f0rki Profile Banner
Michael Rodler Profile
Michael Rodler

@f0rki

Followers
609
Following
3K
Media
43
Statuses
6K

for some reason I like analyzing code; also 🤘 (he/him) also @[email protected]

Joined December 2011
Don't wanna be here? Send us removal request.
@f0rki
Michael Rodler
2 years
RT @mboehme_: Looks like there is a new snapshot-based fuzzer in town. It's also super-well documented. * * https:….
0
15
0
@grok
Grok
8 days
Join millions who have switched to Grok.
166
290
2K
@f0rki
Michael Rodler
2 years
RT @FoundryZero: For too long has it been a mild inconvenience to not have the features of GEF in LLDB. We at Foundry Zero feel you deserv….
Tweet card summary image
github.com
LLEF is a plugin for LLDB to make it more useful for RE and VR - foundryzero/llef
0
32
0
@f0rki
Michael Rodler
2 years
RT @dystopiabreaker: one day google is going to randomly kill 8.8.8.8 for no reason and a double digit percentage of the internet as well a….
0
373
0
@f0rki
Michael Rodler
2 years
RT @JinshengBa: To avoid incomplete and incorrect citations in papers, I wrote a script to automatically correct BibTex files: https://t.co….
Tweet card summary image
github.com
Search, check, and autofix your BibTex files! Contribute to bajinsheng/bibtidy development by creating an account on GitHub.
0
11
0
@f0rki
Michael Rodler
2 years
RT @workingjubilee: OnceCell is now STABLE, folks!
0
72
0
@f0rki
Michael Rodler
2 years
RT @aurelsec: The summer school "Cyber in Sophia Antipolis" will take place from July 3rd to 7th.Topic is research….
0
37
0
@f0rki
Michael Rodler
2 years
RT @michaelmarcozzi: 🥁I am looking for students and postdocs:. PhD student // 3 years, fully funded // Fuzzing . P….
0
19
0
@f0rki
Michael Rodler
2 years
yeah @ctfhacker released it :D this is an awesome project (although I might be biased).
@0xdabbad00
Scott Piper
2 years
AWS open-sourced a fuzzer. "load a raw memory dump and register state into a KVM virtual machine (VM) for execution. At a point in execution, this VM can be reset to its initial state"
0
1
2
@f0rki
Michael Rodler
2 years
RT @is_eqv: Very cool to see this work finally getting published. Congratz @__nils_ :)
0
1
0
@f0rki
Michael Rodler
2 years
RT @mboehme_: On finding 0days with LLMs.
0
1
0
@f0rki
Michael Rodler
2 years
RT @vxunderground: Today VirusTotal announced that each sample uploaded will be accompanied by "Code Insight". Code Insight uses Sec-PaLM,….
0
495
0
@f0rki
Michael Rodler
2 years
RT @mtarral: This is also the main fuzzer driving our initative to secure and harden the Linux kernel for Confidential Computing 🔐!. And it….
Tweet card summary image
github.com
Linux Security Hardening for Confidential Compute. Contribute to intel/ccc-linux-guest-hardening development by creating an account on GitHub.
0
1
0
@f0rki
Michael Rodler
2 years
However, EF/CF also supports property-based fuzzing, looking for custom assertions/events, solidity panics in solc >0.8.
0
0
0
@f0rki
Michael Rodler
2 years
For example, EF/CF can actually synthesize an rentrancy exploit for the Uniswap/IMBTC incident. One just needs to configure EF/CF to fuzz all relevant contracts in combination.
1
0
0
@f0rki
Michael Rodler
2 years
The contracts are only simulated by EF/CF (due to perf reasons), but a generated testcase can be converted to solidity attack contracts if you need a working exploit for whatever reason. What is an exploit? Well we define it as being able to steal Ether.
1
0
0
@f0rki
Michael Rodler
2 years
This allows to to identify various types of reentrancy attacks. EF/CF simulates multiple attacker contracts that *can* respond to callbacks with reentrant transactions.
Tweet media one
1
0
0
@f0rki
Michael Rodler
2 years
Now that we have performance, we can do fun things with the fuzzer. We actually attempt to execute reentrant transaction sequences. EF/CF mutates TX sequences that are dynamically expanded to a tree by the fuzzing harness, controlled by a reenter field.
Tweet media one
1
0
0