cci_forensics Profile Banner
Takahiro Haruyama Profile
Takahiro Haruyama

@cci_forensics

Followers
3K
Following
872
Media
152
Statuses
5K

唇亡歯寒

Joined March 2010
Don't wanna be here? Send us removal request.
@cci_forensics
Takahiro Haruyama
4 years
Due to some missing links on the conference web pages, I uploaded my conference talk pdfs for 10 years. Time flies.
1
30
106
@cci_forensics
Takahiro Haruyama
3 days
RT @thatjiaozi: As promised Blogpost is here! . I find that a lot of the times people ask “how can researchers find complex bugs”. This is….
Tweet card summary image
bughunters.google.com
This blog post describes the journey of discovering a VM escape bug with the goal of demystifying the security research process and demonstrating how persistence and pivoting can lead to achieving...
0
86
0
@grok
Grok
2 days
What do you want to know?.
124
30
299
@cci_forensics
Takahiro Haruyama
4 days
Sorry not to respond on Keybase. I've not used it over 1 year since I changed my laptop.
0
0
2
@cci_forensics
Takahiro Haruyama
9 days
RT @binarly_io: 🚨More than a year after the XZ Utils crisis, we found 35+ publicly available Docker Hub images still carrying the backdoor,….
0
13
0
@cci_forensics
Takahiro Haruyama
30 days
RT @gmhzxy: hyper-reV: A powerful memory introspection & reverse engineering hypervisor leveraging Hyper-V. Read/write guest memory, SLAT h….
Tweet card summary image
github.com
memory introspection and reverse engineering hypervisor powered by leveraging Hyper-V - noahware/hyper-reV
0
51
0
@cci_forensics
Takahiro Haruyama
1 month
RT @Idov31: I'm happy to finally release NovaHypervisor! NovaHypervisor is a defensive hypervisor with the goal of protecting AV/EDR vendor….
Tweet card summary image
github.com
NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (either via Bring Your Own Vulnerable Driver (BYOVD) or other mean...
0
88
0
@cci_forensics
Takahiro Haruyama
1 month
RT @binarly_io: 🐳 𝗣𝘀𝘀𝘁, 𝘆𝗼𝘂𝗿 𝗰𝗼𝗻𝘁𝗮𝗶𝗻𝗲𝗿 𝗶𝘀 𝗹𝗲𝗮𝗸𝗶𝗻𝗴 𝘀𝗲𝗰𝗿𝗲𝘁𝘀 𝗴𝗮𝗹𝗼𝗿𝗲.The Binarly REsearch examine more than 𝟴𝟬,𝟬𝟬𝟬 popular Docker Hub images (𝟭….
0
6
0
@cci_forensics
Takahiro Haruyama
2 months
RT @binarly_io: Nvidia OSR (@AlexTereshkin, @Adam_pi3) reveals high-impact Supermicro BMC vulnerabilities (CVE-2024-10237/38/39). Binarly R….
0
21
0
@cci_forensics
Takahiro Haruyama
2 months
RT @binarly_io: 🔎From Hidden Semantics to Structured Insights✨. By combining static analysis techniques and tailored heuristic improvements….
0
14
0
@cci_forensics
Takahiro Haruyama
2 months
RT @InfPCTechStack: Our talk at #BHUSA @BlackHatEvents Briefings has been accepted!. This is a presentation on an initiative to make the BI….
0
11
0
@cci_forensics
Takahiro Haruyama
2 months
RT @NikolajSchlej: The embargo (12:00 UTC 2025-06-10) is over, let's start a thread on Hydroph0bia (CVE-2025-4275), a trivial SecureBoot an….
coderush.me
0
93
0
@cci_forensics
Takahiro Haruyama
2 months
RT @pagabuc: Our research on Secure Boot keeps on giving!. Today we disclose CVE-2025-3052, a Secure Boot bypass that started with vulnerab….
0
10
0
@cci_forensics
Takahiro Haruyama
2 months
RT @binarly_io: 🚨Binarly is documenting the discovery of CVE-2025-3052, a memory-corruption flaw in a Microsoft-signed UEFI module that let….
0
69
0
@cci_forensics
Takahiro Haruyama
3 months
My former colleague @DanaBehling is seeking new opportunities. She has deep expertise in malware and threat research and is dedicated to supporting her teammates. Highly recommended—feel free to reach out to me. Conference Talk: Her blog:.
0
4
11
@cci_forensics
Takahiro Haruyama
3 months
RT @binarly_io: Binarly REsearch is proud to build & support two @HexRaysSA IDA plugin contest winners:. 🔬 efiXplorer by @yeggorv . https://….
0
12
0
@cci_forensics
Takahiro Haruyama
3 months
RT @HexRaysSA: 👋 Please join us in welcoming @RolfRolles as Hex-Rays’ new Chief Scientist!. Rolf brings decades of RE expertise, with stand….
0
23
0
@cci_forensics
Takahiro Haruyama
3 months
RT @binarly_io: Why do attackers love bootkits? 🔗Persistence + ♻️stealth. At the @REverseConf, Binarly REsearcher @cci_forensics shows how….
0
11
0
@cci_forensics
Takahiro Haruyama
3 months
RT @xorpse: We're are happy to announce a new release of our #Rust bindings for @HexRaysSA idalib. What's new:.- New APIs for working with….
Tweet card summary image
github.com
Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib - binarly-io/idalib
0
21
0