KNIHOVNA()  HOME  PAPERS(523)  REPORTS(264)  CONFERENCE(22)  WHITEPAPERS(29)  KNIHY(24)  RFC popisy(9411)  SLOVNÍČEK(9)  Podpůrné materiály(16) 


DATE

NAME

CATEGORY

SUBCATE

INFO

29.10.24

Breaking the Barrier: Post-Barrier Spectre Attac PAPERS PAPERS The effectiveness of transient execution defenses rests on obscure model-specific operations that must be correctly implemented in microcode and applied by software. In this paper, we study branch predictor invalidation through.

28.10.24

Multi-Turn Context Jailbreak Attack on Larg PAPERS PAPERS Large language models (LLMs) have significantly enhanced the performance of numerous applications, from intelligent conversations to text generation. However, their inherent security vulnerabilities have become an increasingly significant challenge, especially with respect to jailbreak attacks.

28.10.24

End-to-End Encrypted Cloud Storage in the Wild:
A Broken Ecosyst
PAPERS PAPERS Cloud storage is ubiquitous: Google Drive, Dropbox, and OneDrive are household names. However, these services do not provide end-to-end encryption (E2EE), meaning that the provider has access to the data stored on their servers. The promise of end-to-end encrypted cloud storage is that users can have the best of both worlds, keeping control of their data using cryptographic techniques, while still benefiting from low-cost storage solutions.

15.8.24

GhostWritePAPERSCPURISCVuzz: Discovering Architectural CPU Vulnerabilities via Differential Hardware Fuzzi

23.7.24

VIGORISH VIPERPAPERSPAPERSThis groundbreaking report unveils the discovery of a technology suite and its connection to
Chinese organized crime, money laundering, and human trafficking throughout Southeast Asia.
13.7.24RADIUS/UDP Considered HarmfPAPERSPAPERSThe core of the RADIUS protocol predates modern secure cryptographic design. Surprisingly, in the two decades since Wang et al. demonstrated an MD5 hash collision in 2004, RADIUS has not been updated to remove MD5. In fact, RADIUS appears to have received notably little security analysis given its ubiquity in modern networks.

8.7.24

Caught in the Net: Using Infostealer
Logs to Unmask CSAM Consumers
PAPERSPAPERSIn this proof-of-concept (PoC) report, we used Recorded Future Identity Intelligence’s vast trove of information stealer (“infostealer”) malware data to identify consumers of child sexual abuse material (CSAM), surface additional sources, and arrive at geographic and behavioral trends for the most popular sources
2.7.24Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch PredictPAPERSCPUThis paper introduces novel high-precision Branch Target Injection (BTI) attacks, leveraging the intricate structures of the Indirect Branch Predictor (IBP) and the Branch Target Buffer (BTB) in high-end Intel CPUs.
17.6.24Mass exploitationPAPERSPAPERSThe vulnerable edge of enterprise security
17.6.24ARM 'TIKTAG' attackPAPERSARM CPUTIKTAG: Breaking ARM’s Memory Tagging Extension with Speculative Executi

28.5.24

DNSBOMB: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-ResponsesPapersDNSDNSBomb is a new practical and powerful pulsing DoS attack exploiting DNS queries and responses.

10.5.24

Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing TablPapersPapersVirtual Private Networks (VPNs) authenticate and encrypt network traffic to protect users’ security and privacy, and are used in professional and personal settings to defend against malicious actors, circumvent censorship, remotely work from home, etc. It is therefore essential that VPNs are secure.

8.5.24

Pathfinder

Papers

CPU

Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor

3.5.24

The Shape of Money Laundering: Subgraph Representation
Learning on the Blockchain with the Elliptic2 Dataset

Papers

Papers

Subgraph representation learning is a technique for analyzing local structures (or shapes) within complex networks. Enabled by recent developments in scalable Graph Neural Networks (GNNs), this approach encodes relational information at a subgroup level (multiple connected nodes) rather than at a node level of abstraction.

