Editing User:Barbieauglend

151 editsJoined 30 November 2016
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.

The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.

Latest revision Your text
Line 1: Line 1:
{{Person
{{Person
|nickname=barbieauglend
| nickname = barbieauglend
|email=barbieauglend@chaosdorf.de
| email = barbieauglend@chaosdorf.de
|matrix_nick=barbie
| twitter = @barbieauglend
|matrix_server=fachschaften.org
| github = @barbieauglend
|telegram=barbieauglend
| has_memberbox = true
|mastodon_nick=barbie
|mastodon_server=chaos.social
|twitter=barbieauglend
|github=barbieauglend
|blog=https://barbieauglend.re
|has_memberbox=Yes
}}
}}
[[File: barbieauglend.jpg |right|thumb|me]]
[[File: barbieauglend.jpg |right|thumb|me]]


== Me ==
Hello World!
Maybe you want to come back later, this page is under construction!


I’m just another ‘tete-de-noeud’ in this world. I love astro- and solid state physics, rock climbing, reversing, malware, x86, SMM (?), side-channels, dancing, karaoke and the mountains.
== Projects ==
 
* [[52455645525345]] - Reverse Engineering Workshop
You can find me storming things around during working hours and staring at binaries at night <3
* [[Assembly_x86]]  
 
== Projects @ Chaosdorf ==
 
=== [[52455645525345]] - Reverse Engineering Group ===
 
Reverse Engineering is fun! It's like a puzzle and if there is an algorithm out there that can solve this puzzle, it's your brain. =)
I, {{U|barbieauglend}}, would love to take a look at compiled binaries with you and figure out together what the programs do. They are often a lot easier than you might think! If you are interested in RE, join us!
 
=== [[Assembly_x86]] - x86 Group ===
 
We notice that a low level curiosity was there and it helps a lot to understand how Intel processors work, if one is interest in reverse engineering, compiler design, code optimization or OS design. I suggested another afternoon/evening working in the low level computing mechanisms of the Intel processors, understanding the Intel architecture and talking about the x86 assembly language. I expect a lot of fun and... that we are all able to understand at least the 20 most common x86 instructions. If you are interested in the x86 ISA, again, join us!
 
=== [[Security-foo]] - Security-foo ===
 
Mentor for platform security topics on Linux based environments. Come build, break, and fix stuff with us :)
 
== IRL==


== Talks ==
* [https://wiki.chaosdorf.de/Freitagsfoo/2017-05-19 Do you WNCRY?]
* [https://wiki.chaosdorf.de/Freitagsfoo/2017-05-19 Do you WNCRY?]
* [http://blog.deepsec.net/bsideslondon-2017-sharing-indeed-caring/ On BSidesLondon 2017]
* [https://securitybsideslondon2017.sched.com/event/AsqG/the-use-of-smt-solvers-in-it-security# BSidesLondon 2017]
* [https://www.tripwire.com/state-of-security/off-topic/women-information-security-thais/ On Tripwire and Hackernoon Interview]
* [https://wiki.chaosdorf.de/Freitagsfoo/2017-10-13 CrashOverride]
* [https://wiki.chaosdorf.de/Freitagsfoo/2017-10-13 CrashOverride]
* [https://youtu.be/cyr_4_rN4pY Hack.lu Luxembourg 2017 (Video)]
* [https://youtu.be/cyr_4_rN4pY Hack.lu Luxembourg 2017]
* [https://wiki.chaosdorf.de/images/b/b9/Barbie_slides_wout.pdf H2HC2017 Sao Paulo (Slides)]
* [https://wiki.chaosdorf.de/images/b/b9/Barbie_slides_wout.pdf H2HC2017 Sao Paulo (Slides)]
* [https://www.blackhoodie.re/archive/ #Blackhoodie17 Luxembourg]
* [https://chaosdorf.de/~barbieauglend/Analysing-compiled-binaries-using-logic.pdf VB2018 Paper on Using automated Theorem Proving to Analyze Malware]
* [https://chaosdorf.de/~barbieauglend/final_preso.pdf and the full slide deck]
* [https://www.youtube.com/watch?v=GMr1rK-Gsdo&feature=youtu.be Automated Exploit Generation (in pt_br)]
* [https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+RE3201_symexec+2021_V1/about Symbolic Analysis free on-demand course]
* [https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-29-STORM-team-with-Thais-Moreira/post/1411966 /me interviewed at work]
* [https://amw.org/wp-content/uploads/2023/05/prog23edit2.pdf CPU Shenanigans at Asilomar Microcomputer Workshop]
* [https://arxiv.org/pdf/2306.16391.pdf Power side-channels on fruity devices]


== Can be also found ==
== Can be also found ==
 
[https://www.twitter.com/barbieauglend Twitter]
* [https://www.twitter.com/barbieauglend Twitter]
* [https://barbieauglend.re/ My pink logical world]
* PGP-key B531FCBF
Please note that all contributions to Chaosdorf Wiki are considered to be released under the Attribution 3.0 Unported (see Chaosdorf Wiki:Copyrights for details). If you do not want your writing to be edited mercilessly and redistributed at will, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource. Do not submit copyrighted work without permission!
Cancel Editing help (opens in new window)