User:Barbieauglend: Difference between revisions

151 editsJoined 30 November 2016
No edit summary
Line 43: Line 43:
* [https://chaosdorf.de/~barbieauglend/final_preso.pdf and the full slide deck]
* [https://chaosdorf.de/~barbieauglend/final_preso.pdf and the full slide deck]
* [https://www.youtube.com/watch?v=GMr1rK-Gsdo&feature=youtu.be Automated Exploit Generation (in pt_br)]
* [https://www.youtube.com/watch?v=GMr1rK-Gsdo&feature=youtu.be Automated Exploit Generation (in pt_br)]
* [https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-29-STORM-team-with-Thais-Moreira/post/1411966 /me interviewed at work]


== Can be also found ==
== Can be also found ==

Revision as of 01:43, 19 October 2022

barbieauglend
E-Mail barbieauglend@chaosdorf.de
Matrix @barbie:fachschaften.org
Telegram @barbieauglend
Mastodon @barbie@chaos.social
Twitter @barbieauglend
GitHub barbieauglend
Blog https://barbieauglend.re
me

Me

I’m just another ‘tete-de-noeud’ in this world. I love astro- and solid state physics, rock climbing, reversing, malware, x86, SMM (?), side-channels, dancing, karaoke and the mountains.

You can find me storming things around during working hours and staring at binaries at night <3

Projects @ Chaosdorf

52455645525345 - Reverse Engineering Group

Reverse Engineering is fun! It's like a puzzle and if there is an algorithm out there that can solve this puzzle, it's your brain. =) I, barbieauglend, would love to take a look at compiled binaries with you and figure out together what the programs do. They are often a lot easier than you might think! If you are interested in RE, join us!

Assembly_x86 - x86 Group

We notice that a low level curiosity was there and it helps a lot to understand how Intel processors work, if one is interest in reverse engineering, compiler design, code optimization or OS design. I suggested another afternoon/evening working in the low level computing mechanisms of the Intel processors, understanding the Intel architecture and talking about the x86 assembly language. I expect a lot of fun and... that we are all able to understand at least the 20 most common x86 instructions. If you are interested in the x86 ISA, again, join us!

Events

Can be also found