The Ohio State University - Computer Science
Senior Security Researcher at Intel Corporation
Computer & Network Security
Christopher
Domas
Columbus, Ohio
Christopher Domas (xoreaxeaxeax) leads the Core Client and BIOS/UEFI offensive security research teams at Intel. His specializations are reverse engineering, processor exploitation, and automated firmware analysis. Externally, he is best known for releasing impractical solutions to non-existent problems, including the world's first single instruction C compiler (M/o/Vfuscator), unconventional counter-reverse engineering approaches (REpsych), the branchless side-channel resistant DOOM port, and Turing-machines in the vi text editor. His more relevant work includes the sandsifter processor fuzzer, rosenbridge hardware backdoor, binary visualization tool ..cantor.dust.., and the memory sinkhole x86 privilege escalation exploit.
Public Research:
github.com/xoreaxeaxeax, @xoreaxeaxeax
M/o/Vfuscator – github.com/xoreaxeaxeax/movfuscator
The world’s first single instruction C compiler
sandsifter – github.com/xoreaxeaxeax/sandsifter
The x86 processor fuzzer
The Memory Sinkhole – github.com/xoreaxeaxeax/sinkhole
A ubiquitous hardware privilege escalation vulnerability in the x86 architecture
REpsych – github.com/xoreaxeaxeax/repsych
Sophisticated manipulation of program control flow graphs
..cantor.dust.. – sites.google.com/site/xxcantorxdustxx
Alternative software reverse engineering and data triage approaches
project:rosenbridge – github.com/xoreaxeaxeax/rosenbridge
Hardware backdoors in some CPUs
Presentations:
Black Hat (2018, 2017, 2015, 2012), TED (2014), DEF CON (2018, 2017, 2016, 2015), REcon (2015, 2013),
Shakacon (2017), DerbyCon (2018, 2015, 2012), Hack in the Box (2018)
Publications:
“Hardware Backdoors in some x86 CPUs.” Black Hat Proceedings.
“Breaking the x86 Instruction Set.” Black Hat Proceedings.
“The Memory Sinkhole.” Black Hat Proceedings.
“A vim Execution Engine.” PoC||GTFO 12.
“All Programs Reduce to the Same Instruction Stream.” PoC||GTFO 12.
“ARM is Turing-complete without data fetches.” PoC||GTFO 15
Senior Security Researcher
Christopher worked at Intel Corporation as a Senior Security Researcher
Director of Research
Christopher worked at Finite State as a Director of Research
Cybersecurity Research Leader
- World recognized researcher in the x86 architecture
- Research focus areas: x86, ARM, reverse engineering, vulnerability analysis, symbolic execution, fuzzing, embedded devices, hypervisors
- Guide internal research strategy and co-manage cyber R&D portfolio; anticipate capability gaps and technology trends to guide investments and develop solutions for ongoing research challenges
- Research lead on diverse range of multi-year projects, covering commercial and government contract research, as well as internal R&D efforts
- Direct teams of researchers on advanced vulnerability and exploitation R&D
Adjunct Instructor
- Design and teach computer engineering courses on C, assembly, and system architecture
- Coordinate group and one-on-one education of students of diverse skills and backgrounds
- Organize academia/industry collaboration to streamline student recruitment and cyber education