nSinus-R (@nsr@infosec.exchange) Profile
nSinus-R (@[email protected])

@nSinusR

Followers
2K
Following
613
Media
24
Statuses
651

Captures flags with @TeamTasteless. Assistant Professor at @unibirmingham and maintainer of FirmWire & avatar2.

Joined August 2011
Don't wanna be here? Send us removal request.
@nSinusR
nSinus-R (@[email protected])
2 months
RT @pr0me: new baseband rehosting research just dropped!. BaseBridge dynamically identifies relevant regions from a memory dump which are t….
0
22
0
@nSinusR
nSinus-R (@[email protected])
2 months
RT @danielklischies: 📢 Excited to announce that the results on BaseBridge, our project on improving cellular baseband emulation, are going….
0
4
0
@nSinusR
nSinus-R (@[email protected])
3 months
RT @sureworkshop: We are excited to announce that the 1st Workshop on Software Understanding and Reverse Engineering (SURE) will be co-loca….
0
10
0
@nSinusR
nSinus-R (@[email protected])
4 months
RT @REverseConf: No joke, another video! @nsinusr and Tomasz share the ins and outs of modern SIM hacking!
0
4
0
@nSinusR
nSinus-R (@[email protected])
5 months
Really enjoyed speaking at the inaugural edition of.@REverseConf!. You can find our slides on tricks with SIMs and interposers here:
Tweet media one
0
18
72
@nSinusR
nSinus-R (@[email protected])
6 months
RT @REverseConf: SIM cards: more than just storage. Join Marius Muench (@nsinusr) & Tomasz Lisowski as they reveal SIM vulnerabilities, bas….
0
6
0
@nSinusR
nSinus-R (@[email protected])
6 months
Results of the RP2350 Hacking Challenge are now public - I'm happy that my entry qualified as one of the winning breaks!. Also huge shout out to the other winners: @aedancullen, Kévin Courdesses, @IOActive & @hextreeio - awesome work!. Thanks for the challenge @Raspberry_Pi!.
@Raspberry_Pi
Raspberry Pi
6 months
Security through transparency: all chips have vulnerabilities, and most vendors' strategy is not to talk about them. In contrast, we aim to find and fix them. Read the results of our RP2350 Hacking Challenge:
Tweet media one
3
4
37
@nSinusR
nSinus-R (@[email protected])
6 months
🚨Upcoming Training with @_ringzer0: Join @ScepticCtf and me to learn about reversing, fuzzing, and attacking low-level firmware. Austin, March 18th-21st. More information:
Tweet media one
1
3
9
@nSinusR
nSinus-R (@[email protected])
6 months
RT @REverseConf: Our 2025 RE//verse talk schedule is now live! Talks start Friday, but don't forget to check the Thursday schedule and arri….
0
46
0
@nSinusR
nSinus-R (@[email protected])
7 months
RT @gynvael: Want to support security researchers from Dragon Sector in covering legal costs piling up after they went public with logic bo….
0
54
0
@nSinusR
nSinus-R (@[email protected])
9 months
RT @AntiCheatPD: 🧵 New Anti-Cheat Study Highlights 👇. 1/ reveals the hidden economics of game cheats, with annual revenues estimated betwee….
0
27
0
@nSinusR
nSinus-R (@[email protected])
9 months
We have a PhD position opening over at the University of Birmingham! If you are interested in embedded systems, low-level hacking, telco security or trusted execution environments, feel free to reach out. Happy to discuss. Current Application deadline: Dec 5th.
0
11
21
@nSinusR
nSinus-R (@[email protected])
9 months
Heya! Our new research on client-side game cheating & anti-cheat systems is out: Joint work with Sam Collins, Alex Poulopoulos, and @TomChothia. Full paper:
Tweet card summary image
birmingham.ac.uk
Hackers commonly bypass Microsoft Windows kernel protections to enable cheating in competitive online games, new research shows.
1
28
72
@nSinusR
nSinus-R (@[email protected])
9 months
RT @hardwear_io: 📱 Even with newer cellular technologies available, GPRS stacks are still found in many phones, making them a bullseye for….
0
8
0
@nSinusR
nSinus-R (@[email protected])
11 months
RT @thorstenholz: Congratulations Dr. Chlosta! 🎉
Tweet media one
0
3
0
@nSinusR
nSinus-R (@[email protected])
11 months
And now, to the links:.- Paper: - Code: - Artifact:
1
10
23
@nSinusR
nSinus-R (@[email protected])
11 months
Curious to learn more? Come visit our USENIX talk on Thursday afternoon (Session: Wireless Security I: Cellular and Bluetooth). Great work together with Tomasz Piotr Lisowski, Merlin Chlosta, and Jinjin Wang.
1
1
9
@nSinusR
nSinus-R (@[email protected])
11 months
But are hostile SIM cards a realistic threat model? To answer this, we provide two case studies: (a) a SIM spyware remotely provisioned by a rogue operator, and (b) triggering the found vulnerabilities via a modified SIM interposer, inserted by an attacker with physical access.
Tweet media one
1
2
5
@nSinusR
nSinus-R (@[email protected])
11 months
Using SIMurai, we found high-severity vulnerabilities in widely-deployed cellular baseband firmware, allowing attackers to get code execution. We also verified operationality of SIMurai by connecting it to 18(!) different phones and attaching to cellular networks (2G/4G/5G).
Tweet media one
1
3
10
@nSinusR
nSinus-R (@[email protected])
11 months
SIM cards can, for instance, ask your phone to open TCP channels, send SMS, or retrieve location information without user interaction. To explore the attack surface we developed SIMurai, a research-focused SIM emulator, which can be plugged to physical and emulated phones alike.
Tweet media one
1
5
17