aurelsec
@aurelsec.bsky.social
310 followers 630 following 19 posts
Hackademic at S3@eurecom
Posts Media Videos Starter Packs
Reposted by aurelsec
Last chance to (self-) nominate for USENIX Security'26 Artifact Evaluation Committee!
You should expect a low load of ~1 artifact for functionality/reproducibility assessments per cycle (max 3 for the whole year).

Please support Open Science and fill the form by Oct 17: forms.gle/WoYRX4govNY1... 🚀
(Self-)Nomination for the USENIX Security '26 Artifact Evaluation Committee (AEC)
For the seventh year, USENIX Security allows the evaluation of artifacts that support a paper: software, hardware, evaluation data and documentation, raw measurement data, raw survey results, mechaniz...
forms.gle
Merci pour le post :)
Reposted by aurelsec
À #SecSea2k5 Aurélien Francillon d'Eurecom relate les expériences hallucinantes d'écoutes en reconnectant avec les documents NSA déclassifiés en parallèle 😁
✅ Bluetooth 😧
✅ JTAG fait tout fuiter "quand le 𝑗𝑖𝑡𝑡𝑒𝑟 révèle le calcul de la puce" 👏🏻
Génial 👍🏻
Reposted by aurelsec
Signal to leave EU rather than comply w/ Chat Control, which would scan all messages sent over end-to-end encrypted platforms. Vote on Chat Control's future Oct 14. Germany is the swing vote. Officials there opposed the measure in past but new govt silent re position
therecord.media/signal-calls...
Signal calls on Germany to vote against ‘Chat Control,’ saying it would leave EU market
The head of the Signal Foundation raised concerns around Germany now refusing to say whether it will support Chat Control in an upcoming vote.
therecord.media
Source: American Cryptology During the Cold War, 1945-1989 Book III: Retrenchment and Reform, 1972-1980 (declassified)
archive.org/details/cold...
Which I found thanks to this nice article by @hashbreather.bsky.social
blog.cr.yp.to/20251004-wea...
cr.yp.to: 2025.10.04: NSA and IETF
blog.cr.yp.to
Interesting story how DES 56 became a 56-bit key algorithm (while having a 64-bit block size):
"NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately, they compromised on a 56-bit key."
Reposted by aurelsec
"Bad news: The proposal is going forward to be voted on on October 14th, and there's still no blocking minority achieved, as Germany reverted its position to undecided.

Good news: There is still time to fight back!"

Shut this monstrosity down NOW
The battle to stop Chat Control continues, act now!
Unfortunately, the battle against Chat Control continues this month. For human rights, for civil liberties, for safety, and for democracy, this privacy-wrecking proposal must be stopped. We need your ...
www.privacyguides.org
Reposted by aurelsec
At long last - Phrack 72 has been released online for your reading pleasure!

Check it out: phrack.org
The table of contents for Phrack 72 from phrack.org
Reposted by aurelsec
Phrack 72 released today. phrack.org/issues/72/1

It got me thinking. I first read Phrack back in the 90's as I started hanging out on IRC (maybe '93 or '94?), as I was learning about FreeBSD and later, Linux. It must have been Phrack 43-45 where I started.

What a wild ride on the Internet.
.:: Phrack Magazine ::.
Phrack staff website.
phrack.org
Reposted by aurelsec
I reverse engineered Lockbit's Linux ESXi variant, also explaining how I did some of the steps! For the fun of it, cause reverse engineering is lots of fun. Enjoy!
hackandcheese.com/posts/blog1_...
Reposted by aurelsec
@blackhoodie.bsky.social will be at @sec-t.bsky.social on September 10th with a training on Linux Malware Reverse Engineering, for women by women! We have very few seats left 😁 blackhoodie.re/SecT2025/
Reposted by aurelsec
Discounted early bird registration for WOOT '25 is still open until Monday - www.usenix.org/conference/w... - join us in Seattle on Aug 11/12 (right before USENIX Security) for talks and discussions on great cutting-edge offensive security research. Full program at www.usenix.org/conference/w...
WOOT '25 Technical Sessions
www.usenix.org
Reposted by aurelsec
Our research on open tunneling servers got nominated for the Most Innovative Research award :)

The work will be presented by Angelos Beitis at Black Hat and also at USENIX Security

Brief summary and code: github.com/vanhoefm/tun...
Paper: papers.mathyvanhoef.com/usenix2025-t...
Reposted by aurelsec
Huge implications from this: Microsoft cut off the email of the chief prosecutor of the International Criminal Court, because of his work on Israel www.nytimes.com/2025/06/20/t...
Reposted by aurelsec
Two winners of the RP2350 Hacking Challenge will present their results at WOOT!

Muench et al. break its secure boot guarantees through voltage, electromagnetic, and laser fault injection 💥 techniques: www.usenix.org/conference/w...
Security through Transparency: Tales from the RP2350 Hacking Challenge | USENIXusenix_logo_notag_white
www.usenix.org
Reposted by aurelsec
Our OffensiveCon talk on stateful baseband emulation (and how improper string handling led to baseband RCE) is available on YouTube: youtu.be/zoAITq7jUM8. It has been a pleasure; awesome conference, brilliant people. Slides and paper: www.danielklischies.net/research/bas...
OffensiveCon25 - Daniel Klischies and David Hirsch
YouTube video by OffensiveCon
youtu.be
Reposted by aurelsec
Since mid-2024, Google has refused to reinstate the access Nextcloud needs for uploading and syncing other file types to its host-your-own cloud platform.
“Google wanted that”: Nextcloud decries Android permissions as “gatekeeping”
Without full file access, it’s kind of hard to use your own cloud.
arstechnica.com
Reposted by aurelsec
Haven't seen this on Bluesky yet: S&P 2027 will take place in Montreal, Canada!