Emanuele Cozzi Profile
Emanuele Cozzi

@invano

Followers
751
Following
1K
Statuses
2K

malware&reversing

Francia
Joined June 2009
Don't wanna be here? Send us removal request.
@invano
Emanuele Cozzi
4 months
RT @nSinusR: Heya! Our new research on client-side game cheating & anti-cheat systems is out: Joint work with Sam…
0
28
0
@invano
Emanuele Cozzi
5 months
RT @NinjaLabFr: We are very excited to share our last research work: 𝐄𝐔𝐂𝐋𝐄𝐀𝐊, authored by Thomas Roche. An electromagnetic Side-Channel Vu…
0
106
0
@invano
Emanuele Cozzi
7 months
RT @packm4d: In a few minutes I will present our work on Android evasive malware to @ASIACCS2024 [1]. What better occasion to reveal that…
0
4
0
@invano
Emanuele Cozzi
8 months
RT @pagabuc: Excited to share (albeit with a little delay) that our @binarly_io talk about #LogoFAIL at BlackHat EU is available! Check it…
0
14
0
@invano
Emanuele Cozzi
10 months
RT @packm4d: We are setting up a user study to measure the impact of LLMs during the Reverse Engineering process. If you have ever used LL…
0
13
0
@invano
Emanuele Cozzi
11 months
RT @vxunderground: The xz situation is absolutely insane and almost certainly state sponsored. This is an excellent example of a widely us…
0
933
0
@invano
Emanuele Cozzi
11 months
RT @_revng: 🚀 BIG ANNOUNCEMENT! 🚀 The full rev.​ng decompiler pipeline is now fully open source! Also, we'll soon start to invite people t…
0
95
0
@invano
Emanuele Cozzi
1 year
RT @m_u00d8: Fuzzing is hard, evaluating fuzzing is harder 🔥 For our new @IEEESSP paper, we studied 150 fuzzing evals and found issues suc…
0
53
0
@invano
Emanuele Cozzi
1 year
RT @mahal0z: I'm about 50% done integrating SAILR into angr master: 🎉 P.S.: You can also use angr's decompiler mo…
0
19
0
@invano
Emanuele Cozzi
1 year
RT @_AkihiroSuda_: elfconv: AOT compiler for translating Linux/aarch64 ELF → LLVM bitcode → WASM By my colleague @ming_rrr
0
25
0
@invano
Emanuele Cozzi
1 year
RT @s4tan: Sono lieto di annunciare la disponibilità del primo corso di malware analysis in italiano: "Introduzione alla malware analysis:…
0
28
0
@invano
Emanuele Cozzi
1 year
RT @mahal0z: 2024 is the year of the decompiler! Start your year off right by reading a post on the last 30 years of decompilation and one…
0
96
0
@invano
Emanuele Cozzi
1 year
RT @ghidraninja: I just published the code and hardware for Tamarin-C, the iPhone 15 USB-C exploration tool I presented at #37c3. https://…
0
228
0
@invano
Emanuele Cozzi
1 year
RT @aurelsec: As WOOT becomes a more formal Conference, we want to keep receiving industry submissions! WOOT experiments a new model: in a…
0
33
0
@invano
Emanuele Cozzi
1 year
RT @lukOlejnik: They HACKED A TRAIN. For real. Train operators asked for this to see why their trains didn't run after servicing. Turns out…
0
901
0
@invano
Emanuele Cozzi
1 year
RT @tmpout: Check it out, it's tmp.0ut Volume 3!
Tweet media one
0
417
0
@invano
Emanuele Cozzi
1 year
RT @taviso: New write-up on an Intel Ice Lake CPU vulnerability, we can effectively corrupt the RoB with redundant prefixes! 🔥 An updated m…
0
355
0
@invano
Emanuele Cozzi
1 year
RT @mahal0z: I'm excited to announce a new decompilation control flow structuring algorithm, SAILR, which is the first to precisely revert…
0
83
0
@invano
Emanuele Cozzi
1 year
RT @i41nbeer: Earlier this year @AmnestyTech and @_clem1 from Google TAG found an in-the-wild iPhone zero day full chain. Today I’m publish…
0
114
0
@invano
Emanuele Cozzi
1 year
RT @AdmVonSchneider: In the spirit of "this talk could've been a tweet", I just pushed a button: #BinDiff is now open source. - Snapshot…
0
360
0