KNIHOVNA()  HOME  PAPERS(523)  REPORTS(264)  CONFERENCE(22)  WHITEPAPERS(29)  KNIHY(24)  RFC popisy(9411)  SLOVNÍČEK(9)  Podpůrné materiály(16) 


DATE

NAME

CATEGORY

SUBCATE

INFO

21.4.25 KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities PAPERS Vulnerebility Linux kernel vulnerability reproduction is a critical task in systemsecurity. To reproduce a kernel vulnerability, the vulnerable environment and the Proof of Concept (PoC) program are needed. Most existing research focuses on the generation of PoC, while the construction of environment is overlooked. However, establishing an effective vulnerable environment to trigger a vulnerability is challenging

21.4.25

CDN Cannon: Exploiting CDN Back-to-Origin
Strategies for Amplification Attacks

PAPERS

ATTACK Content Delivery Networks (CDNs) provide high availability, speed up content delivery, and safeguard against DDoS attacks for their hosting websites. To achieve the aforementioned objectives, CDN designs several back-to-origin strategies that proactively pre-pull resources and modify HTTP requests and responses.
21.4.25 ImageC2Gen: Customizing GenAI models to Conceal Commands in
Images for Command and Control (C2) Attacks
PAPERS AI Command and Control (C2) attacks involve establishing an encrypted connection between victim
machines and C2 servers. Utilizing Image-based C2 makes it more challenging for the network security and forensic analysis, even when firewalls have decryption capabilities enabled.
13.4.25 We Have a Package for You! A Comprehensive Analysis of Package Hallucinations
by Code Generating LL
PAPERS AI The reliance of popular programming languages such as Python and JavaScript on centralized package repositories and open-source software, combined with the emergence of code-generating Large Language Models (LLMs), has created a new type of threat to the software supply chain: package hallucinations. T

6.4.25

Fast Flux

PAPERS

MALWARE

Many networks have a gap in their defenses for detecting and blocking a malicious technique known as “fast flux.”

24.2.25 SysBumps: Exploiting Speculative Execution in System Calls for
Breaking KASLR in macOS for Apple Silicon
PAPERS PAPERS Apple silicon is the proprietary ARM-based processor that powers the mainstream of Apple devices. The move to this proprietary architecture presents unique challenges in addressing security issues, requiring huge research efforts into the security of Apple silicon-based systems. In this paper, we study the security of KASLR, the randomization-based kernel hardening technique, on the stateof-the-art macOS system equipped with Apple silicon processors.
28.1.25 Uncovering New Classes of Kernel Vulnerabiliti PAPERS PAPERS Uncovering New Classes of Kernel Vulnerabiliti
25.1.25 FLOP: Breaking the Apple M3 CPU via False Load Output Predictions PAPERS PAPERS To bridge the ever-increasing gap between the fast execution speed of modern processors and the long latency of memory accesses, CPU vendors continue to introduce newer and more advanced optimizations. While these optimizations improve performance, research has repeatedly demonstrated that they may also have an adverse impact on security.
25.1.25 SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon PAPERS PAPERS Since Spectre’s initial disclosure in 2018, the difficulty of mitigating speculative execution attacks completely in hardware has led to the proliferation of several new variants and attack surfaces in the past six years. Most of the progeny build on top of the original Spectre attack’s key insight, namely that CPUs can execute the wrong control flow transiently and disclose secrets through side-channel traces when attempting to alleviate control hazards, such as conditional or indirect branches and return statements.

29.10.24

Breaking the Barrier: Post-Barrier Spectre Attack PAPERS PAPERS The effectiveness of transient execution defenses rests on obscure model-specific operations that must be correctly implemented in microcode and applied by software. In this paper, we study branch predictor invalidation through.

28.10.24

Multi-Turn Context Jailbreak Attack on Larg PAPERS PAPERS Large language models (LLMs) have significantly enhanced the performance of numerous applications, from intelligent conversations to text generation. However, their inherent security vulnerabilities have become an increasingly significant challenge, especially with respect to jailbreak attacks.

28.10.24

End-to-End Encrypted Cloud Storage in the Wild:
A Broken Ecosyst
PAPERS PAPERS Cloud storage is ubiquitous: Google Drive, Dropbox, and OneDrive are household names. However, these services do not provide end-to-end encryption (E2EE), meaning that the provider has access to the data stored on their servers. The promise of end-to-end encrypted cloud storage is that users can have the best of both worlds, keeping control of their data using cryptographic techniques, while still benefiting from low-cost storage solutions.

