KNIHOVNA 2024    2026()  2025()  2024()  2023()  2022()  OTHER()

29.10.24

Breaking the Barrier: Post-Barrier Spectre Attack

The effectiveness of transient execution defenses rests on obscure model-specific operations that must be correctly implemented in microcode and applied by software. In this paper, we study branch predictor invalidation through.

PAPERS

PAPERS

28.10.24

Multi-Turn Context Jailbreak Attack on Larg

Large language models (LLMs) have significantly enhanced the performance of numerous applications, from intelligent conversations to text generation. However, their inherent security vulnerabilities have become an increasingly significant challenge, especially with respect to jailbreak attacks.

PAPERS

PAPERS

28.10.24

End-to-End Encrypted Cloud Storage in the Wild:
A Broken Ecosyst

Cloud storage is ubiquitous: Google Drive, Dropbox, and OneDrive are household names. However, these services do not provide end-to-end encryption (E2EE), meaning that the provider has access to the data stored on their servers. The promise of end-to-end encrypted cloud storage is that users can have the best of both worlds, keeping control of their data using cryptographic techniques, while still benefiting from low-cost storage solutions.

PAPERS

PAPERS

15.8.24

GhostWrite

RISCVuzz: Discovering Architectural CPU Vulnerabilities via Differential Hardware Fuzzi

PAPERS

CPU

23.7.24

VIGORISH VIPER

This groundbreaking report unveils the discovery of a technology suite and its connection to
Chinese organized crime, money laundering, and human trafficking throughout Southeast Asia.

PAPERS

PAPERS

13.7.24

RADIUS/UDP Considered Harmf

The core of the RADIUS protocol predates modern secure cryptographic design. Surprisingly, in the two decades since Wang et al. demonstrated an MD5 hash collision in 2004, RADIUS has not been updated to remove MD5. In fact, RADIUS appears to have received notably little security analysis given its ubiquity in modern networks.

PAPERS

PAPERS

8.7.24

Caught in the Net: Using Infostealer
Logs to Unmask CSAM Consumers

In this proof-of-concept (PoC) report, we used Recorded Future Identity Intelligence’s vast trove of information stealer (“infostealer”) malware data to identify consumers of child sexual abuse material (CSAM), surface additional sources, and arrive at geographic and behavioral trends for the most popular sources

PAPERS

PAPERS

2.7.24

Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch Predict

This paper introduces novel high-precision Branch Target Injection (BTI) attacks, leveraging the intricate structures of the Indirect Branch Predictor (IBP) and the Branch Target Buffer (BTB) in high-end Intel CPUs.

PAPERS

CPU

17.6.24

Mass exploitation

The vulnerable edge of enterprise security

PAPERS

PAPERS

17.6.24

ARM 'TIKTAG' attack

TIKTAG: Breaking ARM’s Memory Tagging Extension with Speculative Executi

PAPERS

ARM CPU

28.5.24

DNSBOMB: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-Responses

DNSBomb is a new practical and powerful pulsing DoS attack exploiting DNS queries and responses.

PAPERS

DNS

10.5.24

Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing Tabl

Virtual Private Networks (VPNs) authenticate and encrypt network traffic to protect users’ security and privacy, and are used in professional and personal settings to defend against malicious actors, circumvent censorship, remotely work from home, etc. It is therefore essential that VPNs are secure.

PAPERS

Papers

8.5.24

Pathfinder

Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor

PAPERS

CPU

3.5.24

The Shape of Money Laundering: Subgraph Representation
Learning on the Blockchain with the Elliptic2 Dataset

Subgraph representation learning is a technique for analyzing local structures (or shapes) within complex networks. Enabled by recent developments in scalable Graph Neural Networks (GNNs), this approach encodes relational information at a subgroup level (multiple connected nodes) rather than at a node level of abstraction.

PAPERS

Papers

5.4.24

JSOutProx RAT

Multi-Staged JSOutProx RAT Targets Indian Co-Operative Banks and Finance Companies

PAPERS

Papers

26.3.24

Generic and Automated Drive-by GPU Cache Attacks
from the Browser

Generic and Automated Drive-by GPU Cache Attacks from the Browser

PAPERS

Papers

16.3.24

GhostRace

GhostRace: Exploiting and Mitigating Speculative Race Conditio

PAPERS

Vulnerebility

4.3.24

Fast Adversarial Attacks on Language Models In One GPU Minute

  PAPERS

CPU

4.3.24

Abusing Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs

  PAPERS

CPU

12.1.24

Flying Under the Radar: Abusing GitHub for Malicious Infrastructure

  PAPERS

Malware

6.1.24

No-justice” wiper

  PAPERS

Malware

1.1.24

Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation

  PAPERS

Attack