5.4.24JSOutProx RATPapersPapersMulti-Staged JSOutProx RAT Targets Indian Co-Operative Banks and Finance Companies
26.3.24Generic and Automated Drive-by GPU Cache Attacks
from the Browser
PapersPapersGeneric and Automated Drive-by GPU Cache Attacks from the Browser
16.3.24GhostRacePapersVulnerebilityGhostRace: Exploiting and Mitigating Speculative Race Conditio
4.3.24Fast Adversarial Attacks on Language Models In One GPU Minute PapersCPU 
4.3.24Abusing Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMsPapersCPU 

12.1.24

Flying Under the Radar: Abusing GitHub for Malicious InfrastructurePapersMalware 

6.1.24

No-justice” wiperPapersMalware 

1.1.24

Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number ManipulationPapersAttack 
16.11.23The attack against Danish, CLEAR critical infrastructurePapersICS 
15.11.23CacheWarp: Software-based Fault Injection using Selective State ResPapersCPU 

27.10.23

iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple DevicesPapersApple 
26.8.23Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems PapersAttack 
13.7.23Digitally-Signed Rootkits are Back – A Look at FiveSys and CompanionsPapersMalware 
5.5.23Iran turning to cyber-enabled influence operations for greater effectPapersCampaign 
28.4.23Nomadic Octopus’ Paperbug CampaignPapersCampaign 
17.4.23BlueBravo Uses Ambassador Lure to Deploy GraphicalNeutrino MalwarePapersMalware 

25.3.23

Detect and Prevent Web Shell MalwarePapersMalware 

17.3.23

SILKLOADER PapersMalware 

15.3.23

Operation ENDTRAD

Papers

Operation

 
2022The Lazarus Constellation A study on North Korean malwarePapersAPT 

sec23winter-prepub-4-ren.pdf

sec23winter-prepub-107-bouhoula.pdf

GoGoGadget_Camera.pdf

sec23winter-prepub-347-allen.pdf

sec24fall-prepub-71-maxam.pdf

sec23winter-prepub-559-ao.pdf

sec23winter-prepub-506-wen.pdf

sec23winter-prepub-350-cai.pdf

sec23winter-prepub-21-olgun.pdf

sec24fall-prepub-93-dossche.pdf

Untitled

sec24fall-prepub-200-wang-shuo.pdf

sec24fall-prepub-498-sharevski.pdf

 

 

 

 

 

 

 

 

 
 
 
 
 
 
sec24fall-prepub-690-xin.pdf
 
sec24fall-prepub-921-schilling.pdf
 
sec24fall-prepub-849-xie-xiang.pdf
 
sec24fall-prepub-699-liu-dongli.pdf
 
ZenHammer: Rowhammer Attacks on AMD Zen-based Platforms
 
sec24fall-prepub-993-mazzocca.pdf
 
sec24fall-prepub-1100-johannesmeyer.pdf
 
sec24fall-prepub-1439-duta.pdf
 
sec24fall-prepub-1479-layton.pdf
 
sec24fall-prepub-1297-chen-boru.pdf
 
sec24fall-prepub-1504-wang-zicheng.pdf
 
sec24fall-prepub-1705-kostan.pdf
 
sec24fall-prepub-1985-noorbakhsh.pdf
 
sec24fall-prepub-1157-wang-haichen.pdf
 
sec24fall-prepub-2129-yuan.pdf
 
sec24fall-prepub-2543-yue.pdf
 
sec24summer-prepub-207-feng.pdf
 
sec24summer-prepub-208-yang-yibin.pdf
 
sec24summer-prepub-245-meng.pdf
 
sec24summer-prepub-301-xiang-yi.pdf
 
sec24summer-prepub-278-liu-fengrun.pdf
 
sec24summer-prepub-346-he.pdf
 
sec24summer-prepub-332-annamalai.pdf
 
sec24summer-prepub-373-diaa.pdf
 
sec24fall-prepub-2868-wang-lijin.pdf
 
sec24summer-prepub-476-nie.pdf
 
sec24summer-prepub-482-kang.pdf
 
sec24summer-prepub-517-oygenblik.pdf
 
CalcuLatency: Leveraging Cross-Layer Network Latency Measurements to Detect Proxy-Enabled Abuse
 
sec24summer-prepub-685-xing.pdf
 
sec24summer-prepub-742-zhang-ruiyi.pdf
 
sec24summer-prepub-980-bognar.pdf
 
sec24summer-prepub-965-williams.pdf
 
sec24summer-prepub-743-li.pdf
 
sec24summer-prepub-702-zhai.pdf
 
sec24summer-prepub-1096-wang-zihao.pdf
 
sec24summer-prepub-1534-bailey.pdf