@J_jaey0ung Profile picture

J-jaeyoung

@J_jaey0ung

SNUCSE'18

J-jaeyoung Reposted

An EPYC escape: Case-study of a KVM breakout googleprojectzero.blogspot.com/2021/06/an-epy…


J-jaeyoung Reposted

Also, I've made Intel CET bypass challenge, where you have to bypass both Shadow Stack and Indirect Branch Tracking on Linux userland

Tweet Image 1
Tweet Image 2

J-jaeyoung Reposted

Some challenges and infra code for AIxCC were released today, with more challenges scheduled for Monday! github.com/aixcc-public Assuming all the challenges we solved are released, we'll publish the POVs and patches our CRS made as well :)


J-jaeyoung Reposted

Blog Series on Android Bytecode Exploitation lolcads.github.io/tags/bytecode/


J-jaeyoung Reposted

0-Day Insights - Deep Dive: Qualcomm MSM Linux Kernel & ARM Mali GPU 0-day Exploit Attacks of October 2023 zerodayengineering.com/insights/qualc… (by @alisaesage)


J-jaeyoung Reposted

The changes to the IDAPython API in IDA 9 has broken some plugins and scripts I wrote/use. Here's how to fix some of these issues: blog.junron.dev/IDAPython%20Re…


J-jaeyoung Reposted

CVE-2024-41928: VM escape in FreeBSD's bhyve hypervisor via TPM device passthrough, by @Synacktiv freebsd.org/security/advis…


J-jaeyoung Reposted

✍️ URB-Excalibur: The New VMWare All-Platform VM Escapes by @danis_jiang @0x140ce static1.squarespace.com/static/5f3c747…

Tweet Image 1
Tweet Image 2
Tweet Image 3

J-jaeyoung Reposted

#exploit 1. CVE-2020-27786: UaF + Race Condition in MIDI devices in Linux Kernel 5.6x ii4gsp.github.io/cve-2020-27786 2. CVE-2018-14714: ASUS RT-AC3200 WiFi router RCE github.com/BTtea/CVE-2018…


J-jaeyoung Reposted

🚨 New Linux Kernel vulnerability (CVE-2024-27394) discovered & patched by Theori! 🔗 blog.theori.io/deep-dive-into… Our researcher @v4bel at #Theori identified a critical #UAF vulnerability in TCP-AO caused by a race condition in the #RCU API. Using techniques from the ExpRace paper,…


J-jaeyoung Reposted

Extremely happy that our paper "Moneta: Ex-Vivo GPU Driver Fuzzing by Recalling In-Vivo Execution States" has been accepted for publication @NDSSSymposium 2025. @tudelft @DistriNet @yonsei_u

Tweet Image 1

J-jaeyoung Reposted

#exploit 1. CVE-2024-20017: MediaTek wappd Buffer Overflow blog.coffinsec.com/0day/2024/08/3… 2. CVE-2023-41111: Samsung Baseband RLC Data Re-Assembly Buffer Overflow labs.taszk.io/blog/post/93_r…


J-jaeyoung Reposted

SSD Advisory — Linux kernel TAPRIO OOB An article about exploiting an RCU-involved race condition in the TAPRIO network queuing discipline implementation. The exploit is by @ky1ebot ssd-disclosure.com/ssd-advisory-l…

Tweet Image 1

J-jaeyoung Reposted

For those into UEFI firmware reverse engineering - we released a blog post last week that you might be enjoy. binary.ninja/2024/08/23/uef…


J-jaeyoung Reposted

Linux kernel Rust documentation is now available lore.kernel.org/all/CANiq72nSw…


J-jaeyoung Reposted

Best research of Windows IPv6 RCE bug that I've seen so far: github.com/ynwarcs/CVE-20… (by ynwarcs). Still plenty of room for exploit development


J-jaeyoung Reposted

Oh, it seems the video of my NDSS keynote is now online: youtube.com/watch?v=vhj2We… "Corrupted Memories of Memory Corruption: Offensive Security, Academia, and the Rest of the World"


J-jaeyoung Reposted

Excited to share our research on Kernel Streaming! We discovered several vulnerabilities in it that we used at Pwn2Own this year. Check it out: devco.re/blog/2024/08/2…


United States Trends
Loading...

Something went wrong.


Something went wrong.