Content List
- From Zero to Sixty – The Story of North Korea’s Rapid Ascent to Becoming a Global Cyber Superpower
- Finding Bugs Compiler Knows but Doesn’t Tell You-Dissecting Undefined Behavior Optimizations in LLVM
- Cross-Site Escape – Pwning macOS Safari Sandbox the Unusual Way
- Permission Mining in GCP
- Debug Resurrection on Nordic nRF52 Series
- Please Make a Dentist Appointment ASAP – Attacking IOBluetoothFamily HCI and Vendor-Specific Commands
- Bypassing NGAV for Fun and Profit
- Manufacturing Hardware Implants from Idea to Mass Production – A Hacker’s Journey
- How to Better Fuzz Windows 10 Directx Kernel at Present
- This is for the Pwners – Exploiting a WebKit 0-day in PlayStation 4
- Portable Data exFiltration – XSS for PDFs
- The Hunt for Major League IoT-ICS Threats – A Deep Dive into IoT Threat Terrain
- How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration
- IAM Concerned – OAuth Token Hijacking in Google Cloud (GCP)
- Graph Convolutional Network-Based Suspicious Communication Pair Estimation for Industrial Control
- Shield with Hole – New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy
- Jack-in-the-Cache – A New Code injection Technique through Modifying X86-to-ARM Translation Cache
- LadderLeak – Breaking ECDSA with Less than One Bit of Nonce Leakage
- FPs are Cheap. Show me the CVEs!
- BinTyper – Type Confusion Detection for C++ Binaries
- Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel
- POSWorld. Should You be Afraid of Hands-On Payment Devices
- Fingerprint-Jacking – Practical Fingerprint Authorization Hijacking in Android Apps
- Story of Jailbreaking iOS 13
- The Subtle Art of Chaining Headers – IKEv2 Attack Surface Case Study
- Design Pitfalls in Commercial Mini-Programs on Android and iOS
- efiXplorer – Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis
- Quantum Security and Cryptography – You Are (Probably) Doing it Wrong
- Effective Vulnerability Discovery with Machine Learning
- It’s not FINished – The Evolving Maturity in Ransomware Operations
- How Embedded TCP_IP Stacks Breed Critical Vulnerabilities
- My Ticks Don’t Lie – New Timing Attacks for Hypervisor Detection
- Hermes Attack – Steal DNN Models In AI Privatization Deployment Scenarios
- A New Hope – The One Last Chance to Save Your SSD Data
- Light Commands – Hacking Voice Assistants with Lasers
- Precursor – Towards Evidence-Based Trust in Hardware
- Hacking Government Cybersecurity
0 Comments