Christopher Domas

 ChristopherP. Domas

Christopher P. Domas

  • Courses2
  • Reviews9

Biography

The Ohio State University - Computer Science

Senior Security Researcher at Intel Corporation
Computer & Network Security
Christopher
Domas
Columbus, Ohio
Christopher Domas (xoreaxeaxeax) leads the Core Client and BIOS/UEFI offensive security research teams at Intel. His specializations are reverse engineering, processor exploitation, and automated firmware analysis. Externally, he is best known for releasing impractical solutions to non-existent problems, including the world's first single instruction C compiler (M/o/Vfuscator), unconventional counter-reverse engineering approaches (REpsych), the branchless side-channel resistant DOOM port, and Turing-machines in the vi text editor. His more relevant work includes the sandsifter processor fuzzer, rosenbridge hardware backdoor, binary visualization tool ..cantor.dust.., and the memory sinkhole x86 privilege escalation exploit.

Public Research:
github.com/xoreaxeaxeax, @xoreaxeaxeax

M/o/Vfuscator – github.com/xoreaxeaxeax/movfuscator
The world’s first single instruction C compiler

sandsifter – github.com/xoreaxeaxeax/sandsifter
The x86 processor fuzzer

The Memory Sinkhole – github.com/xoreaxeaxeax/sinkhole
A ubiquitous hardware privilege escalation vulnerability in the x86 architecture

REpsych – github.com/xoreaxeaxeax/repsych
Sophisticated manipulation of program control flow graphs

..cantor.dust.. – sites.google.com/site/xxcantorxdustxx
Alternative software reverse engineering and data triage approaches

project:rosenbridge – github.com/xoreaxeaxeax/rosenbridge
Hardware backdoors in some CPUs

Presentations:
Black Hat (2018, 2017, 2015, 2012), TED (2014), DEF CON (2018, 2017, 2016, 2015), REcon (2015, 2013),
Shakacon (2017), DerbyCon (2018, 2015, 2012), Hack in the Box (2018)

Publications:
“Hardware Backdoors in some x86 CPUs.” Black Hat Proceedings.
“Breaking the x86 Instruction Set.” Black Hat Proceedings.
“The Memory Sinkhole.” Black Hat Proceedings.
“A vim Execution Engine.” PoC||GTFO 12.
“All Programs Reduce to the Same Instruction Stream.” PoC||GTFO 12.
“ARM is Turing-complete without data fetches.” PoC||GTFO 15


Experience

  • Intel Corporation

    Senior Security Researcher

    Christopher worked at Intel Corporation as a Senior Security Researcher

  • Finite State

    Director of Research

    Christopher worked at Finite State as a Director of Research

  • Battelle

    Cybersecurity Research Leader

    - World recognized researcher in the x86 architecture
    - Research focus areas: x86, ARM, reverse engineering, vulnerability analysis, symbolic execution, fuzzing, embedded devices, hypervisors
    - Guide internal research strategy and co-manage cyber R&D portfolio; anticipate capability gaps and technology trends to guide investments and develop solutions for ongoing research challenges
    - Research lead on diverse range of multi-year projects, covering commercial and government contract research, as well as internal R&D efforts
    - Direct teams of researchers on advanced vulnerability and exploitation R&D

  • The Ohio State University

    Adjunct Instructor

    - Design and teach computer engineering courses on C, assembly, and system architecture
    - Coordinate group and one-on-one education of students of diverse skills and backgrounds
    - Organize academia/industry collaboration to streamline student recruitment and cyber education