![nSinus-R (@nsr@infosec.exchange) Profile](https://pbs.twimg.com/profile_images/1501932472/nsr_x96.jpg)
nSinus-R (@[email protected])
@nSinusR
Followers
2K
Following
601
Statuses
648
Captures flags with @TeamTasteless. Assistant Professor at @unibirmingham and maintainer of FirmWire & avatar2.
Joined August 2011
RT @REverseConf: SIM cards: more than just storage. Join Marius Muench (@nsinusr) & Tomasz Lisowski as they reveal SIM vulnerabilities, bas…
0
6
0
Results of the RP2350 Hacking Challenge are now public - I'm happy that my entry qualified as one of the winning breaks! Also huge shout out to the other winners: @aedancullen, Kévin Courdesses, @IOActive & @hextreeio - awesome work! Thanks for the challenge @Raspberry_Pi!
Security through transparency: all chips have vulnerabilities, and most vendors' strategy is not to talk about them. In contrast, we aim to find and fix them. Read the results of our RP2350 Hacking Challenge:
3
4
38
🚨Upcoming Training with @_ringzer0: Join @ScepticCtf and me to learn about reversing, fuzzing, and attacking low-level firmware. Austin, March 18th-21st. More information:
1
3
9
RT @REverseConf: Our 2025 RE//verse talk schedule is now live! Talks start Friday, but don't forget to check the Thursday schedule and arri…
0
44
0
RT @gynvael: Want to support security researchers from Dragon Sector in covering legal costs piling up after they went public with logic bo…
0
56
0
RT @AntiCheatPD: 🧵 New Anti-Cheat Study Highlights 👇 1/ reveals the hidden economics of game cheats, with annual revenues estimated betwee…
0
28
0
@kuychi_i @AntiCheatPD Heya, author of this study here. Thanks for your feedback, we excluded faceit here because it's a solution for esports and not for large-scale deployment/being shipped together with the games. That being said, it's super interesting to look at, so thanks again for your input.
0
0
4
Heya! Our new research on client-side game cheating & anti-cheat systems is out: Joint work with Sam Collins, Alex Poulopoulos, and @TomChothia. Full paper:
1
28
76
RT @hardwear_io: 📱 Even with newer cellular technologies available, GPRS stacks are still found in many phones, making them a bullseye for…
0
8
0
@lauriewired Also, parsing proactive commands turns out to be difficult. In recent research, we fuzzed the proactive interface and found memory corruptions in widely deployed basebands, abusable by hostile SIMs. More info & other examples of proactive capabilities:
Our paper "SIMurai: Slicing Through the Complexity of SIM Card Security Research" just went public! In this paper, we explore the question: What kind of attacks could a hostile SIM launch against your phone? Surprisingly, a lot.
0
4
61
RT @ScepticCtf: Training News: @nSinusR and I will give an online version of our embedded fuzzing training! Aug 19-24 with @_ringzer0. Che…
0
7
0
Excited to announce that we will present our latest work on baseband fuzzing at @BlackHatEvents USA this year! Join @dyonwg_ and me on a journey of fuzzing layer 2 and finding multiple critical OTA vulnerabilities! More info: See you in August!
1
12
51