
Pietro Borrello
@borrello_pietro
Followers
3K
Following
2K
Media
45
Statuses
543
Security Researcher | PhD @SapienzaRoma | Pwner at @TheRomanXpl0it and @mhackeroni | https://t.co/g77o9Ojdjf | https://t.co/q5KZ4e8wkX
Joined August 2018
We just won TWO @PwnieAwards!!.- Best Desktop Bug for - Most Interesting Research for our "Custom Processing Unit" research . We are overwhelmed by such a great recognition for our work ❤️. @0xhilbert @marv0x90 @mlqxyz @lavados @misc0110
6
17
164
This is one of the coolest talks I have seen in a while!.Incredible research 🔥.
The recording of our OffensiveCon presentation about EntrySign is live! Slides at @sirdarckcat @__spq__.
0
2
9
RT @sparchatus: Disclosing Branch Predictor Race Conditions (BPRC), a new class of vulnerabilities where asynchronous branch predictor oper….
0
5
0
RT @_tsuro: V8 Security is hiring in Warsaw!. If you want to work on improving our JavaScript and Wasm fuzzers, check out the links below!.
0
26
0
RT @__spq__: Here are the details about the AMD Signature verification vulnerability we worked on, Enjoy!.
bughunters.google.com
This blog post covers the full details of EntrySign, the AMD Zen microcode signature validation vulnerability recently discovered by the Google Security team.
0
56
0
RT @wiknerj: HW defenses against Spectre are tricky: they need to be applied correctly by the SW, and we need to trust that the HW does wha….
0
33
0
RT @mhackeroni: 📢 Calling all Sponsors! . Get mhackeroni to the DEF CON 32 CTF finals 🚩🍝. Would you like to be a part of moving the kitchen….
0
33
0
RT @dcdelia: Want to learn about security artifacts? 🤖🧪🚀.@NDSSSymposium seeks enthusiastic Artifact Evaluation committee members (PhD/gradu….
docs.google.com
We are looking for members of the Artifact Evaluation Committee (AEC) of NDSS 2025. The Network and Distributed System Security symposium adopts an Artifact Evaluation (AE) process allowing authors...
0
16
0
RT @shw3ta_shinde: Can a malicious cloud provider send bad notifications to break confidential VMs? .Disclosing #AhoiAttacks that break co….
ahoi-attacks.github.io
Attacks to break AMD SEV-SNP, Intel TDX and Intel SGX with malicious notifications.
0
21
0
RT @sirdarckcat: Had a blast this past weekend at @h2hconference talking about the basics of CPU vulns and about my experience analyzing a….
github.com
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code. - google/security-research
0
19
0
RT @andreafioraldi: New paper with @borrello_pietro @dcdelia @balzarot @lquerzoni @c_giuffrida!."Predictive Context-sensitive Fuzzing".intr….
0
20
0
RT @c_giuffrida: Come work with us in beautiful Amsterdam! We have a new faculty position in Security research @VUamsterdam. The specific r….
0
10
0
If you are interested in uArch Security, we just opened an internship position at @Apple!. The position is focused on offensive research, and you will be contributing to the security of some of our most advanced CPUs in one of the coolest teams. Apply at:
4
26
111
RT @radian: 🔺New on the Apple Security Research blog: a brief technical overview of iMessage Contact Key Verification! .
security.apple.com
iMessage broke new ground in 2011 as the first widely available messaging service to provide secure end-to-end encryption by default. Ever since, we’ve been making ongoing improvements to iMessage...
0
83
0
RT @eigenform: reposting now that my twitter cards work! blog post about exploring the local branch predictor on my M2 MBP .
reflexive.space
0
11
0
With @mhackeroni we won the first CTF pwning a satellite in space 👀. An insanely cool competition organized by @hack_a_sat at @defcon, even with cpu side channels in orbit 🤯.
And, the results are in!!! The winners of the first CTF competition IN SPACE are. 🥇 mHACKeroni @mhackeroni .🥈 Poland Can Into Space @DragonSectorCTF @p4_team.🥉 jmp fs: [rcx] @pfs_ctf. Thanks to all the teams who worked so hard & made this year’s #HAS4Finals one to remember!
2
11
142
RT @flowyroll: Dropping #Downfall, exploiting speculative forwarding of 'Gather' instruction to steal data from hardware registers. #Meltdo….
0
378
0
RT @0xhilbert: I am happy to announce that Collide+Power, our new and generic software-based power side-channel technique, has been accepte….
0
31
0
RT @nohatcon: No Hat is a 2023 sponsor of @mhackeroni, one of the top Italian Ethical Hacking teams! .In 10 years, @mhackeroni has consiste….
0
7
0
RT @hack_a_sat: The Hack-A-Sat finals team videos are BACK! 😎. Get to know the teams competing in the #HackASat4 finals next month. First u….
0
32
0