blog.quarkslab.com Open in urlscan Pro
163.172.43.202  Public Scan

Submitted URL: http://blog.quarkslab.com/
Effective URL: https://blog.quarkslab.com/
Submission: On January 17 via api from US — Scanned from FR

Form analysis 0 forms found in the DOM

Text Content

Quarkslab's blog
 * 
 * Android
 * Blockchain
 * Challenge
 * Containers
 * Cryptography
 * Exploitation
 * Fuzzing
    * Archives

Quarkslab's website

 * SOCIAL

 * atom feed
 * twitter
 * github

 * CATEGORIES

 * Android
 * Blockchain
 * Challenge
 * Containers
 * Cryptography
 * Exploitation
 * Fuzzing
 * Hardware
 * Kernel Debugging
 * Life at Quarkslab
 * Math
 * Pentest
 * Program Analysis
 * Programming
 * Reverse-Engineering
 * Software
 * Vulnerability

 * TAGS


PIXIEFAIL: NINE VULNERABILITIES IN TIANOCORE'S EDK II IPV6 NETWORK STACK.

Date Tue 16 January 2024 By Francisco Falcon Iván Arce Category Vulnerability.
Tags TianoCore EDK2 UEFI IPv6 PXE

This blog post provides details about nine vulnerabilities affecting the IPv6
network protocol stack of EDK II, TianoCore's open source reference
implementation of UEFI.

more ...

--------------------------------------------------------------------------------


BLUE GALAXY ENERGY: A NEW WHITE-BOX CRYPTANALYSIS OPEN SOURCE TOOL

Date Thu 21 December 2023 By Nicolas Surbayrole Philippe Teuwen Category
Cryptography. Tags cryptography white-box tool release BGE

We introduce a new white-box cryptanalysis tool based on the pioneering BGE
paper but without known open source public implementation so far.

more ...

--------------------------------------------------------------------------------


OUR PWN2OWN JOURNEY AGAINST TIME AND RANDOMNESS (PART 2)

Date Tue 07 November 2023 By Eloïse Brocas Damien Cauquil Robin David Benoît
Forgette Category Vulnerability. Tags vulnerability

Part 2 of a series about participation in the Pwn2Own Toronto 2023 contest.

more ...

--------------------------------------------------------------------------------


WORKFLOW OF A ZKSYNC ERA TRANSACTION: FROM GENERATION TO FINALIZATION

Date Thu 26 October 2023 By Madigan Lebreton Elouan Wauquier Victor Houal
Category Blockchain. Tags blockchain cryptocurrency ethereum zksync layer2
zk-rollup zero-knowledge proof

This blog post presents the entire workflow of a transaction executed on zkSync
Era. zkSync Era is a Zk Rollup Layer 2 blockchain that executes transactions and
proves its execution on the Ethereum blockchain using Zero-Knowledge proofs.

more ...

--------------------------------------------------------------------------------


INTERNSHIP OFFERS FOR THE 2023-2024 SEASON

Date Mon 16 October 2023 By Quarkslab Category Life at Quarkslab. Tags job
internship

The internship season is back at Quarkslab! Our internship topics cover a wide
range of our expertise and aim at tackling new challenges, namely:

more ...

--------------------------------------------------------------------------------


QBINDIFF: A MODULAR DIFFING TOOLKIT

Date Thu 12 October 2023 By Roxane Cohen Robin David Riccardo Mori Category
Program Analysis. Tags reverse-engineering binary diffing tool

This blog post presents an overview of QBinDiff, the Quarkslab binary diffing
tool officially released today. It describes its core principles and shows how
it works on binaries as well as on general graph matching problems unrelated to
IT security.

more ...

--------------------------------------------------------------------------------


LET’S GO INTO THE RABBIT HOLE (PART 1) — THE CHALLENGES OF DYNAMICALLY HOOKING
GOLANG PROGRAMS

Date Tue 03 October 2023 By Mihail Kirov Damien Aumaître Category Containers.
Tags container cloud Linux go golang

Golang is the most used programming language for developing cloud technologies.
Tools such as Kubernetes, Docker, Containerd and gVisor are written in Go.
Despite the fact that the code of these programs is open source, there is no way
to analyze and extend their behavior dynamically without recompiling their code.
Is this due to the complex internals of the language? In this blog post, we’ll
look into the challenges of developing and inserting runtime hooks in Golang
programs.

more ...

--------------------------------------------------------------------------------


REVERSING WINDOWS CONTAINER, EPISODE I: SILO

Date Thu 21 September 2023 By Lucas Di Martino Category Containers. Tags
reverse-engineering Windows

This article presents the internals of Windows Container.

more ...

--------------------------------------------------------------------------------


DEBUGGING WINDOWS ISOLATED USER MODE (IUM) PROCESSES

Date Thu 07 September 2023 By Francisco Falcon Category Reverse-Engineering.
Tags Microsoft Windows IUM Hyper-V Isolated User Mode Trustlet debugging
reverse-engineering

In this blog post we discuss how to debug Windows' Isolated User Mode (IUM)
processes, also known as Trustlets, using the virtual TPM of Microsoft Hyper-V
as our target.

more ...

--------------------------------------------------------------------------------


DIVING INTO STARLINK'S USER TERMINAL FIRMWARE

Date Tue 29 August 2023 By Carlo Ramponi Category Reverse-Engineering. Tags
reverse-engineering fuzzing embedded-device IoT

This blog post presents an overview of Starlink's User Terminal runtime
internals, focusing on the communications that happen within the device and with
user applications and some tools that can help further research on the same
topic.

more ...

--------------------------------------------------------------------------------

 * ← Previous
 * 1
 * 2
 * 3
 * 4
 * 5
 * 6
 * 7
 * 8
 * 9
 * 10
 * 11
 * 12
 * 13
 * 14
 * 15
 * 16
 * 17
 * 18
 * 19
 * 20
 * 21
 * Next →

--------------------------------------------------------------------------------

Powered by Pelican , Theme is from Bootstrap from Twitter