We Beg To Differ takes us into the underground sport of car diffing https://www.eyeforfilm.co.uk/review/we-beg-to-differ-2024-film-review-by-amber-wilkinson #film #ShortFilm #movies #diffing
We Beg To Differ takes us into the underground sport of car diffing https://www.eyeforfilm.co.uk/review/we-beg-to-differ-2024-film-review-by-amber-wilkinson #film #ShortFilm #movies #diffing
This paper looks promising: "SIGMADIFF: Semantics-Aware Deep Graph Matching for Pseudocode Diffing".
https://ink.library.smu.edu.sg/cgi/viewcontent.cgi?article=9671&context=sis_research
I β€οΈ #BorgBackup!
I managed to recover from multiple bad situations - including severe filesystem corruption from bad memory.
But #Vorta is failing repeatedly every now & then (often unnoticed!) because of some database (migration?) problems so i moved to #borgmatic .
But now I miss #Vorta s #diffing feature so i wrote a #TUI in #golang doing that.
It is extremely limited but feels clean and useful enough that I think about publishing as is. But where? #github #gitlab #codeberg
Dear everyone in the academia (and maybe elsewhere) doing #bindiffing research: #SymbolicExecution does not work for comparing different architectures, unless you are using as input for your symbolic execution tool *decompiled code*.
If you are using assembly or using an IR (Intermediate Representation) based on assembler (like Ghidra' p-code, IDA's microcode, LLVM's IR, etc), it will inevitably produce different outputs.
Your best IR for #diffing is pseudo-code, the #decompiler's output.
@Mizu If you want more #datasets for #binary #diffing, take a look to this paper:
https://arxiv.org/abs/2011.10749
#BinaryDiffing #BinDiffing #BinaryCodeSimilarityAnlysis #BCSA
I know nobody gives a fuck, but this is my next research topic for this year: Finding #bugs & #vulnerabilities by #diffing binaries against sources. It sounds much harder than it actually is.
#ProgramDiffing #VulnDev #VulnResearch #VulnerabilityDevelopment #VulnerabilityResearch #ReverseEngineering
#Compilers #CompilerOptimizations #CompilersBugs #Miscompilations
π’ Donβt forget to sign up for one of our advanced hands-on #infosec trainings! The first week of #RETURN23XPLOIT is only a few days away. Our trainings offer hands-on instruction from top industry experts. In week 1, learn #Diffing, #ExploitDev, #ARM64, #ReverseEngineering, #IDAPro & more. Don't miss out!
Level up your #cybersecurity skills with #RETURN23XPLOIT! Our trainings offer hands-on instruction from top industry experts. In week 1, learn #Diffing, #ExploitDev, #ARM64, #ReverseEngineering, #IDAPro & more. Don't miss out!
π Happy #LunarNewYear! Strive to be clever like a rabbit, and get some #SundayReading in today. Here is β#Pigaios: A Tool for #Diffing Source Codes against #Binariesβ, by our instructor Joxean Koret (@joxean)!
sometimes I want to edit #Microsoft #Word documents (binary files) but I also want to use #git's #diffing capabilities. Here's what I've patched together if it is helpful to anyone else: https://github.com/AFewBooks/fewbooks-config
Most of the real work was done by Roman Casero (for #Gerardus), I've just customized to my liking and ironed out a few issues I experienced when setting it up myself.
And https://gist.github.com/Pomax/e9cc4a16353c01b14daba38975f3a91b for anyone who might need this, too. #webdev #webdesign #CSS #HTML #diffing