michaelmarcozzi Profile Banner
Michaël Marcozzi 🇪🇺🇧🇪 Profile
Michaël Marcozzi 🇪🇺🇧🇪

@michaelmarcozzi

Followers
521
Following
2K
Media
161
Statuses
824

Permanent researcher in cybersecurity (fuzzing) @UnivParisSaclay I make software safer by viciously torturing it to reveal its flaws I can be kind too

Paris, France
Joined February 2010
Don't wanna be here? Send us removal request.
@mboehme_
Marcel Böhme👨‍🔬
20 days
⏱️9 days until submission deadline (Dec 11, 23:59 AoE). Organized by: @YannicNoller, Rohan (@moarbugs) Padhye, @RuijieMeng, and Laszlo (@lszekeres) Szekeres.
@yannicnoller
Yannic Noller (@yannicnoller.bsky.social)
3 months
#FUZZING'26 CALL FOR PAPERS ────── ✨After 5 years, we will be again co-located with NDSS! 🔗 https://t.co/rxrFmIxmjb 📅 11. Dec (Submission) //cc Marcel Böhme (@mboehme_; MPI-SWS), @RuijieMeng (CISPA), Rohan Padhye (@moarbugs; CMU), László Szekeres (@lszekeres; Google)
0
6
12
@michaelmarcozzi
Michaël Marcozzi 🇪🇺🇧🇪
2 months
The Annual French Research Day on Software Testing will be held in beautiful Grenoble on Dec 11! See you there! 😀 Info and registration: https://t.co/SMwavNy1bB
0
0
1
@michaelmarcozzi
Michaël Marcozzi 🇪🇺🇧🇪
7 months
Happy to have presented our SECUBIC project to the French research community in system security (RESSI'25)! 🏠 https://t.co/aafO9G0s9x 🧑‍🔬 @Seb_Bardin @Jean_YvesMarion Stefano Zacchiroli Thanks to the RESSI organizers who had even provided a pool to finish my #OOPSLA reviews! 😇
0
4
10
@michaelmarcozzi
Michaël Marcozzi 🇪🇺🇧🇪
8 months
Check out our ROSARUM benchmark, part of our #icse2025 paper on backdoors and fuzzing: ▶️ It is a fuzzing benchmark (can fuzzers trigger backdoors reliably and fast?) ▶️ It is a backdoor detection benchmark (can code analyses find backdoors reliably?) ⬇️
Tweet card summary image
github.com
A novel backdoor detection benchmark. Contribute to binsec/rosarum development by creating an account on GitHub.
0
4
9
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
8 months
How to detect backdoors efficiently? 🗣️ The slides of our #icse2025 presentation on "Finding Backdoors with Fuzzing" are now available at ⬇️ https://t.co/6DOvrsk3vY
0
4
14
@plumtrie
Dimitri Kokkonis
8 months
Very honored to receive the Best Artifact award at #icse2025 🥳 Congrats and thank you to my coauthors! @michaelmarcozzi, Emilien Decoux, Stefano Zacchiroli
0
2
6
@Seb_Bardin
Sébastien Bardin
8 months
Too many bugs in the queue, not enough time to fix them all? Happy to share that our work on automated bug priorization has been accepted at @USENIXSecurity 2025 -- joint work with Guilhem Lacombe https://t.co/ZiE5pimLfx
1
7
26
@michaelmarcozzi
Michaël Marcozzi 🇪🇺🇧🇪
8 months
"Finding backdoors with fuzzing" --> presentation at @ICSEconf on Friday at 4pm by the great @plumtrie! 👇
@plumtrie
Dimitri Kokkonis
8 months
On my way to Ottawa and @ICSEconf 🍁 Presenting on Friday (May 2nd) at 16:00 local time in room 210, come say hi ☺️
0
0
3
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
8 months
JOB OFFER! - Liked our work on finding backdoors with fuzzing? Then, join the team as a postdoc and help us fight binary supply-chain attacks! We offer a stimulating and open-minded scientific environment in English, in wonderful Paris! APPLY AT https://t.co/03meD0s4gc
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
10 months
How to detect backdoors efficiently? ▶️ Backdoors were found in firmware & open-source code ▶️ Detection requires much manual reverse-engineering ▶️ Fuzzers cannot see backdoors Our @ICSEconf preprint on finding backdoors with fuzzing is at https://t.co/AsuqAxgvoE A thread ⬇️
0
3
8
@michaelmarcozzi
Michaël Marcozzi 🇪🇺🇧🇪
8 months
📢 I am looking for a postdoc on fuzzing, to prevent backdoors and supply-chain attacks! Come and join the team here in Paris (or spread the word)! 🙂 Details and application: https://t.co/mi71a6UDeE