15.8.24

GhostWritePAPERSCPURISCVuzz: Discovering Architectural CPU Vulnerabilities via Differential Hardware Fuzzi

23.7.24

VIGORISH VIPERPAPERSPAPERSThis groundbreaking report unveils the discovery of a technology suite and its connection to
Chinese organized crime, money laundering, and human trafficking throughout Southeast Asia.
13.7.24RADIUS/UDP Considered HarmfPAPERSPAPERSThe core of the RADIUS protocol predates modern secure cryptographic design. Surprisingly, in the two decades since Wang et al. demonstrated an MD5 hash collision in 2004, RADIUS has not been updated to remove MD5. In fact, RADIUS appears to have received notably little security analysis given its ubiquity in modern networks.

8.7.24

Caught in the Net: Using Infostealer
Logs to Unmask CSAM Consumers
PAPERSPAPERSIn this proof-of-concept (PoC) report, we used Recorded Future Identity Intelligence’s vast trove of information stealer (“infostealer”) malware data to identify consumers of child sexual abuse material (CSAM), surface additional sources, and arrive at geographic and behavioral trends for the most popular sources
2.7.24Indirector: High-Precision Branch Target Injection Attacks Exploiting the Indirect Branch PredictPAPERSCPUThis paper introduces novel high-precision Branch Target Injection (BTI) attacks, leveraging the intricate structures of the Indirect Branch Predictor (IBP) and the Branch Target Buffer (BTB) in high-end Intel CPUs.
17.6.24Mass exploitationPAPERSPAPERSThe vulnerable edge of enterprise security
17.6.24ARM 'TIKTAG' attackPAPERSARM CPUTIKTAG: Breaking ARM’s Memory Tagging Extension with Speculative Executi

28.5.24

DNSBOMB: A New Practical-and-Powerful Pulsing DoS Attack Exploiting DNS Queries-and-ResponsesPapersDNSDNSBomb is a new practical and powerful pulsing DoS attack exploiting DNS queries and responses.

10.5.24

Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing TablPapersPapersVirtual Private Networks (VPNs) authenticate and encrypt network traffic to protect users’ security and privacy, and are used in professional and personal settings to defend against malicious actors, circumvent censorship, remotely work from home, etc. It is therefore essential that VPNs are secure.

8.5.24

Pathfinder

Papers

CPU

Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor

3.5.24

The Shape of Money Laundering: Subgraph Representation
Learning on the Blockchain with the Elliptic2 Dataset

Papers

Papers

Subgraph representation learning is a technique for analyzing local structures (or shapes) within complex networks. Enabled by recent developments in scalable Graph Neural Networks (GNNs), this approach encodes relational information at a subgroup level (multiple connected nodes) rather than at a node level of abstraction.

5.4.24JSOutProx RATPapersPapers Multi-Staged JSOutProx RAT Targets Indian Co-Operative Banks and Finance Companies
26.3.24Generic and Automated Drive-by GPU Cache Attacks
from the Browser
PapersPapersGeneric and Automated Drive-by GPU Cache Attacks from the Browser
16.3.24GhostRacePapersVulnerebilityGhostRace: Exploiting and Mitigating Speculative Race Conditio
4.3.24Fast Adversarial Attacks on Language Models In One GPU Minute PapersCPU 
4.3.24Abusing Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMsPapersCPU 

12.1.24

Flying Under the Radar: Abusing GitHub for Malicious InfrastructurePapers Malware 

6.1.24

No-justice” wiperPapers Malware 

1.1.24

Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number ManipulationPapers Attack 
16.11.23The attack against Danish, CLEAR critical infrastructurePapers ICS 
15.11.23CacheWarp: Software-based Fault Injection using Selective State ResPapers CPU 

27.10.23

iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple DevicesPapers Apple 
26.8.23Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems Papers Attack 
13.7.23Digitally-Signed Rootkits are Back – A Look at FiveSys and CompanionsPapers Malware 
5.5.23Iran turning to cyber-enabled influence operations for greater effectPapers Campaign 
28.4.23Nomadic Octopus’ Paperbug CampaignPapers Campaign 
17.4.23BlueBravo Uses Ambassador Lure to Deploy GraphicalNeutrino MalwarePapers Malware 

25.3.23

Detect and Prevent Web Shell MalwarePapers Malware 

17.3.23

SILKLOADER Papers Malware 

15.3.23

Operation ENDTRAD

Papers

Operation

 
2022The Lazarus Constellation A study on North Korean malwarePapers APT