I will release a blog post sometime after both conferences have passed. I believe videos for the talks will also be published after a few months.
I will release a blog post sometime after both conferences have passed. I believe videos for the talks will also be published after a few months.
Another collision: the Thalium team from Thales Group needed 3 bugs to exploit the Phillips Hue Bridge, but only their heap based buffer overflow was unique. The others were seen earlier in the contest. They still earn $13,500 and 2.75 Master of Pwn points. #Pwn2Own
๐ก Lights on! The Thalium Team demonstrated their mastery of the Phillips Hue Bridge by changing the color of a connected light. They head off to the disclosure room to illuminate us on how they did it. #Pwn2Own
Excited to share that I will be presenting my research on a Kindle vulnerability chain at Black Hat Europe 2025 and CODE BLUE 2025. See you in London/Tokyo :)
I recently solved the SSTIC 2025 challenge. A detailed writeup is available on my blog: face.0xff.re/posts/sstic-...
Recently finished an internship at Thales where I worked on binary deobfuscation using LLVM.
Here's a brief summary:
blog.thalium.re/posts/llvm-p...