KNIHOVNA
2026()
2025()
2024()
2023()
2022()
OTHER()
HOME PAPERS(523) REPORTS(264)
WHITEPAPERS(29)
KNIHY(24) RFC popisy(9411)
SLOVNÍČEK(9) Podpůrné materiály(16)
DATE |
NAME |
INFO |
CATEGORY |
SUBCATE |
| 28.4.26 | LEROBOT: AN OPEN-SOURCE LIBRARY FOR END-TO-END ROBOT LEARNING | Robotics is undergoing a significant transformation powered by advances in highlevel control techniques based on machine learning, giving rise to the field of robot learning. | PAPERS | PAPERS |
| 26.4.26 | GopherWhisper | GopherWhisper: A burrow full of malware | PAPERS | PAPERS |
| 10.4.26 | ESPIONAGE FOR REPRESSION: FORENSIC ANALYSIS OF A CROSS-BORDER HACK-FOR-HIRE CAMPAIGN TARGETING CIVIL SOCIETY IN MENA | ESPIONAGE FOR REPRESSION: FORENSIC ANALYSIS OF A CROSS-BORDER HACK-FOR-HIRE CAMPAIGN TARGETING CIVIL SOCIETY IN MENA | PAPERS | PAPERS |
| 8.4.26 | GeForge: Hammering GDDR Memory to Forge GPU Page Tables for Fun and Profit | Over the years, Rowhammer has been leveraged to mount a wide range of attacks against system main memory. | PAPERS | PAPERS |
| 8.4.26 |
GDDRHammer:
Greatly Disturbing DRAM Rows — Cross-Component Rowhammer Attacks from Modern GPUs |
While Rowhammer has been extensively studied in CPU-based memory systems, a very recent work by Lin etal. (USENIX Security ‘25) extended this line of research to GDDR6 GPU memory, demonstrating the first Rowhammer bit flips on NVIDIA GPUs | PAPERS | PAPERS |
| 8.4.26 | GPUHammer: Rowhammer Attacks on GPU Memories are Practical | Rowhammer is a read disturbance vulnerability in modern DRAM that causes bit-flips, compromising security and reliability. | PAPERS | PAPERS |
| 17.2.26 |
Zero Knowledge
(About) Encryption: A Comparative Security Analysis of Three Cloud-based Password Managers |
Zero Knowledge Encryption is a term widely used by vendors of cloud-based password managers. Although it has no strict technical meaning, the term conveys the idea that the server, who stores encrypted password vaults on behalf of users, is unable to learn anything about the contents of those vaults. | PAPERS | PAPERS |
| 5.2.26 |
The Trigger in the
Haystack: Extracting and Reconstructing LLM Backdoor Triggers |
Detecting whether a model has been poisoned is a longstanding problem in AI security. In this work, we present a practical scanner for identifying sleeper agent-style backdoors in causal language models. | PAPERS | PAPERS |
| 23.1.26 | Ransomware 2026 | New Actors and Threats Emerge as the Threat Landscape Evolves | PAPERS | PAPERS |
| 19.1.26 |
StackWarp: Breaking AMD SEV-SNP Integrity via Deterministic Stack-Pointer Manipulation through the CPU’s Stack Engine |
Confidential Virtual Machines (CVMs), such as AMD SEVSNP, aim
to protect guest operating systems from an untrusted host by encrypting state and constraining privileged control. These platforms promise isolation even in multi-tenant cloud setups where simultaneous multithreading (SMT) remains enabled |
PAPERS | PAPERS |