One of our researchers, Eugenie Lee, is giving a talk at Secuinside about biometrics using brain waves!
Our team has analyzed and reversed Korean block ciphers called NEAT and NES -- Interestingly, the specification and algorithms for these haven't been known to public. [Korean-only post]
http://theori.io/res…/korean/reversing-crypto-from-libraries
We have been busy analyzing your car’s radio signals, and we are releasing code to receive and decode digital FM radio.
It started as a GNU Radio project, and is now a working receiver written in C using the liquid-dsp library. It also includes a patch to the faad2 library to support the proprietary codec, HDC. This is the first working open-source receiver for digital radio in the United States.
Digital radio supports a variety of different formats: ID3 tags, JPEG and PNG im...ages, and an AAC-based audio codec. We hope to expand our work to fuzz these formats, and maybe demonstrate an over-the-air attack in the future.
展开We are excited to sponsor Plaid CTF this year! Sign up and solve challenges this weekend. @PlaidCTF play.plaidctf.com/register
Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201) -- https://github.com/theori-io/chakra-2016-11
Chakra JIT CFG Mitigation Bypsas
http://theori.io/research/chakra-jit-cfg-bypass
Patch analysis of MS16-063 for Internet Explorer 11 JScript Memory Corruption (with proof-of-concept exploit)
http://theori.io/research/jscript9_typed_array
Researchers at Theori published an analysis of Internet Explorer 11 VBScript Memory Corruption (with proof-of-concept exploit)
We finally have our blog up and running! Come visit and stay tuned for more exciting news