KNIHOVNA()  HOME  PAPERS(523)  REPORTS(264)  CONFERENCE(22)  WHITEPAPERS(29)  KNIHY(24)  RFC popisy(9411)  SLOVNÍČEK(9)  Podpůrné materiály(16) 


DATE

NAME

INFO

CATEGORY

SUBCATE

24.6.25 LLMs unlock new paths to monetizing exploit We argue that Large language models (LLMs) will soon alter the economics of cyberattacks. Instead of attacking the most commonly used software and monetizing exploits by targeting the lowest common denominator among victims, LLMs enable adversaries to launch tailored attacks on a user-by-user basis. PAPERS AI
24.6.25 Bypassing Prompt Injection and Jailbreak Detection in LLM Guardrai Large Language Models (LLMs) guardrail systems are designed to protect against prompt injection and jailbreak attacks. PAPERS AI
15.6.25 SmartAttack: Air-Gap Attack via Smartwatches Air-gapped systems are considered highly secure against data leaks due to their physical isolation from external networks. PAPERS PAPERS
21.4.25 KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities Linux kernel vulnerability reproduction is a critical task in systemsecurity. To reproduce a kernel vulnerability, the vulnerable environment and the Proof of Concept (PoC) program are needed. Most existing research focuses on the generation of PoC, while the construction of environment is overlooked. However, establishing an effective vulnerable environment to trigger a vulnerability is challenging PAPERS Vulnerebility

21.4.25

CDN Cannon: Exploiting CDN Back-to-Origin
Strategies for Amplification Attacks
Content Delivery Networks (CDNs) provide high availability, speed up content delivery, and safeguard against DDoS attacks for their hosting websites. To achieve the aforementioned objectives, CDN designs several back-to-origin strategies that proactively pre-pull resources and modify HTTP requests and responses.

PAPERS

ATTACK
21.4.25 ImageC2Gen: Customizing GenAI models to Conceal Commands in
Images for Command and Control (C2) Attacks
Command and Control (C2) attacks involve establishing an encrypted connection between victim
machines and C2 servers. Utilizing Image-based C2 makes it more challenging for the network security and forensic analysis, even when firewalls have decryption capabilities enabled.
PAPERS AI
13.4.25 We Have a Package for You! A Comprehensive Analysis of Package Hallucinations
by Code Generating LL
The reliance of popular programming languages such as Python and JavaScript on centralized package repositories and open-source software, combined with the emergence of code-generating Large Language Models (LLMs), has created a new type of threat to the software supply chain: package hallucinations. T PAPERS AI

6.4.25

Fast Flux

Many networks have a gap in their defenses for detecting and blocking a malicious technique known as “fast flux.”

PAPERS

MALWARE

24.2.25 SysBumps: Exploiting Speculative Execution in System Calls for
Breaking KASLR in macOS for Apple Silicon
Apple silicon is the proprietary ARM-based processor that powers the mainstream of Apple devices. The move to this proprietary architecture presents unique challenges in addressing security issues, requiring huge research efforts into the security of Apple silicon-based systems. In this paper, we study the security of KASLR, the randomization-based kernel hardening technique, on the stateof-the-art macOS system equipped with Apple silicon processors. PAPERS PAPERS
28.1.25 Uncovering New Classes of Kernel Vulnerabiliti Uncovering New Classes of Kernel Vulnerabiliti PAPERS PAPERS
25.1.25 FLOP: Breaking the Apple M3 CPU via False Load Output Predictions To bridge the ever-increasing gap between the fast execution speed of modern processors and the long latency of memory accesses, CPU vendors continue to introduce newer and more advanced optimizations. While these optimizations improve performance, research has repeatedly demonstrated that they may also have an adverse impact on security. PAPERS PAPERS
25.1.25 SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon Since Spectre’s initial disclosure in 2018, the difficulty of mitigating speculative execution attacks completely in hardware has led to the proliferation of several new variants and attack surfaces in the past six years. Most of the progeny build on top of the original Spectre attack’s key insight, namely that CPUs can execute the wrong control flow transiently and disclose secrets through side-channel traces when attempting to alleviate control hazards, such as conditional or indirect branches and return statements. PAPERS PAPERS

29.10.24

Breaking the Barrier: Post-Barrier Spectre Attack The effectiveness of transient execution defenses rests on obscure model-specific operations that must be correctly implemented in microcode and applied by software. In this paper, we study branch predictor invalidation through. PAPERS PAPERS

28.10.24

Multi-Turn Context Jailbreak Attack on Larg Large language models (LLMs) have significantly enhanced the performance of numerous applications, from intelligent conversations to text generation. However, their inherent security vulnerabilities have become an increasingly significant challenge, especially with respect to jailbreak attacks. PAPERS PAPERS

