rene_mobile’s avatarrene_mobile’s Twitter Archive—№ 4,958

    1. This is one of the first attempts to systematically classify hardware vulnerabilities on that level that I am aware of - excellent talk! @benadida/1089970781981880325
  1. …in reply to @rene_mobile
    ... and using symbolic execution to automatically find exploits for identified hardware/CPU vulnerabilities.