Ryzenfallen - Exploitation of Ryzenfall for arbitrary read primitive via AMD PSP
2 of 1; half a nybble of another
Section 01
poc
Section 02
tools
Section 03
talks/articles/publications
Semantically Packaged Tradecraft: Credential Dumping
Semantic Protocol Confusion: When My LLM Thinks It's a Web Browser
BSOD colour change trick
Linux code injection paint-by-numbers
An Arbitrary Read Exploit for Ryzenfall
Understanding modern UEFI-based platform boot
Admiring the Zircon: Understanding Minimal Process Creation
Introducing Windows Defender System Guard runtime attestation
PLATINUM continues to evolve, find ways to maintain invisibility
Remote Code Execution in Xiaomi MIUI Analytics
Side-channel Attacks
What's in an Address: Understanding DDR Memory Mapping
Attacking the Linux PRNG on Android: Weaknesses in Seeding of Entropic Pools
Remote Exploitation of the Cordova Framework
Intro to Timing Attacks Workshop
Abusing the Linux Dynamic Loader with LD_PRELOAD
Section 04
patents
US20210406365A1 - Malicious enterprise behavior detection tool
US10366213B2 - Protecting an application via an intra-application firewall
US10419419B2 - Technologies for sensor action verification
US9296338B2 - Vehicle mirror adjustment
US20150203039A1 - Automatic rear-view mirror adjustments
US9965040B2 - Method for using magnetometer together w/ gesture to send content to wireless display
US20160292009A1 - Execution offloading through syscall trap interface
US9466296B2 - Initiation of action upon recognition of a partial voice command
US20140187148A1 - Near field communication method and apparatus using sensor context
ABOUT ME
David Kaplan
Passionate about technology with a special interest in security research, AI, systems architecture, and low-level engineering. I currently work as AI Security Research Lead at Origin (a "security for AI" startup), and have previously worked at Microsoft, IBM X-Force, Intel, and NDS.