rene_mobile’s avatarrene_mobile’s Twitter Archive—№ 4,956

  1. This is one of the first attempts to systematically classify hardware vulnerabilities on that level that I am aware of - excellent talk! @benadida/1089970781981880325
    1. …in reply to @rene_mobile
      ... and using symbolic execution to automatically find exploits for identified hardware/CPU vulnerabilities.