Claudiu-Vlad Ursache
@ursachec
Followers
621
Following
2K
Media
10
Statuses
224
software engineer & security researcher @binarly_io
Berlin, Germany
Joined March 2010
I built a program analysis tool which identifies cryptographic algorithms in Java bytecode and wrote about it. Core logic backed by Joern and Code Property Graphs. Hat tip for the great tech @fabsx00, and shout-out to @xorpse and @yeggorv for the support
🚀 New Release: Cryptographic Algorithm Identification in Java Bytecode. Our new analyzer scans JARs (and soon Android packages) to uncover algorithm usage, provide reachability insights, and report NIST 8457 compliance. Dive into the details:
0
6
13
⚡️UEFI system firmware still has a mitigation gap, and we measured it. We scanned 5,477 firmware images covering 2.3M+ UEFI modules with the Binarly Transparency Platform. The results are… 🔥 🧵👇 https://t.co/pZJbbgE2GV
binarly.io
Software mitigations play a critical role in the quest to secure the digital world. Shortly after the discovery and the rise of buffer overflows in the 90s, mitigations were introduced in the...
1
12
18
Great work @ant_av7 👇
🚨Binarly REsearchers revisit an already-patched Supermicro BMC bug and discover two new high-impact vulnerabilities that expose major gaps in software supply chains. CVE-2025-7937: bypassed “fix” for CVE-2024-10237. CVE-2025-6198: Supermicro RoT bypass. https://t.co/AkLhM9Z5SU
0
6
14
I'm pleased to announce a new release of the Rust bindings for @HexRaysSA IDA SDK! This release includes v9.2 compatibility, and a number of new features and fixes. Code: https://t.co/h1HJUxe45z Thank you to our contributors: @withzombies Cole Leavitt @IrateWalrus @yeggorv
github.com
Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib - binarly-io/idalib
0
18
60
Today I have a more serious topic than usual, please consider reposting for reach: My wife and I are urgently looking for a specialist in neuropediatrics or a similar field for our autistic child with a diagnosed, but not further specified, movement disorder [1/3]
3
112
70
Nvidia OSR (@AlexTereshkin, @Adam_pi3) reveals high-impact Supermicro BMC vulnerabilities (CVE-2024-10237/38/39). Binarly REsearch documenting the details: 👻Ghost in the Controller: Abusing Supermicro BMC Firmware Verification. Read the full story: https://t.co/uzMnkdXflY
1
21
28
🚨𝗡𝗲𝘄 𝗛𝗶𝗴𝗵-𝗦𝗲𝘃𝗲𝗿𝗶𝘁𝘆 𝗩𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝘆 𝗶𝗻 𝗔𝗠𝗜-𝗕𝗮𝘀𝗲𝗱 𝗗𝗲𝘃𝗶𝗰𝗲𝘀 Our Deep Vulnerability Analysis (DVA) technology has automatically uncovered a high-impact vulnerability (CVE-2025-33043) in the AMI MicrocodeUpdate module that's impacting the
0
20
31
⛓️💥Our latest CVE-2025-3052 discovery started with a strange UEFI module on VT. Signed in 2022, uploaded in 2024, trusted by default on almost every system. ✸RE blog: https://t.co/2A9nMJ81jC ✸BRLY advisory: https://t.co/179phA2Oz2 ✸CERT/CC bulletin: https://t.co/VSbKD9Yaqz
2
17
19
🔎From Hidden Semantics to Structured Insights✨ By combining static analysis techniques and tailored heuristic improvements, we've significantly enhanced the precision of type inference, enabling more effective vulnerability triage. @pr0me @xorpse 👏 https://t.co/W0qoyPRmPn
1
14
32
Boot Guard keys keep dripping into the wild: 🔐MSI, LC/FC, Clevo leaks mean some 2025 devices still boot with compromised hardware-fused hashes. Remediation? Not easy when the fuse is one-way. Details in the new Binarly REsearch blog. https://t.co/hTQBsy1DSw
0
11
19
the recording of my talk "Rethinking Emulation for Fu(zzi)n(g) and Profit: Near-Native Rehosting for Embedded ARM Firmware" is online! I had an absolute blast speaking and being at @REverseConf, so many great talks and hallway discussions
We were slow with the last video update so we figured we'd do a two for one! Lukas talks about rehosting firmware for fuzzing ( https://t.co/fqX8Kuv8Y0) and Robin shows off a fantastic new tool for exploring code relationships beyond single binaries ( https://t.co/9DhK6bt9vU)
1
9
79
Wrote a short technical note on building LLVM plugin using Bazel https://t.co/K89JiQ7ZJc
lowlevelbits.com
Technical note on how to build an LLVM plugin using Bazel
0
1
6
My presentation slides "UEFI Bootkit Hunting: In-Depth Search for Unique Code Behavior" @REverseConf are available online
github.com
Contribute to binarly-io/Research_Publications development by creating an account on GitHub.
4
83
229
I had a blast speaking and being at @REverseConf! so many cool people and great discussions on firmware, fuzzing, ai and binary analysis if you want to find out more about firmware rehosting or are an enjoyer of ascii diagrams, check out the slides to my talk below :)
3
15
93
We @binarly_io are pleased to announce a new release of our Rust bindings for @HexRaysSA IDA Pro ( https://t.co/qJpzfeirzt) with support for the latest v9.1 release! Special thanks to @yeggorv for taking care of the changes needed to make everything compatible with this release!
0
15
25
how to gain code execution on millions of people and hundreds of popular apps and of course, firebase was (partially) the cause https://t.co/U7j7YcYS18
104
289
3K
🦀Rust meets IDA! Binarly’s idalib Rust binding by Sam Thomas take 🥉 place in the @HexRaysSA Annual Plugin Contest, proving that memory-safe tooling is the future of reverse engineering. 🏆Congrats to all the winners and @xorpse! https://t.co/PLoNkf7V0P
github.com
Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib - binarly-io/idalib
0
31
88
🚨Secure Boot relies on revocation lists (dbx) to block malicious bootloaders, but discrepancies between the @UEFIForum & @Microsoft lists create security gaps. 👉Call for a single and openly maintained revocation list -- a unified source of truth! https://t.co/WmegZKFPQV
2
29
41
happy new year everyone 🎉 to continue the tradition, here is some of my favorite firmware & embedded security research of 2024: Defeating the new Raspberry Pi's RP2350 Security Features [1] Reversing and Hacking Firmware of an in-orbit Satellite to Re-establish Lost
1
20
63