document.currentScript)// HTMLScriptElement </script>
bugzilla.mozilla.org
RESOLVED (tschuster) in Core - DOM: Core & HTML. Last updated 2025-07-23.
3
21
157
@slonser_
slonser
8 months
Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->
22
186
1K
@pbrucla
Psi Beta Rho
8 months
Psi Beta Rho won b01lers CTF 2025 this weekend! 🎉🥳 Thank you to the @b01lers team for hosting, and all our members for participating❣️
0
3
7
@bliutech
Benson Liu
8 months
Got #1 at b01lers CTF with @pbrucla this past weekend! 🏆⛳️ This is the first time our team has gotten first (we've been close a couple of times 🫠) so was really excited about this result! 🥳 Thanks to @b01lers for the cool challenges! ❤️
2
0
19
@bliutech
Benson Liu
8 months
🤯
@slonser_
slonser
8 months
Therefore, we can store the value of any attribute in a CSS custom property. However, we can't use the value of a pseudo-attribute in url(). And this is where image-set comes to the rescue — it allows us to use properties as arguments. https://t.co/n0XmDZNvcG
0
0
1
@intenttoship
Intent To Ship
8 months
Blink: Intent to Deprecate and Remove: Remove auto-detection of ISO-2022-JP charset in HTML https://t.co/UWi2tu9iBw
0
24
52