KNIHOVNA    2026()  2025()  2024()  2023()  2022()  OTHER()
HOME  PAPERS(523)  REPORTS(264)  WHITEPAPERS(29)  KNIHY(24)  RFC popisy(9411)  SLOVNÍČEK(9)  Podpůrné materiály(16) 


DATE

NAME

INFO

CATEGORY

SUBCATE

28.4.26 LEROBOT: AN OPEN-SOURCE LIBRARY FOR END-TO-END ROBOT LEARNING Robotics is undergoing a significant transformation powered by advances in highlevel control techniques based on machine learning, giving rise to the field of robot learning. PAPERS PAPERS
26.4.26 GopherWhisper GopherWhisper: A burrow full of malware PAPERS PAPERS
10.4.26 ESPIONAGE FOR REPRESSION: FORENSIC ANALYSIS OF A CROSS-BORDER HACK-FOR-HIRE CAMPAIGN TARGETING CIVIL SOCIETY IN MENA ESPIONAGE FOR REPRESSION: FORENSIC ANALYSIS OF A CROSS-BORDER HACK-FOR-HIRE CAMPAIGN TARGETING CIVIL SOCIETY IN MENA PAPERS PAPERS
8.4.26 GeForge: Hammering GDDR Memory to Forge GPU Page Tables for Fun and Profit Over the years, Rowhammer has been leveraged to mount a wide range of attacks against system main memory. PAPERS PAPERS
8.4.26 GDDRHammer: Greatly Disturbing DRAM Rows — Cross-Component
Rowhammer Attacks from Modern GPUs
While Rowhammer has been extensively studied in CPU-based memory systems, a very recent work by Lin etal. (USENIX Security ‘25) extended this line of research to GDDR6 GPU memory, demonstrating the first Rowhammer bit flips on NVIDIA GPUs PAPERS PAPERS
8.4.26 GPUHammer: Rowhammer Attacks on GPU Memories are Practical Rowhammer is a read disturbance vulnerability in modern DRAM that causes bit-flips, compromising security and reliability. PAPERS PAPERS
17.2.26 Zero Knowledge (About) Encryption:
A Comparative Security Analysis of Three Cloud-based Password Managers
Zero Knowledge Encryption is a term widely used by vendors of cloud-based password managers. Although it has no strict technical meaning, the term conveys the idea that the server, who stores encrypted password vaults on behalf of users, is unable to learn anything about the contents of those vaults. PAPERS PAPERS
5.2.26 The Trigger in the Haystack:
Extracting and Reconstructing LLM Backdoor Triggers
Detecting whether a model has been poisoned is a longstanding problem in AI security. In this work, we present a practical scanner for identifying sleeper agent-style backdoors in causal language models. PAPERS PAPERS
23.1.26 Ransomware 2026 New Actors and Threats Emerge as the Threat Landscape Evolves PAPERS PAPERS
19.1.26 StackWarp: Breaking AMD SEV-SNP Integrity via Deterministic
Stack-Pointer Manipulation through the CPU’s Stack Engine
Confidential Virtual Machines (CVMs), such as AMD SEVSNP, aim to protect guest operating systems from an untrusted
host by encrypting state and constraining privileged control. These platforms promise isolation even in multi-tenant cloud
setups where simultaneous multithreading (SMT) remains enabled
PAPERS PAPERS