Margin Research (Page 3)

Margin Research Blog

Writings on Security, Research, and Technology

Remote Android Debugging
Jan 14, 2022

Remote Android Debugging

Covid just made GDB obsolete, long live Frida! Imagine a world where you don’t have to press 500 keys just to get to the same state as you were in the last run and where you actually can introspect the runtime. Frida offers a somewhat clean way to debug

Martin Wennberg
By Martin Wennberg
An opinionated guide on how to reverse engineer software, part 1
Nov 2, 2021

An opinionated guide on how to reverse engineer software, part 1

This is an opinionated guide. After 12 years of reverse engineering professionally, I have developed strong beliefs on how to get good at RE.

Ryan Stortz
By Ryan Stortz
Bypassing glibc Safe-Linking: CSAW 2021 Quals (word_games)
Sep 15, 2021

Bypassing glibc Safe-Linking: CSAW 2021 Quals (word_games)

This post analyzes glibc-2.32+'s safe-linking feature introduced in December 2020 in the context of a CTF challenge developed for New York University's CSAW 2021 Quals competition

Ian Dupont
By Ian Dupont
WINTERN 2020: ZOMBIE LINK CRAWLER
May 28, 2021

WINTERN 2020: ZOMBIE LINK CRAWLER

This winter, I had the opportunity to intern at Margin Research. Being a computer science student who had little to no experience in security, I was nervous even applying. Despite that, I really wanted to dip my toes into security to see what it was like. I wanted a stretch

Justin Mai
By Justin Mai
WINTERN 2020: IOT FIRMWARE ANALYSIS
May 13, 2021

WINTERN 2020: IOT FIRMWARE ANALYSIS

For this project I did a partial analysis of the Wyze V2 Camera. It's a small camera that allows one to live stream video in 1080p to your phone from anywhere. It also supports motion/sound recording with cloud storage via AWS. This data can also be stored to an SD card.

Chase Kanipe
By Chase Kanipe
A Retrospective on Modern Information Operations
Apr 30, 2021

A Retrospective on Modern Information Operations

In 2019, Sophia d’Antoine and I gave a presentation at SummerCon in which we explored threats relating to social media astroturfing with the intent of conducting disinformation campaigns. We reviewed known attacks and presented our framework for studying disinformation campaigns. Since then, this field has developed considerably alongside our

Ian Roos
By Ian Roos
Page 3 of 3
arrow-up icon