Adrian Herrera's Avatar

Adrian Herrera

@adrianherrera.bsky.social

Security researcher with an interest in formal methods. Building fuzzers @ Interrupt Labs | Teaching @ Australian National University https://adrian-herrera.com

489 Followers  |  349 Following  |  79 Posts  |  Joined: 31.10.2023  |  2.1535

Latest posts by adrianherrera.bsky.social on Bluesky

Preview
Exploiting the Synology TC500 at Pwn2Own Ireland 2024 Introduction In October 2024, InfoSect participated in Pwn2Own – a bug bounty competition against embedded devices such as cameras, NAS’, and smart speakers. In this blog, I’ll di…

New blog post: Exploiting the Synology TC500 at Pwn2Own Ireland 2024
We built a format string exploit for the TC500 smart cam. It didn’t get used, but it made for a fun case study.
blog.infosectcbr.com.au/2025/08/01/e...

01.08.2025 05:15 — 👍 5    🔁 2    💬 0    📌 1
Preview
Add V8SandboxFuzzer · googleprojectzero/fuzzilli@675eccd This is a basic fuzzer for the V8 Sandbox. It uses the memory corruption API to implement a random-but-deterministic (given a seed) traversal through the V8 heap object graph and corrupts some obje...

We released our Fuzzilli-based V8 Sandbox fuzzer: github.com/googleprojec...
It explores the heap to find interesting objects and corrupts them in a deterministic way using V8's memory corruption API. Happy fuzzing!

01.08.2025 07:21 — 👍 22    🔁 6    💬 0    📌 0

Good luck, and exciting times for XBOW!

30.07.2025 11:13 — 👍 2    🔁 0    💬 0    📌 0
Post image

Linux Kernel Hardening: Ten Years Deep

Talk by Kees Cook about the relevance of various Linux kernel vulnerability classes and the mitigations that address them.

Video: www.youtube.com/watch?v=c_Nx...
Slides: static.sched.com/hosted_files...

15.07.2025 16:42 — 👍 7    🔁 3    💬 0    📌 0
CVE-2023-52927: Turning a Forgotten Syzkaller Report into kCTF Exploit Table of Contents I. Introduction II. Netfilter hooks, nf_tables, nf_conntrack, nf_nat and nf_queue 2.1 Netfilter hooks 2.2 nf_tables 2.3 nf_conntrack 2.4 nf_nat 2.5 nf_queue III. The Forgotten Syzkaller Report IV. Root Cause Analysis of a “no reproducer” Syzkaller UAF Report 4.1 Allocation Backtrace 4.2 Free Backtrace 4.3 UAF Backtrace 4.4 Root Cause V. Crafting a Reproducer to Trigger the KASAN UAF 5.1 Allocate a template nf_conn by calling nft_ct_set_zone_eval() 5.2 Setup nf_nat_setup_info() function 5.

CVE-2023-52927: Turning a Forgotten #Syzkaller Report into #kCTF #Exploit

https://qriousec.github.io/post/cve-2023-52927/

10.07.2025 20:05 — 👍 4    🔁 2    💬 0    📌 0

Oh cool! I’m probably more interested in different frontends; I’ll leave accelerating to the professionals 😄

10.07.2025 02:43 — 👍 0    🔁 0    💬 0    📌 0
Preview
GitHub - sandialabs/ctadl: CTADL is a static taint analysis tool CTADL is a static taint analysis tool. Contribute to sandialabs/ctadl development by creating an account on GitHub.

CTADL - a Datalog-based interprocedural static taint analysis engine for Java/Android bytecode (via JADX) and Pcode (via Ghidra)

Code: github.com/sandialabs/c...

Talk (via @krismicinski.bsky.social): youtu.be/3ec9VfMUVa8?...

09.07.2025 10:10 — 👍 9    🔁 2    💬 1    📌 0

Woah totally missed that CTDL is open source 🥳

09.07.2025 07:49 — 👍 2    🔁 0    💬 0    📌 0
A side by side comparison of the original output by Ghidra, and the LLM enriched output.

A side by side comparison of the original output by Ghidra, and the LLM enriched output.

