Dmitry Vyukov
@dvyukov
Followers
9K
Following
12K
Media
103
Statuses
4K
I tweet about fuzzing, bugs, sanitizers, security, hardening, kernels, syzkaller, Go, performance, concurrency, lock-free algorithms.
Munich, Germany
Joined April 2009
Latency Profiling and Optimization talk video: https://t.co/dNN0825qmX Includes overview of new perf features. Tagline: Profilers lied to us all that time! ☺
I am speaking about Latency Profiling at C++ Zurich Meetup on Oct 6 along with the legendary Sean Parent: https://t.co/DnNdWb96OE Stop by if you are interested (or just want free snacks and to check out the Google office)
0
17
129
Hi all, my name is Alisa, I am making the online training "Zero Day Engineering". If you want to get into the *real* offensive cyber security (reverse eng, vulns, exploits, fuzzing, pwn, ... 0days), eager to get your hands dirty, and haven't seen it yet, you probably should:
11
61
440
More HW security goodness from Arm: https://t.co/Fmm8Xw8ask vMTE (Virtual Memory Tagging) allows to use MTE in a more flexible way, consuming less RAM. POE2 allows to build efficient in-process sandboxes and isolation. More-or-less improvement over x86 Memory Protection Keys.
First mention of x86 memory tagging (aka MTE) by both Intel and AMD (codename ChkTag): https://t.co/puaBEmfAGx
https://t.co/UVIsSZ9Twc 🤘🤘🤘
0
21
82
First mention of x86 memory tagging (aka MTE) by both Intel and AMD (codename ChkTag): https://t.co/puaBEmfAGx
https://t.co/UVIsSZ9Twc 🤘🤘🤘
amd.com
AMD and Intel today marked the one-year anniversary of the x86 Ecosystem Advisory Group (EAG), a joint initiative launched in October 2024 to strengthen the future of x86 computing. The advisory...
2
28
127
The Latency Profiling talk is tomorrow in Zurich. There are still spots left. The talk is 🔥🔥🔥
I am speaking about Latency Profiling at C++ Zurich Meetup on Oct 6 along with the legendary Sean Parent: https://t.co/DnNdWb96OE Stop by if you are interested (or just want free snacks and to check out the Google office)
1
0
8
Remember how there were supposed to be no CVEs for crafted filesystem vulns, and it was such an important thing that the Linux CNA fought Canonical's CVE allocation for a non-crafted fs? Well, while the researcher cat's away, the CNA automation will play:
2
2
10
Uninitialized memory is the most under-recognized type of security bug (it looks like UAF/OOB got all attention). You don't need ROP, don't need to break ASLR, overlap objects, etc. Just read out crypto keys that the system nicely sends you.
Wrote a trigger for CVE-2025-38494/5 (an integer underflow in the HID subsystem) that leaks 64 KB of OOB memory over USB. Still works on Pixels and Ubuntus (but the bug is fixed in stable kernels). https://t.co/4IvvqcVs4Q
3
25
175
ksmbd - Fuzzing Improvements and Vulnerability Discovery Another article by @73696e65 about fuzzing the ksmbd module with syzkaller. https://t.co/0xVehcOrYu
1
38
220
🔺iPhone models announced today include Memory Integrity Enforcement, the culmination of an unprecedented design and engineering effort that we believe represents the most significant upgrade to memory safety in the history of consumer operating systems.
security.apple.com
Memory Integrity Enforcement (MIE) is the culmination of an unprecedented design and engineering effort spanning half a decade that combines the unique strengths of Apple silicon hardware with our...
56
503
3K
Whoever is coming to @BalCC0n: I will be teaching a workshop Attacking USB with Raw Gadget (covering basics of USB emulation and sniffing). If you wish to attend, you must bring Raspberry Pi 5 along with a few other things, see the workshop description. https://t.co/1En6ikOigB
0
5
38
I am speaking about Latency Profiling at C++ Zurich Meetup on Oct 6 along with the legendary Sean Parent: https://t.co/DnNdWb96OE Stop by if you are interested (or just want free snacks and to check out the Google office)
meetup.com
Hoi Zäme We're thrilled to announce that Sean Parent and Dmitry Vyukov will be speaking at the October C++ meetup! **Agenda** 18:00 - 18:30 Welcome snacks and socialising
5
4
16
An unpopular security opinion: with enough easy-to-find bugs, no amount of hardening will help. If you have a buffet-style assortment of bugs to choose from, you can bypass any mitigation.
1
2
33
Prototype for type-based partitioning of Linux kernel slab caches: https://t.co/hXbnwCExCm Compiler seems to be doing a good-enough job of inferring allocated types per /proc/slabinfo.
discourse.llvm.org
I was curious if I can get it to work for the Linux kernel. Here’s a prototype: Critically, the Linux kernel’s macro-based wrapfest of the kmalloc* functions meant that automatic instrumentation is...
1
12
39
We are hiring in Sunnyvale, USA: Senior Tech Lead, C++ Ecosystem Safety As the Senior Tech Lead you will have primary responsibility for C++ safety efforts including dynamic analysis, static analysis, fuzzing, and related areas. https://t.co/yEunOauDzG
0
5
22
Coroutine Frame-Oriented Programming: Breaking Control Flow Integrity by Abusing Modern C++ https://t.co/r6eDN117Wi Marcos Bajo(@h3xduck) & Christian Rossow(@chrossow)
0
10
31
@dvyukov @theori_io @trailofbits FWIW, Trail of Bits spent the last month divorcing our system from the competition framework so you can run it on your laptop against real codebases.
github.com
Buttercup finds and patches software vulnerabilities - trailofbits/buttercup
0
3
8
Here’s the source code of our #AIxCC winning team @TeamAtlanta24, enjoy! https://t.co/jSA4H7mH4U More things TBA
github.com
Contribute to Team-Atlanta/aixcc-afc-atlantis development by creating an account on GitHub.
2
36
145
Genuinely interested to hear from teams how much better they feel they would go given 2x team size? cc @theori_io @trailofbits
3
0
5
With #AIxCC results in, thinking how much it's "this is the best approach to the problem" vs "this is all just hard work, development, engineering, tuning, etc"?... 1st: 392.76 score, 42 ppl team 2nd: 291.35, 10 3rd: 210.68, 8 4th: 153.70, 8 Also: 2nd: 41KLOC Python 3rd: 21KLOC
1
2
21