Fabio Pagani Profile
Fabio Pagani

@pagabuc

Followers
976
Following
3K
Media
10
Statuses
2K

Vulnerability Research Lead @binarly_io. Prev: Postdoc @ucsantabarbara. Binary analysis, memory forensics et al. Captures flags with Shellphish and NOPS.

Italy
Joined June 2011
Don't wanna be here? Send us removal request.
@landaire
lander
2 days
I wrote about a file format for Unreal Engine 2 games which for the last 20 years has inadvertently hidden game assets from data miners... until now :)
Tweet card summary image
landaire.net
"I’ve had enough reasonable file formats fired at me in my time to tell you that wasn’t one" - Sam Fisher
3
19
48
@binarly_io
BINARLY🔬
2 days
Exciting times! All-new Binarly Transparency Platform 3.5 is live 🚀 Full Java ecosystem visibility + enterprise-scale integration with YARA. See what your products depend on, write smarter rules, and eliminate YARA chaos. https://t.co/dQRqi324W3
Tweet card summary image
binarly.io
Binarly, a leading provider of software supply chain security solutions, today released the Binarly Transparency Platform 3.5 with Java ecosystem support, full enterprise-grade YARA integration, and...
1
7
49
@OpenSecTraining
OpenSecurityTraining2
5 days
This year @binarly_io has also expanded their sponsorship to the creation of a new Firmware Security Learning Path! This captures current and future plans for classes involving security in the deep-dark of firmware! But Binarly is starting to give visibility into what's going on
2
17
84
@ryanaraine
Ryan Naraine
7 days
NEW! We hang out with OpenAI's Dave Aitel to talk about Aardvark and the exotics of LLM bug hunting Listen on Spotify: https://t.co/Q40ed48Yi6
Tweet card summary image
open.spotify.com
Three Buddy Problem · Episode
1
8
32
@ursachec
Claudiu-Vlad Ursache
15 days
I built a program analysis tool which identifies cryptographic algorithms in Java bytecode and wrote about it. Core logic backed by Joern and Code Property Graphs. Hat tip for the great tech @fabsx00, and shout-out to @xorpse and @yeggorv for the support
@binarly_io
BINARLY🔬
15 days
🚀 New Release: Cryptographic Algorithm Identification in Java Bytecode. Our new analyzer scans JARs (and soon Android packages) to uncover algorithm usage, provide reachability insights, and report NIST 8457 compliance. Dive into the details:
0
6
13
@FuzzingLabs
FuzzingLabs
9 days
💥 We’ve just raised €1M in pre-seed funding to accelerate the development of FuzzForge. When I started FuzzingLabs, everything was bootstrapped: our audits, our trainings, our R&D. No investors, no funding. Just a passionate team obsessed with offensive security and the
3
38
263
@binarly_io
BINARLY🔬
8 days
🎉 Big news from the Binarly research, product and engineering teams: YARA is now fully integrated into the v3.5, bringing threat hunting and threat intelligence directly into the same environment used for product and software supply-chain security. https://t.co/qNakbPkNlS
Tweet card summary image
binarly.io
The latest release of the Binarly Transparency Platform (version 3.5) introduces several new features designed to help organizations strengthen and secure software supply chains. One key enhancement...
1
8
12
@DistrictCon
DistrictCon
12 days
We're officially announcing our speakers DistrictCon Year 1! Check out our incredible lineup:
districtcon.org
1
14
41
@binarly_io
BINARLY🔬
15 days
🚀 New Release: Cryptographic Algorithm Identification in Java Bytecode. Our new analyzer scans JARs (and soon Android packages) to uncover algorithm usage, provide reachability insights, and report NIST 8457 compliance. Dive into the details:
Tweet card summary image
binarly.io
Cryptographic algorithms protect critical properties of modern software. With the potential danger posed by the advent of quantum computers, it has become more important for companies to identify...