Ghidra, scripting, LLM, automagic automation. That should grab the attention for this thread. If you want to read the complete blog, you can do so here: www.trellix.com/blogs/resear...
1/n

01.07.2025 12:35 — 👍 8    🔁 5    💬 1    📌 0
Preview
Estimating Correctness Without Oracles in LLM-Based Code Generation Generating code from natural language specifications is one of the most successful applications of Large Language Models (LLMs). Yet, they hallucinate: LLMs produce outputs that may be grammatically c...

Can we statistically estimate how likely an LLM-generated program is correct w/o knowing what is a correct program for that task?

Sounds impossible-but it's actually really simple. In fact, our measure of "correctness" called incoherence can be estimated (PAC guarantees).

arxiv.org/abs/2507.00057

02.07.2025 07:26 — 👍 11    🔁 3    💬 3    📌 2

Firmwire 🤝 LibAFL

17.06.2025 09:28 — 👍 8    🔁 1    💬 0    📌 0
Preview
Solo: A Pixel 6 Pro Story (When one bug is all you need) During my internship I was tasked to analyze a Mali GPU exploit on Pixel 7/8 devices and adapt it to make it work on another device: the Pixel 6 Pro. While the exploit process itself is relatively straightforward to reproduce (in theory we just need to find the correct symbol offsets and signatures for our target device), what’s interesting about Pixel 6 Pro is that it uses a different Mali GPU from the Pixel 7/8, which lacked support for a feature that one of the two vulnerabilities within the exploit relied on:

Solo: A Pixel 6 Pro Story (When one #bug is all you need)

https://starlabs.sg/blog/2025/06-solo-a-pixel-6-pro-story-when-one-bug-is-all-you-need/

14.06.2025 21:31 — 👍 1    🔁 1    💬 0    📌 0
Post image Post image

Just Accepted to ACM TOSEM!

The "Havoc Paradox" is about the relationship between byte-level fuzzer mutations and their effect on the inputs produced by generators for structured strings (e.g. XML/SQL). Can disruptive mutations be controlled? Should they be? Find out.

📄 dl.acm.org/doi/pdf/10.1...

06.06.2025 19:02 — 👍 21    🔁 3    💬 2    📌 1
Preview
DWARF as a Shared Reverse Engineering Format This blog post introduces a new API in LIEF to create DWARF files

[Blog Post] New high-level API in LIEF that allows the
creation of DWARF files. Additionally, I present two plugins designed to export
program information from Ghidra and BinaryNinja into a DWARF file.

lief.re/blog/2025-05...

(Bonus: DWARF file detailing my reverse engineering work on DroidGuard)

27.05.2025 13:50 — 👍 21    🔁 15    💬 1    📌 0
Preview
Bypassing MTE with CVE-2025-0072 See how a vulnerability in the Arm Mali GPU can be exploited to gain kernel code execution even when Memory Tagging Extension (MTE) is enabled.

Our team member Man Yue Mo is back, showing a new way to bypass MTE protection on Android phones with CVE-2025-0072. github.blog/security/vul...

23.05.2025 14:52 — 👍 6    🔁 3    💬 0    📌 0

Happy to share my upcoming #ATC25 paper w/ @snagycs.bsky.social: "BIN2WRONG: a Unified Fuzzing Framework for Uncovering Semantic Errors in Binary-to-C Decompilers"!

Bin2Wrong creates binaries by mutating source, compiler, optimizations, and format—revealing 48 new bugs in 7 decompilers! 💪

22.05.2025 20:02 — 👍 4    🔁 2    💬 1    📌 0
Preview
GitHub - binarly-io/idalib: Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib Idiomatic Rust bindings for the IDA SDK, enabling the development of standalone analysis tools using IDA v9.x’s idalib - binarly-io/idalib

We're are happy to announce a new release of our #Rust bindings for idalib.

What's new:
- New APIs for working with IDBs, segments, and more
- Rust 2024 support
- New homepage: idalib.rs

H/T to our contributors @yeggor.bsky.social & @raptor.infosec.exchange.ap.brid.gy

github.com/binarly-io/i...

