Benson Liu
@bliutech
Followers
311
Following
8K
Media
12
Statuses
145
security engineer @meta
New York City, NY
Joined November 2021
Fun addition to the daily routine! ⛳️
1日1問出題する常設CTFを始めます🎄 初心者向けの問題を中心に、 ・月〜金は新規の問題 ・土日は新たに移植したCTFの過去問 を公開していきます! 本日より開催です! https://t.co/VJokcIgkGm
0
0
4
We published a blogpost about SafeContentFrame - a library for rendering untrusted content inside an iframe. The library is a big party of what I've been up to in the few last years! Check out the blog and take a slice of my birthday cake 🎂! https://t.co/9gGEqUuwIX
6
52
195
I discovered how to use CSS to steal attribute data without selectors and stylesheet imports! This means you can now exploit CSS injection via style attributes! Learn how below: https://t.co/Tje8Ce8if0
13
86
362
Carey Nachenberg was a Chief Scientist at a GoogleX moonshot, a Fellow (senior most eng at Symantec) and a professor at UCLA. I interviewed him about his career story and we discussed: • Story behind his growth to IC10 (VP equivalent) • How high-level IC recruiting works •
1
2
13
If you are interested in checking out MBASED some more (along with the accompanying IEEE paper), feel free to check out our project repository. 🚀 https://t.co/3LLPNfs1z7 🧵(n/n)
github.com
MIT IEEE URTC 2024. GSET 2024. Repository for the "MBASED: Practical Simplifications of Mixed Boolean-Arithmetic Obfuscation". A Binary Ninja decompiler plugin taking ideas from c...
0
1
10
To accelerate deobfuscation, we used SMT solvers like Z3 and sympy to minimize the extracted expressions from BNIL. We had to write visitors to translate our boolean expression intermediate representation into a form that these tools could use. 🧵(3/n)
1
1
5
We leveraged ideas from compiler construction to simplify MBA expressions over parse trees. 🌲 Students built an LL(1) parser and AST from scratch and then wrote simplification passes similar to how you would write compiler passes! 💻 🧵(2/n)
1
1
3
This has been getting some activity on my GitHub recently so thought I would cross post here. 👀✨Last year I worked on a cool project with some students tackling mixed-boolean arithmetic (MBA) deobfuscation and built a plugin for Binary Ninja (@vector35)! 🐛🥷 🧵(1/n)
2
13
65
I recently talked to some students about scaling vulnerability discovery (particularly in the context of developing program analysis tools). 🐛🚀 The following diagram is how I decided to break down the process. 🖌️ What did I get right/miss? 👀
0
0
3
Day 2 was equally fun! 👀 All of the novelty challenges were really interesting and blew my mind. 🤯 Wish we had more time to play around with them, it was a blast! ❤️
Had a lot of fun at the first day of DiceCTF Finals playing with folks from @pbrucla! ⛳️ Thanks to @dicegangctf for being great hosts and the neat challenges! 🥳
0
0
5
Had a lot of fun at the first day of DiceCTF Finals playing with folks from @pbrucla! ⛳️ Thanks to @dicegangctf for being great hosts and the neat challenges! 🥳
1
1
19
https://t.co/fIkkSptNXY This is a big change for DOM Clobberers. Firefox Nightly no longer allows native document properties to be overwritten by elements with a name attr, e.g.: <img src=a name=currentScript> <script> alert(document.currentScript)// HTMLScriptElement </script>
bugzilla.mozilla.org
RESOLVED (tschuster) in Core - DOM: Core & HTML. Last updated 2025-07-23.
3
21
157
Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->
22
186
1K
🤯
Therefore, we can store the value of any attribute in a CSS custom property. However, we can't use the value of a pseudo-attribute in url(). And this is where image-set comes to the rescue — it allows us to use properties as arguments. https://t.co/n0XmDZNvcG
0
0
1
Blink: Intent to Deprecate and Remove: Remove auto-detection of ISO-2022-JP charset in HTML https://t.co/UWi2tu9iBw
0
24
52