0
19
64
@IridiumXOR
Andrea Oliveri
23 days
Memory dumps aren’t always reliable. In “A Comprehensive Quantification of Inconsistencies in Memory Dumps” (with @balzarot), to be presented on October 20 at RAID 2025, Gold Coast, Australia, we quantify, classify, and trace how kernel activity and acquisition setups cause them.
0
2
10
@nSinusR
nSinus-R (@[email protected])
18 days
Our @defcon'33 talk is online: https://t.co/RPY7WZx8Qz! Ever wondered how to get banned from online games without cheating? We've got you covered! Check out this talk for fun hacks tripping off modern anticheats. Joined work with @Cowtickle & @TomChothia.
1
5
12
@binarly_io
BINARLY🔬
21 days
⚡️UEFI system firmware still has a mitigation gap, and we measured it. We scanned 5,477 firmware images covering 2.3M+ UEFI modules with the Binarly Transparency Platform. The results are… 🔥 🧵👇 https://t.co/pZJbbgE2GV
Tweet card summary image
binarly.io
Software mitigations play a critical role in the quest to secure the digital world. Shortly after the discovery and the rise of buffer overflows in the 90s, mitigations were introduced in the...
1
12
18
@pr0me
lukas seidel
25 days
TIL about Patina, an effort to implement core UEFI firmware components in Rust the project has a very nice github page, incl. UEFI memory safety case studies, and a view on how / where Rust can help mitigate such issues
@pagabuc
Fabio Pagani
25 days
First recommended talk is "Patina: UEFI in Rust" by Michael Kubacki (Microsoft). They are rewriting UEFI firmware in Rust to eliminate memory safety issues and more. Really curious to see how this effort evolves and how it'll impact IBVs, OEMs and the ecosystem in general.
1
3
13
@pagabuc
Fabio Pagani
25 days
Second recommendation (again from Microsoft): "Secure Boot: Lessons Learned and What’s Next" by Sochi Ogbuanya and Doug Flick. Great behind-the-scene look into how Microsoft is rolling out the new UEFI CA 2023 certificates. Looks trivial on paper (“just add a cert to db”), but in
0
0
2
@pagabuc
Fabio Pagani
25 days
First recommended talk is "Patina: UEFI in Rust" by Michael Kubacki (Microsoft). They are rewriting UEFI firmware in Rust to eliminate memory safety issues and more. Really curious to see how this effort evolves and how it'll impact IBVs, OEMs and the ecosystem in general.
1
1
6
@pagabuc
Fabio Pagani
25 days
We presented "Signed and Dangerous: BYOVD Attacks on Secure Boot" and "Repeatable Supply Chain Security Failures in Firmware Key Management", with latest data from the ecosystem, providing fresh insights into these issues and their impact:
1
0
4
@pagabuc
Fabio Pagani
25 days
Just got back from @osfc_io and @UEFIForum DevCon! Here’s a quick thread on our @binarly_io contributions and a few of my favorite presentations🧵
1
7
11
@binarly_io
BINARLY🔬
29 days
⛓️‍Tomorrow, Binarly REsearch is presenting the second talk "Repeatable Supply Chain Security Failures in Firmware Key Management". 🔑 Recurring issues with leaked, expired, or test signing keys used in production firmware. More details: https://t.co/hTQBsy2bI4
1
9
18
@dwizzzleMSFT
David Weston (DWIZZZLE)
30 days
Microsoft just open sourced a Rust implementation of UEFI boot firmware called "Patina" this is a MASSIVE step forward in improving boot security for all. Exciting!!! https://t.co/xDXwBKyfFD
Tweet card summary image
github.com
Patina Firmware. Contribute to OpenDevicePartnership/patina development by creating an account on GitHub.
8
83
273
@binarly_io
BINARLY🔬
1 month
⚡️Binarly REsearch excited to present “Signed and Dangerous: BYOVD Attacks on Secure Boot” at the UEFI 2025 Developers Conference & Plugfest! @pagabuc More details: https://t.co/13b6KKIIwd
0
7
17