21.05.2025 22:28 — 👍 6    🔁 8    💬 0    📌 0

👀

20.05.2025 21:23 — 👍 1    🔁 0    💬 0    📌 0
Preview
Kernel Exploitation Techniques: Turning The (Page) Tables This post explores attacking page tables as a Linux kernel exploitation technique for gaining powerful read/write primitives.

with offensivecon around the corner, i figured id write another post on linux kernel exploitation techniques - this time i cover the world of page table exploitation! enjoy 🤓

sam4k.com/page-table-k...

08.05.2025 13:58 — 👍 13    🔁 4    💬 1    📌 0
Post image Post image Post image

Gave a talk on external fuzzing of Linux kernel USB drivers with syzkaller at SAFACon.

Includes a demonstration of how to rediscover CVE-2024-53104, an out-of-bounds bug in the USB Video Class driver.

Slides: docs.google.com/presentation...

06.05.2025 20:17 — 👍 2    🔁 2    💬 1    📌 1
Decompiler | ipsw Using the AI decompiler.

Wrote a lil' guide to help get people started with the 🆕 `ipsw` AI decompiler 📖

blacktop.github.io/ipsw/docs/gu...

05.05.2025 22:28 — 👍 2    🔁 1    💬 0    📌 0

Can confirm the hardware lab is pretty cool 😎

30.04.2025 23:05 — 👍 4    🔁 1    💬 0    📌 0

In today's #AST2025 keynote on our new #Fandango fuzzer, I presented ongoing extensions for protocol fuzzing, oracle checking, coverage guidance, much more. Slides now available: conf.researchr.org/details/ast-...

28.04.2025 19:09 — 👍 13    🔁 3    💬 1    📌 0
Post image

Fuzzing Windows ARM64 binaries with a DBI and LLVM?
Here we go: www.romainthomas.fr/post/25-04-w...

28.04.2025 12:36 — 👍 4    🔁 5    💬 0    📌 0
SURE 2025 | The Workshop on Software Understanding and Reverse Engineering The Workshop on Software Understanding and Reverse Engineering

I'm proud to announce that myself and @AtipriyaBajaj have created the Workshop on Software Understanding and Reverse Engineering (SURE), which will be co-located at CCS 2025. sure-workshop.org/

Please follow our workshop account @sureworkshop and RT it for visibility :).

25.04.2025 16:30 — 👍 7    🔁 6    💬 1    📌 0
Preview
Linux Hardening - State Of Linux Snapshot Fuzzing​ Explore the current state of Linux snapshot fuzzing, its challenges, tools, and impact on kernel security.

Just skimmed over or it so far but looks like a nice overview on snapshot fuzzing by @theoabel.com

fuzzinglabs.com/state-of-lin...

25.04.2025 07:05 — 👍 7    🔁 3    💬 0    📌 0
Post image

the guy who reversed the denuvo drm
@momo5502.bsky.social works on a high-perf windows emulator for security research.

I noticed that it supports icicle as a backend, a fuzzing-specific emulator. awesome to see academic work being continuously developed and making it into the real world

23.04.2025 19:16 — 👍 6    🔁 3    💬 2    📌 0

Woah this is really cool! Agreed, good to see academic work like icicle being picked up and built upon.

24.04.2025 00:10 — 👍 1    🔁 0    💬 0    📌 0
happy easter

happy easter

About to celebrate Easter with your family but don't know what to talk about at the table?
Then don't lose time and read our new article about RPAC!
Written by @zadig.trollab.org !

blog.epsilon-sec.com/cve-2025-312...

20.04.2025 04:03 — 👍 3    🔁 4    💬 0    📌 0
15,000 lines of verified cryptography now in Python In November 2022, I opened issue 99108 on Python’s GitHub repository, arguing that after a recent CVE in its implementation of SHA3, Python should embrace verified code for all of its hash-related inf...

“15,000 lines of verified cryptography now in Python”

Nice write up on integrating the hash and HMAC routines from the HACL* verified crypto library into Python 🎉

jonathan.protzenko.fr/2025/04/18/p...

21.04.2025 07:41 — 👍 0    🔁 0    💬 0    📌 0

@adrianherrera is following 20 prominent accounts