0
3
5
@michaelmarcozzi
Michaël Marcozzi 🇪🇺🇧🇪
8 months
US CISA cybersecurity agency could lose 1300 employees (about a third of its workforce)...
@JeanEricBranaa
US Expertise
8 months
🔴 Trump révoque les habilitations de Chris Krebs, ex-directeur de la CISA (l’Agence de cybersécurité et de sécurité des infrastructures.) ➡️ Il l’accuse d’avoir censuré les conservateurs et dissimulé l’affaire Hunter Biden. ➡️ L’agence pourrait perdre 1 300 employés. #CISA
0
0
1
@michaelmarcozzi
Michaël Marcozzi 🇪🇺🇧🇪
9 months
🏆 Our ROSA tool for backdoor detection has won a best artifact award at @ICSEconf! Try it out: https://t.co/kKrreOlERn Huge thanks and congrats to my student @plumtrie for his huge and great work! 👏👏👏
2
5
31
@yannicnoller
Yannic Noller (@yannicnoller.bsky.social)
9 months
#FUZZING'25 Deadline Extension ────── If you have not finished your #FUZZING paper yet, you are in luck! :) We decided to extend the deadline to March 26, 2025! 🔗 https://t.co/qP3z3wQuof //cc Rohan Padhye (@moarbugs), László Szekeres (@lszekeres), @RuijieMeng, @mboehme_
0
6
8
@michaelmarcozzi
Michaël Marcozzi 🇪🇺🇧🇪
10 months
Our ROSA tool for backdoor detection is available! Try it out! 👇
@plumtrie
Dimitri Kokkonis
10 months
We (myself, @michaelmarcozzi, Stefano Zacchiroli, Emilien Decoux) release the ROSA toolchain, enabling fuzzing-based backdoor detection 🎉 Tool: https://t.co/UXn25CW6st Benchmark: https://t.co/UXc5POkpYw This work received both Available & Reusable badges at @ICSEconf 🥳
0
1
4
@michaelmarcozzi
Michaël Marcozzi 🇪🇺🇧🇪
10 months
Happy to read such enthusiastic reactions to our @ICSEconf paper! ☺️ "ROSA Sets a New Standard for Backdoor Detection." "If you work in cybersecurity, penetration testing, or software auditing, ROSA is a must-try in the fight against hidden threats." https://t.co/L5zK9tAy9h
medium.com
The security industry is constantly battling against hidden backdoors—maliciously planted vulnerabilities that grant attackers undocumented…
1
3
11
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
10 months
How to detect backdoors efficiently? ▶️ Backdoors were found in firmware & open-source code ▶️ Detection requires much manual reverse-engineering ▶️ Fuzzers cannot see backdoors Our @ICSEconf preprint on finding backdoors with fuzzing is at https://t.co/AsuqAxgvoE A thread ⬇️
2
17
65
@Seb_Bardin
Sébastien Bardin
10 months
Timely topic, elegant solution. What else?
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
10 months
How to detect backdoors efficiently? ▶️ Backdoors were found in firmware & open-source code ▶️ Detection requires much manual reverse-engineering ▶️ Fuzzers cannot see backdoors Our @ICSEconf preprint on finding backdoors with fuzzing is at https://t.co/AsuqAxgvoE A thread ⬇️
0
4
8
@michaelmarcozzi
Michaël Marcozzi 🇪🇺🇧🇪
10 months
One of the @ICSEconf reviewer said that our paper on finding backdoors with fuzzing was "a joy to read"! 🙂 The preprint is here! Give it a try by yourself! 🔽
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
10 months
How to detect backdoors efficiently? ▶️ Backdoors were found in firmware & open-source code ▶️ Detection requires much manual reverse-engineering ▶️ Fuzzers cannot see backdoors Our @ICSEconf preprint on finding backdoors with fuzzing is at https://t.co/AsuqAxgvoE A thread ⬇️
0
0
18
@michaelmarcozzi
Michaël Marcozzi 🇪🇺🇧🇪
11 months
Welcome Andy! Looking foward to doing fun research with you! 🥳
@BinsecTool
BINSEC Team @ Université Paris-Saclay, CEA, List
11 months
We are happy to welcome Andy Zalcman as a new PhD student in the team! He will be working with @michaelmarcozzi on better fuzzing guidance. Details: https://t.co/HIEK3UYYeJ
0
1
6