No edit summary |
(Adding some links to latest stuff) |
||
(24 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
{{Person | |||
|nickname=barbieauglend | |||
|email=barbieauglend@chaosdorf.de | |||
|matrix_nick=barbie | |||
|matrix_server=fachschaften.org | |||
|telegram=barbieauglend | |||
|mastodon_nick=barbie | |||
|mastodon_server=chaos.social | |||
|twitter=barbieauglend | |||
|github=barbieauglend | |||
|blog=https://barbieauglend.re | |||
|has_memberbox=Yes | |||
}} | |||
[[File: barbieauglend.jpg |right|thumb|me]] | |||
== Me == | |||
I’m just another ‘tete-de-noeud’ in this world. I love astro- and solid state physics, rock climbing, reversing, malware, x86, SMM (?), side-channels, dancing, karaoke and the mountains. | |||
You can find me storming things around during working hours and staring at binaries at night <3 | |||
== Projects @ Chaosdorf == | |||
=== [[52455645525345]] - Reverse Engineering Group === | |||
{{ | Reverse Engineering is fun! It's like a puzzle and if there is an algorithm out there that can solve this puzzle, it's your brain. =) | ||
| | I, {{U|barbieauglend}}, would love to take a look at compiled binaries with you and figure out together what the programs do. They are often a lot easier than you might think! If you are interested in RE, join us! | ||
=== [[Assembly_x86]] - x86 Group === | |||
We notice that a low level curiosity was there and it helps a lot to understand how Intel processors work, if one is interest in reverse engineering, compiler design, code optimization or OS design. I suggested another afternoon/evening working in the low level computing mechanisms of the Intel processors, understanding the Intel architecture and talking about the x86 assembly language. I expect a lot of fun and... that we are all able to understand at least the 20 most common x86 instructions. If you are interested in the x86 ISA, again, join us! | |||
=== [[Security-foo]] - Security-foo === | |||
Mentor for platform security topics on Linux based environments. Come build, break, and fix stuff with us :) | |||
== IRL== | |||
[[ | * [https://wiki.chaosdorf.de/Freitagsfoo/2017-05-19 Do you WNCRY?] | ||
* [http://blog.deepsec.net/bsideslondon-2017-sharing-indeed-caring/ On BSidesLondon 2017] | |||
* [https://www.tripwire.com/state-of-security/off-topic/women-information-security-thais/ On Tripwire and Hackernoon Interview] | |||
* [https://wiki.chaosdorf.de/Freitagsfoo/2017-10-13 CrashOverride] | |||
* [https://youtu.be/cyr_4_rN4pY Hack.lu Luxembourg 2017 (Video)] | |||
* [https://wiki.chaosdorf.de/images/b/b9/Barbie_slides_wout.pdf H2HC2017 Sao Paulo (Slides)] | |||
* [https://www.blackhoodie.re/archive/ #Blackhoodie17 Luxembourg] | |||
* [https://chaosdorf.de/~barbieauglend/Analysing-compiled-binaries-using-logic.pdf VB2018 Paper on Using automated Theorem Proving to Analyze Malware] | |||
* [https://chaosdorf.de/~barbieauglend/final_preso.pdf and the full slide deck] | |||
* [https://www.youtube.com/watch?v=GMr1rK-Gsdo&feature=youtu.be Automated Exploit Generation (in pt_br)] | |||
* [https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+RE3201_symexec+2021_V1/about Symbolic Analysis free on-demand course] | |||
* [https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-29-STORM-team-with-Thais-Moreira/post/1411966 /me interviewed at work] | |||
* [https://amw.org/wp-content/uploads/2023/05/prog23edit2.pdf CPU Shenanigans at Asilomar Microcomputer Workshop] | |||
* [https://arxiv.org/pdf/2306.16391.pdf Power side-channels on fruity devices] | |||
== Can be also found == | |||
* [https://www.twitter.com/barbieauglend Twitter] | |||
* [ | * [https://barbieauglend.re/ My pink logical world] | ||
* [ | * PGP-key B531FCBF |
Latest revision as of 20:19, 12 August 2023
barbieauglend | |
---|---|
barbieauglend@chaosdorf.de | |
Matrix | @barbie:fachschaften.org |
Telegram | @barbieauglend |
Mastodon | @barbie@chaos.social |
@barbieauglend | |
GitHub | barbieauglend |
Blog | https://barbieauglend.re |
Me[edit | edit source]
I’m just another ‘tete-de-noeud’ in this world. I love astro- and solid state physics, rock climbing, reversing, malware, x86, SMM (?), side-channels, dancing, karaoke and the mountains.
You can find me storming things around during working hours and staring at binaries at night <3
Projects @ Chaosdorf[edit | edit source]
52455645525345 - Reverse Engineering Group[edit | edit source]
Reverse Engineering is fun! It's like a puzzle and if there is an algorithm out there that can solve this puzzle, it's your brain. =) I, barbieauglend, would love to take a look at compiled binaries with you and figure out together what the programs do. They are often a lot easier than you might think! If you are interested in RE, join us!
Assembly_x86 - x86 Group[edit | edit source]
We notice that a low level curiosity was there and it helps a lot to understand how Intel processors work, if one is interest in reverse engineering, compiler design, code optimization or OS design. I suggested another afternoon/evening working in the low level computing mechanisms of the Intel processors, understanding the Intel architecture and talking about the x86 assembly language. I expect a lot of fun and... that we are all able to understand at least the 20 most common x86 instructions. If you are interested in the x86 ISA, again, join us!
Security-foo - Security-foo[edit | edit source]
Mentor for platform security topics on Linux based environments. Come build, break, and fix stuff with us :)
IRL[edit | edit source]
- Do you WNCRY?
- On BSidesLondon 2017
- On Tripwire and Hackernoon Interview
- CrashOverride
- Hack.lu Luxembourg 2017 (Video)
- H2HC2017 Sao Paulo (Slides)
- #Blackhoodie17 Luxembourg
- VB2018 Paper on Using automated Theorem Proving to Analyze Malware
- and the full slide deck
- Automated Exploit Generation (in pt_br)
- Symbolic Analysis free on-demand course
- /me interviewed at work
- CPU Shenanigans at Asilomar Microcomputer Workshop
- Power side-channels on fruity devices
Can be also found[edit | edit source]
- My pink logical world
- PGP-key B531FCBF