Latest revision |
Your text |
Line 1: |
Line 1: |
| | |
| | |
| {{Person | | {{Person |
| |nickname=barbieauglend | | | nickname = barbieauglend |
| |email=barbieauglend@chaosdorf.de | | | email = barbieauglend@chaosdorf.de |
| |matrix_nick=barbie
| | | twitter = @barbieauglend |
| |matrix_server=fachschaften.org
| | | github = @barbieauglend |
| |telegram=barbieauglend
| | | has_memberbox = true |
| |mastodon_nick=barbie
| |
| |mastodon_server=chaos.social
| |
| |twitter=barbieauglend | |
| |github=barbieauglend | |
| |blog=https://barbieauglend.re
| |
| |has_memberbox=Yes | |
| }} | | }} |
| | |
| [[File: barbieauglend.jpg |right|thumb|me]] | | [[File: barbieauglend.jpg |right|thumb|me]] |
|
| |
|
| == Me ==
| | Hello World! |
| | Maybe you want to come back later, this page is under construction! |
|
| |
|
| I’m just another ‘tete-de-noeud’ in this world. I love astro- and solid state physics, rock climbing, reversing, malware, x86, SMM (?), side-channels, dancing, karaoke and the mountains.
| | == Projects == |
| | | * [[52455645525345]] - Reverse Engineering Workshop |
| You can find me storming things around during working hours and staring at binaries at night <3
| | * [[Assembly_x86]] |
| | |
| == Projects @ Chaosdorf == | |
| | |
| === [[52455645525345]] - Reverse Engineering Group ===
| |
| | |
| Reverse Engineering is fun! It's like a puzzle and if there is an algorithm out there that can solve this puzzle, it's your brain. =)
| |
| I, {{U|barbieauglend}}, would love to take a look at compiled binaries with you and figure out together what the programs do. They are often a lot easier than you might think! If you are interested in RE, join us!
| |
| | |
| === [[Assembly_x86]] - x86 Group ===
| |
| | |
| We notice that a low level curiosity was there and it helps a lot to understand how Intel processors work, if one is interest in reverse engineering, compiler design, code optimization or OS design. I suggested another afternoon/evening working in the low level computing mechanisms of the Intel processors, understanding the Intel architecture and talking about the x86 assembly language. I expect a lot of fun and... that we are all able to understand at least the 20 most common x86 instructions. If you are interested in the x86 ISA, again, join us!
| |
| | |
| === [[Security-foo]] - Security-foo ===
| |
| | |
| Mentor for platform security topics on Linux based environments. Come build, break, and fix stuff with us :)
| |
| | |
| == IRL==
| |
|
| |
|
| | == Talks & More == |
| * [https://wiki.chaosdorf.de/Freitagsfoo/2017-05-19 Do you WNCRY?] | | * [https://wiki.chaosdorf.de/Freitagsfoo/2017-05-19 Do you WNCRY?] |
| * [http://blog.deepsec.net/bsideslondon-2017-sharing-indeed-caring/ On BSidesLondon 2017] | | * [http://blog.deepsec.net/bsideslondon-2017-sharing-indeed-caring/ On BSidesLondon 2017] |
Line 44: |
Line 26: |
| * [https://wiki.chaosdorf.de/images/b/b9/Barbie_slides_wout.pdf H2HC2017 Sao Paulo (Slides)] | | * [https://wiki.chaosdorf.de/images/b/b9/Barbie_slides_wout.pdf H2HC2017 Sao Paulo (Slides)] |
| * [https://www.blackhoodie.re/archive/ #Blackhoodie17 Luxembourg] | | * [https://www.blackhoodie.re/archive/ #Blackhoodie17 Luxembourg] |
| * [https://chaosdorf.de/~barbieauglend/Analysing-compiled-binaries-using-logic.pdf VB2018 Paper on Using automated Theorem Proving to Analyze Malware]
| |
| * [https://chaosdorf.de/~barbieauglend/final_preso.pdf and the full slide deck]
| |
| * [https://www.youtube.com/watch?v=GMr1rK-Gsdo&feature=youtu.be Automated Exploit Generation (in pt_br)]
| |
| * [https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+RE3201_symexec+2021_V1/about Symbolic Analysis free on-demand course]
| |
| * [https://community.intel.com/t5/Blogs/Products-and-Solutions/Security/Chips-Salsa-Episode-29-STORM-team-with-Thais-Moreira/post/1411966 /me interviewed at work]
| |
| * [https://amw.org/wp-content/uploads/2023/05/prog23edit2.pdf CPU Shenanigans at Asilomar Microcomputer Workshop]
| |
| * [https://arxiv.org/pdf/2306.16391.pdf Power side-channels on fruity devices]
| |
|
| |
|
| == Can be also found == | | == Can be also found == |
|
| |
| * [https://www.twitter.com/barbieauglend Twitter] | | * [https://www.twitter.com/barbieauglend Twitter] |
| * [https://barbieauglend.re/ My pink logical world] | | * [https://barbieauglend.re/ My pink logical world] |
| * PGP-key B531FCBF | | * PGP-key B531FCBF |