cci_forensics Profile Banner
Takahiro Haruyama Profile
Takahiro Haruyama

@cci_forensics

Followers
3K
Following
863
Media
152
Statuses
5K

唇亡歯寒

Joined March 2010
Don't wanna be here? Send us removal request.
@cci_forensics
Takahiro Haruyama
4 years
Due to some missing links on the conference web pages, I uploaded my conference talk pdfs for 10 years. Time flies.
1
28
105
@cci_forensics
Takahiro Haruyama
11 hours
RT @binarly_io: Nvidia OSR (@AlexTereshkin, @Adam_pi3) reveals high-impact Supermicro BMC vulnerabilities (CVE-2024-10237/38/39). Binarly R….
0
18
0
@cci_forensics
Takahiro Haruyama
7 days
RT @0xdea: My #idalib based tools are featured in the latest @HexRaysSA blog!.
0
22
0
@cci_forensics
Takahiro Haruyama
15 days
RT @binarly_io: 🔎From Hidden Semantics to Structured Insights✨. By combining static analysis techniques and tailored heuristic improvements….
0
15
0
@cci_forensics
Takahiro Haruyama
22 days
RT @InfPCTechStack: Our talk at #BHUSA @BlackHatEvents Briefings has been accepted!. This is a presentation on an initiative to make the BI….
0
12
0
@cci_forensics
Takahiro Haruyama
22 days
RT @NikolajSchlej: The embargo (12:00 UTC 2025-06-10) is over, let's start a thread on Hydroph0bia (CVE-2025-4275), a trivial SecureBoot an….
0
92
0
@cci_forensics
Takahiro Haruyama
23 days
RT @pagabuc: Our research on Secure Boot keeps on giving!. Today we disclose CVE-2025-3052, a Secure Boot bypass that started with vulnerab….
0
10
0
@cci_forensics
Takahiro Haruyama
23 days
RT @binarly_io: 🚨Binarly is documenting the discovery of CVE-2025-3052, a memory-corruption flaw in a Microsoft-signed UEFI module that let….
0
64
0
@cci_forensics
Takahiro Haruyama
28 days
My former colleague @DanaBehling is seeking new opportunities. She has deep expertise in malware and threat research and is dedicated to supporting her teammates. Highly recommended—feel free to reach out to me. Conference Talk: Her blog:.
0
4
11
@cci_forensics
Takahiro Haruyama
28 days
RT @binarly_io: Binarly REsearch is proud to build & support two @HexRaysSA IDA plugin contest winners:. 🔬 efiXplorer by @yeggorv . https://….
0
12
0
@cci_forensics
Takahiro Haruyama
30 days
RT @HexRaysSA: 👋 Please join us in welcoming @RolfRolles as Hex-Rays’ new Chief Scientist!. Rolf brings decades of RE expertise, with stand….
0
23
0
@cci_forensics
Takahiro Haruyama
1 month
RT @binarly_io: Why do attackers love bootkits? 🔗Persistence + ♻️stealth. At the @REverseConf, Binarly REsearcher @cci_forensics shows how….
0
11
0
@cci_forensics
Takahiro Haruyama
1 month
RT @xorpse: We're are happy to announce a new release of our #Rust bindings for @HexRaysSA idalib. What's new:.- New APIs for working with….
0
21
0
@cci_forensics
Takahiro Haruyama
1 month
RT @REverseConf: The RE//verse YouTube channel is packed with talks from RE//verse 2025! Catch Takahiro’s deep dive into UEFI Bootkit Hunti….
0
32
0
@cci_forensics
Takahiro Haruyama
2 months
RT @BushidoToken: Have you ever wondered "How do I found out who owns an IP address?" or "Who is the owner of these IP addresses?". A new @….
0
76
0
@cci_forensics
Takahiro Haruyama
2 months
RT @binarly_io: Binarly REsearch: 🧨67% of 21,610 firmware images still ship with an expired Intel PPAM certificate. @matrosov and @pagabuc….
0
15
0
@cci_forensics
Takahiro Haruyama
2 months
RT @matrosov: I’m incredibly proud of the team for delivering such an important milestone!👏. One of the key highlights is the Exploitation….
0
7
0
@cci_forensics
Takahiro Haruyama
3 months
RT @standa_t: This is like "VT-x 101". The essence of HW-assisted VT, everything needed to virtualize Windows on-the-fly, and a bit of secu….
0
15
0
@cci_forensics
Takahiro Haruyama
3 months
RT @Intel80x86: Not Windows sec, but if you're into hardware design & FPGA synthesis, check out our new paper about our RTL-level hardware….
0
15
0