Security Research

Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit

An in-depth exploration details how a security researcher discovered and exploited vulnerabilities in the Xbox 360 hypervisor using encrypted memory attacks and race conditions. The researcher successfully developed a software-only exploit chain that achieves hypervisor code execution through a bootloader update payload, though with relatively low success rates and temporary effects.

Hard problems that reduce to document ranking

Language models can effectively perform listwise document ranking, particularly useful in identifying N-day vulnerabilities through patch diffing. The technique transforms complex security problems into document ranking tasks, demonstrated successfully in locating vulnerable functions among patch diffs using GPT-4 mini with minimal cost and time.