![]() ![]() Announcing NCC Group’s Cryptopals Guided Tour: Set 2.Using Semgrep with Jupyter Notebook files.Threat Modelling Cloud Platform Services by Example: Google Cloud Storage.Machine Learning 102: Attacking Facial Authentication with Poisoned Data.Rustproofing Linux (Part 1/4 Leaking Addresses).Rustproofing Linux (Part 2/4 Race Conditions).Rustproofing Linux (Part 3/4 Integer Overflows).Rustproofing Linux (Part 4/4 Shared Memory).Making New Connections – Leveraging Cisco An圜onnect Client to Drop and Run Payloads.A Race to Report a TOCTOU: Analysis of a Bug Collision in Intel SMM.Public Report – Solana Program Library ZK-Token Security Assessment.Public Report – Kubernetes 1.24 Security Audit.HITBAMS – Your Not so “Home” Office – Soho Hacking at Pwn2Own.Machine Learning 103: Exploring LLM Code Generation.Public Report – AWS Nitro System API & Security Claims.Real World Cryptography Conference 2023 – Part I.NETGEAR Routers: A Playground for Hackers?.Medical Devices: A Hardware Security Perspective.Rigging the Vote: Uniqueness in Verifiable Random Functions.The Paillier Cryptosystem with Applications to Threshold ECDSA.Exploring Overfitting Risks in Large Language Models.Tool Release: Code Credential Scanner (ccs).OffensiveCon 2023 – Exploit Engineering – Attacking the Linux Kernel.Reverse Engineering Coin Hunt World’s Binary Protocol.How to Spot and Prevent an Eclipse Attack.A Brief Review of Bitcoin Locking Scripts and Ordinals.Machine Learning 104: Breaking AES With Power Side-Channels.Defeating Windows DEP With A Custom ROP Chain.Dynamic Linq Injection Remote Code Execution Vulnerability (CVE-2023-32571).New Sources of Microsoft Office Metadata – Tool Release MetadataPlus.Exploiting Noisy Oracles with Bayesian Inference.Getting per-user Conditional Access MFA status in Azure.Public Report – Zcash Zebra Security Assessment.Technical Advisory – Nullsoft Scriptable Installer System (NSIS) – Insecure Temporary Directory Usage.Overview of Modern Memory Security Concerns.Building Intuition for Lattice-Based Signatures – Part 1: Trapdoor Signatures.Intel BIOS Advisory – Memory Corruption in HID Drivers.Approximately 2000 Citrix NetScalers backdoored in mass-exploitation campaign.Building Intuition for Lattice-Based Signatures – Part 2: Fiat-Shamir with Aborts.Public Report – Penumbra Labs R1CS Implementation Review.Dancing Offbit: The Story of a Single Character Typo that Broke a ChaCha-Based PRNG.Technical Advisory – SonicWall Global Management System (GMS) & Analytics – Multiple Critical Vulnerabilities.Real World Cryptography Conference 2023 – Part II.5G security – how to minimise the threats to a 5G network. ![]() SIAM AG23: Algebraic Geometry with Friends.Public Report – Entropy/Rust Cryptography Review.HITB Phuket 2023 – Exploiting the Lexmark PostScript Stack. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |