DIMCT
We developped a small tool, « DIMCT » which simply allows tracing inter module calls, without a too big overhead.
Teampass < 2.1.27.9 multiple vulnerabilities
As part of its evaluation centre work, Amossys led a security review of Teampass 2.1.27.8. Multiple security vulnerabilities were found, and here are the CVE publications.
BreizhCTF 2k17 Write-Ups
Amossys was a sponsor of the [BreizhCTF 2k17](http://www.breizhctf.com/), a French hacking competition over a single night (April 28-29th).
Virtualization Based Security – Part 2: kernel communications
This blog post is a second article covering Virtualization Based Security and Device Guard features.
Virtualization Based Security – Part 1: The boot process
This blog post is the first part of a collection of articles covering Virtualization Based Security and Device Guard features.
An introduction of Use-After-Free detection in binary code by static analysis
Use-After-Free is a well-known class of vulnerabilities that is commonly used by modern exploits. In the research project […]
A recap of 32C3
AMOSSYS attended the 32nd edition of the Chaos Communication Congress (CCC), which took place from December 27th to 30th in Hambourg. […]
Tutorial: How to reverse unknown protocols using Netzob
This article presents the main features of Netzob on how to reverse engineer unknown protocols. It goes through learning the message formats of a simple protocol as well as […]
Automated Reverse Engineering of Cryptographic Algorithms
In this article we present a practical case of automated reverse engineering of cryptographic algorithms.
Design and usage of OpenDTeX DRTM Secure Boot
In this article we present the OpenDTeX research project which leverages trusted computing technologies to ensure strong security properties either at boot time or at OS runtime.