domas Profile
domas

@xoreaxeaxeax

Followers
9K
Following
0
Media
15
Statuses
38

// hacker math & stuff // M/o/Vfuscator // sandsifter // project:rosenbridge // ..cantor.dust.. // REpsych // the memory sinkhole // nightshyft //

Joined April 2015
Don't wanna be here? Send us removal request.
@xoreaxeaxeax
domas
7 years
GOD MODE UNLOCKED: hardware backdoors in some x86 CPUs https://t.co/Ph0IAL0Pyw White paper coming tomorrow. @BlackHatEvents
41
2K
3K
@xoreaxeaxeax
domas
8 years
So is branchless computation hardened against #spectre and #meltdown? Here's a secure, branchless DOOM ... 7 hours in, 1 frame rendered. https://t.co/QyeQ7g4ojS
16
293
598
@BlackHatEvents
Black Hat
8 years
VIDEO: “Breaking the x86 Instruction Set” by @xoreaxeaxeax #BHUSA 2017 Briefing presentation
7
95
202
@xoreaxeaxeax
domas
8 years
sandsifter results: secret instructions; bugs in IDA, gdb, VS, valgrind, capstone, qemu; flaws in hypervisors; critical hardware locks; etc.
4
32
86
@xoreaxeaxeax
domas
8 years
new project: sandsifter x86 processor fuzzer; exposes hidden instructions in x86; https://t.co/pefTtuHt88
5
217
418
@xoreaxeaxeax
domas
8 years
I'll be demonstrating the first x86 'killer poke' instruction found in 20 years at #BHUSA next week; processor DoS from ring 3
3
23
76
@xoreaxeaxeax
domas
9 years
copy/paste/search/replace are turing-complete so, brainf@!# interpreter, in vanilla vim. https://t.co/ZVaGr1eGfz
0
57
101
@xoreaxeaxeax
domas
10 years
Hmm. All programs reduce to the same instruction stream. Left, AES; right, Minesweeper. https://t.co/guE7JhoIaI
4
88
144
@xoreaxeaxeax
domas
10 years
and the randomfuscator just randomly throws crap together: https://t.co/p3WyNnMZHX (HT @angealbertini @f4grx) http://t.co/DsnESKsfsj
3
24
35
@xoreaxeaxeax
domas
10 years
and of course, the cmpxchgxchgfuscator... https://t.co/tDCIa6EmLZ http://t.co/553WLyZTfP
1
19
37
@xoreaxeaxeax
domas
10 years
XADD-, SBB-, ADC-, and PUSH/POP- fuscators...
0
8
20
@xoreaxeaxeax
domas
10 years
the rrrrrrfuscator compiles C to 1-bit shifts... https://t.co/IAVumbvp0p http://t.co/MmZogx4MuQ
1
20
41
@xoreaxeaxeax
domas
10 years
0
20
25
@xoreaxeaxeax
domas
10 years
the ADDfuscator was a little tricky: https://t.co/Fydxl6jURi http://t.co/BATtF2Tihk
1
14
30
@xoreaxeaxeax
domas
10 years
x86 SUB is turing complete, so here's the SUBfuscator - compiles C into subs, and only subs: https://t.co/mFKtnvt7eY http://t.co/VxZOu0XwbP
5
204
205
@xoreaxeaxeax
domas
10 years
x86 XOR is turing complete, so here's the XORfuscator - compiles C into xors, and only xors: https://t.co/qcDWHsjoK7 http://t.co/rAMILouCAU
22
929
903
@xoreaxeaxeax
domas
10 years
M/o/Vfuscator updated with instruction & register shuffling to prevent (simple) decompilation http://t.co/apsUd18JH3 http://t.co/79EEywEGaZ
1
74
76
@xoreaxeaxeax
domas
10 years
M/o/Vfuscator2 includes a mov-only floating point emulator. So I built a 3d graphics engine. Here's a spinning cube: http://t.co/Sr6Le7r5d0
2
42
48
@xoreaxeaxeax
domas
10 years
(i.e. how to talk to a reverse engineer) http://t.co/vj3lPxmDLN
5
38
65
@xoreaxeaxeax
domas
10 years
REpsych: steganography, obfuscation, and psychological warfare via control flow graph manipulation, now on github:
Tweet card summary image
github.com
Psychological warfare in reverse engineering. Contribute to xoreaxeaxeax/REpsych development by creating an account on GitHub.
0
51
64