@doas_matroshkya Profile picture

Sohom Datta

@doas_matroshkya

PhD student NCSU, CS'23 Manipal, open-source dev working on VisibleV8, Wikimedia

Similar User
sanchit photo

@sanchitrckbttm

Aman Priyanshu photo

@AmanPriyanshu6

ankita.v photo

@an_kitna

Supriti Vijay photo

@SupritiVijay

Harsh Singh Rathore photo

@thisis_hsr

Sanzz photo

@sanyasingla15

aaylmao photo

@aaylmaooo

Naman Joshi photo

@imniminjoshi

Rajat Agarwal photo

@rajat18agarwal

RT photo

@surroorian

Bunny photo

@bunnypanwar

swadhin photo

@routrayswadhin

Shamanth R Nayak photo

@nayak_shamanth

Ankit photo

@dhaniyapattaa

pinky photo

@osheeeeeeeeen

Sohom Datta Reposted

I’m recruiting PhD students interested in system security/privacy, trustworthy ML, @UCLA ECE/CS for Fall 2025! Please reach out via email anytime or find me at @acm_ccs next week. Retweets are greatly appreciated!


Sohom Datta Reposted

I’m planning to hire 2 PhD students in Fall25 at @KhouryCollege! How do we make privacy easier for people? How do we address people’s real privacy needs objectively and subjectively? How does AI play a role in introducing and mitigating risks? Talk to me at #UIST2024 #HCOMP2024


Sohom Datta Reposted

How does it feel like to do world-class research? If you are a CS undergrad who is interested in our topics, the Software Security group at #MPI_SP is hiring interns for summer & winter 2025! Details: 📅 01 November 2024 ✍️ cis.mpg.de/internships/ 🛡️ mpi-softsec.github.io


Sohom Datta Reposted

We've had to block what we assume are ai companies spamming our APIs instead of downloading our freely available database dumps over here at Wikipedia


Sohom Datta Reposted

Are you into hypervisor security and fuzzing? Consider applying for a PhD position in my group. More info: ali-abbasi.info


Sohom Datta Reposted

i’ll never stop messing with companies 💖

Tweet Image 1

A quick way to check if this is enabled: Run the following in the developer console ``` await chrome.runtime.sendMessage( 'nkeimhogjdpnpccoofpliimaahmaaome', { method: 'cpu.getInfo' } ); ``` on meet.google.com, if it comes back with info, it's enabled.

Tweet Image 1

So, Google Chrome gives all *.google.com sites full access to system / tab CPU usage, GPU usage, and memory usage. It also gives access to detailed processor information, and provides a logging backchannel. This API is not exposed to other sites - only to *.google.com.



Sohom Datta Reposted

🚫 DOM XSS, begone! 👋 Discover how we used Trusted Types to protect AppSheet, and how that can inform your own web application's journey to a safer security posture where DOM XSS vulnerabilities are a thing of the past. bughunters.google.com/blog/603789066…


Sohom Datta Reposted

The award-winning Qualys Threat Research Unit (TRU) has discovered a critical vulnerability in OpenSSH, designated CVE-2024-6387 and aptly named "regreSSHion." This Remote Code Execution bug grants full root access, posing a significant exploitation risk. blog.qualys.com/vulnerabilitie…


Sohom Datta Reposted

Google stated that "In 2024, less than 1% of all installs from the Chrome Web Store were found to include malware". But how big is this 1% exactly? You can check it out by reading our @ASIACCS2024 paper arxiv.org/pdf/2406.12710 & attending @SherylHsu02 talk on July 4! CC @CISPA

280 Million Google Chrome Users Installed Dangerous Extensions, Study Says trib.al/NJLg1FH



Sohom Datta Reposted

The libarchive e8 vulnerability is actually really cool, but the ZDI advisory doesn't explain why it's so wild lol. For some reason, I know about RAR filters, so let me provide the background. 🧵 1/n


Sohom Datta Reposted

Our second keynote speaker for #SecWeb2024 will be Prof. Alexandros Kapravelos @kapravel from NC State! He will present "Unveiling Web Threats: Insights from JavaScript Behavior". See you in San Francisco on May 23rd! @IEEESSP @blueminimal


Sohom Datta Reposted

I love how you can see literally see the level of exasperation from the maintainers grow over time

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

Sohom Datta Reposted

“But social engineering requires skill”. Wrong. It requires you to be a bigger asshole than your victim. The only “skill” you need is to ignore all empathy. That’s what I love about hacking. It doesn’t require a human victim to still be fun. Just pure technical skill.


Sohom Datta Reposted

Hi all! I'm looking to hire research interns for the Summer/Fall 2024 to work with me at MPI-SP in Bochum, Germany, research the harms of emerging technologies. More information can be found at mhaidli.github.io/workingwithabr…. Please share among your networks!


Sohom Datta Reposted

The xz fiasco has shown how a dependence on unpaid volunteers can cause major problems. Trillion dollar corporations expect free and urgent support from volunteers. @Microsoft @MicrosoftTeams posted on a bug tracker full of volunteers that their issue is "high priority"

Tweet Image 1

Sohom Datta Reposted

Jia Tan's git commit to turn off Landlock sandboxing one week after Lasse Collin improved it. I understand the sandbox is for xz, the command line tool, and Jia did not need to disable it for the SSHD backdoor. 🤔The xz command also activates the backdoor?

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.