28.10.24

End-to-End Encrypted Cloud Storage in the Wild:
A Broken Ecosyst
Cloud storage is ubiquitous: Google Drive, Dropbox, and OneDrive are household names. However, these services do not provide end-to-end encryption (E2EE), meaning that the provider has access to the data stored on their servers. The promise of end-to-end encrypted cloud storage is that users can have the best of both worlds, keeping control of their data using cryptographic techniques, while still benefiting from low-cost storage solutions. PAPERS PAPERS

15.8.24

GhostWriteRISCVuzz: Discovering Architectural CPU Vulnerabilities via Differential Hardware FuzziPAPERSCPU

23.7.24

VIGORISH VIPERThis groundbreaking report unveils the discovery of a technology suite and its connection to
Chinese organized crime, money laundering, and human trafficking throughout Southeast Asia.
PAPERSPAPERS
13.7.24RADIUS/UDP Considered HarmfThe core of the RADIUS protocol predates modern secure cryptographic design. Surprisingly, in the two decades since Wang et al. demonstrated an MD5 hash collision in 2004, RADIUS has not been updated to remove MD5. In fact, RADIUS appears to have received notably little security analysis given its ubiquity in modern networks.PAPERSPAPERS

8.7.24

Caught in the Net: Using Infostealer
Logs to Unmask CSAM Consumers
In this proof-of-concept (PoC) report, we used Recorded Future Identity Intelligence’s vast trove of information stealer (“infostealer”) malware data to identify consumers of child sexual abuse material (CSAM), surface additional sources, and arrive at geographic and behavioral trends for the most popular sourcesPAPERSPAPERS
2.7.24Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch PredictThis paper introduces novel high-precision Branch Target Injection (BTI) attacks, leveraging the intricate structures of the Indirect Branch Predictor (IBP) and the Branch Target Buffer (BTB) in high-end Intel CPUs.PAPERSCPU
17.6.24Mass exploitationThe vulnerable edge of enterprise security PAPERSPAPERS
17.6.24ARM 'TIKTAG' attackTIKTAG: Breaking ARM’s Memory Tagging Extension with Speculative ExecutiPAPERSARM CPU

28.5.24

DNSBOMB: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-ResponsesDNSBomb is a new practical and powerful pulsing DoS attack exploiting DNS queries and responses. PapersDNS

10.5.24

Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing TablVirtual Private Networks (VPNs) authenticate and encrypt network traffic to protect users’ security and privacy, and are used in professional and personal settings to defend against malicious actors, circumvent censorship, remotely work from home, etc. It is therefore essential that VPNs are secure.PapersPapers

8.5.24

Pathfinder

Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor

Papers

CPU

3.5.24

The Shape of Money Laundering: Subgraph Representation
Learning on the Blockchain with the Elliptic2 Dataset

Subgraph representation learning is a technique for analyzing local structures (or shapes) within complex networks. Enabled by recent developments in scalable Graph Neural Networks (GNNs), this approach encodes relational information at a subgroup level (multiple connected nodes) rather than at a node level of abstraction.

Papers

Papers

5.4.24JSOutProx RAT Multi-Staged JSOutProx RAT Targets Indian Co-Operative Banks and Finance CompaniesPapersPapers
26.3.24Generic and Automated Drive-by GPU Cache Attacks
from the Browser
Generic and Automated Drive-by GPU Cache Attacks from the BrowserPapersPapers
16.3.24GhostRaceGhostRace: Exploiting and Mitigating Speculative Race ConditioPapersVulnerebility
4.3.24Fast Adversarial Attacks on Language Models In One GPU Minute  PapersCPU
4.3.24Abusing Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs PapersCPU

12.1.24

Flying Under the Radar: Abusing GitHub for Malicious Infrastructure Papers Malware

6.1.24

No-justice” wiper Papers Malware

1.1.24

Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation Papers Attack
16.11.23The attack against Danish, CLEAR critical infrastructure Papers ICS
15.11.23CacheWarp: Software-based Fault Injection using Selective State Res Papers CPU

27.10.23

iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices Papers Apple
26.8.23Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems  Papers Attack
13.7.23Digitally-Signed Rootkits are Back – A Look at FiveSys and Companions Papers Malware
5.5.23Iran turning to cyber-enabled influence operations for greater effect Papers Campaign
28.4.23Nomadic Octopus’ Paperbug Campaign Papers Campaign
17.4.23BlueBravo Uses Ambassador Lure to Deploy GraphicalNeutrino Malware Papers Malware

25.3.23

Detect and Prevent Web Shell Malware Papers Malware

17.3.23

SILKLOADER  Papers Malware

15.3.23

Operation ENDTRAD

 Papers

Operation

2022The Lazarus Constellation A study on North Korean malware Papers APT