borrello_pietro Profile Banner
Pietro Borrello Profile
Pietro Borrello

@borrello_pietro

Followers
3K
Following
2K
Media
45
Statuses
545

 Security Researcher | PhD @SapienzaRoma | Pwner at @TheRomanXpl0it and @mhackeroni | https://t.co/g77o9Ojdjf | https://t.co/q5KZ4e8wkX

Joined August 2018
Don't wanna be here? Send us removal request.
@borrello_pietro
Pietro Borrello
3 years
We just won TWO @PwnieAwards!! - Best Desktop Bug for https://t.co/VcI53G6B56 - Most Interesting Research for our "Custom Processing Unit" research We are overwhelmed by such a great recognition for our work ❤️ @0xhilbert @marv0x90 @mlqxyz @lavados @misc0110
6
17
166
@borrello_pietro
Pietro Borrello
1 month
Are you interested in bleeding-edge microarchitecture offensive security research, with a concrete impact on user security? We have just opened a Microarchitecture Security Internship position at Apple, in SEAR LASER! ❤️‍🔥 Apply here:
5
24
146
@borrello_pietro
Pietro Borrello
2 months
Spreading love against memory corruption through the whole stack! From the software deep down the microarchitecture It has been an insane journey improving the security of millions of people 🔥 https://t.co/WAhhO6oc7x
Tweet card summary image
security.apple.com
Memory Integrity Enforcement (MIE) is the culmination of an unprecedented design and engineering effort spanning half a decade that combines the unique strengths of Apple silicon hardware with our...
0
13
128
@borrello_pietro
Pietro Borrello
6 months
This is one of the coolest talks I have seen in a while! Incredible research 🔥
@_MatteoRizzo
Matteo Rizzo
6 months
The recording of our OffensiveCon presentation about EntrySign is live! https://t.co/atQGAV39l3 Slides at https://t.co/twMFJ9L8Mv @sirdarckcat @__spq__
0
2
10
@sparchatus
Sandro
6 months
Disclosing Branch Predictor Race Conditions (BPRC), a new class of vulnerabilities where asynchronous branch predictor operations violate hardware-enforced privilege and context separation in virtually all recent Intel CPUs. @wiknerj @kavehrazavi : https://t.co/sbI0Iqb2PS
0
5
21
@_tsuro
stephen
8 months
V8 Security is hiring in Warsaw! If you want to work on improving our JavaScript and Wasm fuzzers, check out the links below!
2
26
92
@wiknerj
johannes
1 year
HW defenses against Spectre are tricky: they need to be applied correctly by the SW, and we need to trust that the HW does what its supposed to. Our latest work "Breaking the Barrier" exploits loopholes in both of these issues on Intel and AMD parts. https://t.co/DBzOXdf75h
2
34
116
@mhackeroni
mhackeroni
1 year
📢 Calling all Sponsors! Get mhackeroni to the DEF CON 32 CTF finals 🚩🍝 Would you like to be a part of moving the kitchen to Las Vegas this summer & secure a spot for your logo in our highly-demanded t-shirt? Contact us! Your favourite Italian Acheri™️ need your help!
4
31
104
@dcdelia
Daniele Cono D'Elia
2 years
Want to learn about security artifacts? 🤖🧪🚀 @NDSSSymposium seeks enthusiastic Artifact Evaluation committee members (PhD/graduate students, postdocs, industry researchers) to review cutting-edge research materials. Apply by May 31st: https://t.co/WsgASbb2HS RTs appreciated 🙏
Tweet card summary image
docs.google.com
We are looking for members of the Artifact Evaluation Committee (AEC) of NDSS 2025. The Network and Distributed System Security symposium adopts an Artifact Evaluation (AE) process allowing authors...
1
16
22
@shw3ta_shinde
Shweta Shinde
2 years
Can a malicious cloud provider send bad notifications to break confidential VMs? Disclosing #AhoiAttacks that break confidential computing offered by AMD SEV-SNP and Intel TDX by abusing interrupt delivery. Check our @USENIXSecurity & @IEEESSP papers. https://t.co/wxr7rBWX7U
Tweet card summary image
ahoi-attacks.github.io
Attacks to break AMD SEV-SNP, Intel TDX and Intel SGX with malicious notifications.
2
21
74
@sirdarckcat
Eduardo Vela
2 years
Had a blast this past weekend at @h2hconference talking about the basics of CPU vulns and about my experience analyzing a couple vulns from @taviso - you can check my slides at https://t.co/OpvgC3CoCW (they are not just about Reptar though!) and PoCs: https://t.co/L2SHjd7s2b
Tweet card summary image
github.com
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code. - google/security-research
1
19
73
@andreafioraldi
Andrea Fioraldi
2 years
New paper with @borrello_pietro @dcdelia @balzarot @lquerzoni @c_giuffrida! "Predictive Context-sensitive Fuzzing" introduces compile time context sensitivity to fuzzing w/ selective prioritization using dataflow diversity. Will appear at NDSS24, get it at
1
20
73
@vu5ec
VUSec
2 years
Disclosing #SLAM, aka how to combine Spectre and Intel LAM (& co.) to leak kernel memory on future CPUs (demo below). Thousands of exploitable "unmasked" (or pointer chasing) gadgets in the Linux kernel. Joint work by @MatheHertogh @SanWieb @c_giuffrida: https://t.co/8sgL8t8eC5
1
59
181
@c_giuffrida
Cristiano Giuffrida
2 years
Come work with us in beautiful Amsterdam! We have a new faculty position in Security research @VUamsterdam. The specific research topic is flexible and synergies with @vu5ec topics are welcome. Feel free to DM for details.
0
10
29
@borrello_pietro
Pietro Borrello
2 years
If you are interested in uArch Security, we just opened an internship position at @Apple! The position is focused on offensive research, and you will be contributing to the security of some of our most advanced CPUs in one of the coolest teams. Apply at:
4
26
110
@eigenform
meta
2 years
reposting now that my twitter cards work! blog post about exploring the local branch predictor on my M2 MBP
reflexive.space
1
11
41
@borrello_pietro
Pietro Borrello
2 years
With @mhackeroni we won the first CTF pwning a satellite in space 👀 An insanely cool competition organized by @hack_a_sat at @defcon, even with cpu side channels in orbit 🤯
@hack_a_sat
Hack-A-Sat
2 years
And, the results are in!!! The winners of the first CTF competition IN SPACE are... 🥇 mHACKeroni @mhackeroni 🥈 Poland Can Into Space @DragonSectorCTF @p4_team 🥉 jmp fs: [rcx] @pfs_ctf Thanks to all the teams who worked so hard & made this year’s #HAS4Finals one to remember!
2
11
142
@flowyroll
Daniel Moghimi
2 years
Dropping #Downfall, exploiting speculative forwarding of 'Gather' instruction to steal data from hardware registers. #MeltdownSequel - Practical to exploit (POC/Demo) - Defeat all isolation boundaries (OS, VM, SGX) - Bypass all Meltdown/MDS mitigations. https://t.co/udgnfAWCE2
16
376
961
@0xhilbert
Andreas Kogler
2 years
I am happy to announce that Collide+Power, our new and generic software-based power side-channel technique, has been accepted at @USENIXSecurity 2023 #usesec23. https://t.co/yZukJ3esgf
4
31
83