Player FMアプリでオフラインにしPlayer FMう!
ThinkstScapes Research Roundup - Q2 - 2022
Manage episode 335862949 series 3290432
I am become loadbalancer, owner of your network
Nate Warfield
[Slides]
Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones
Jiska Classen, Alexander Heinrich, Robert Reith, and Matthias Hollick
AirTag of the Clones: Shenanigans with Liberated Item Finders
Thomas Roth, Fabian Freyer, Matthias Hollick, and Jiska Classen
Are Blockchains Decentralised?
Evan Sultanik, Alexander Remie, Felipe Manzano, Trent Brunson, Sam Moelius, Eric Kilmer, Mike Myers, Talley Amir, and Sonya Schriner
What Log4j teaches us about the Software Supply Chain
Stephen Magill
Kani Rust Verifier
Daniel Schwartz-Narbonne and Zyad Hassan
Cross-Language Attacks
Samuel Mergendahl, Nathan Burow, and Hamed Okhravi
[Paper]
Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats
Giorgio Di Tizio, Michele Armellini, and Fabio Massacci
AMD Secure Processor for Confidential Computing Security Review
Cfir Cohen, James Forshaw, Jann Horn, and Mark Brand
Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware Ecosystem
Matt Graebar
[Slides]
A Kernel Hacker Meets Fuchsia OS
Alexander Popov
Adaptive Multi-objective Optimization in Gray-box Fuzzing
Gen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang, Xu Zhou, and Kai Lu
[Paper]
Cooper Knows the Shortest Stave: Finding 134 Bugs in the Binding Code of Scripting Languages with Cooperative Mutation
Xu Peng, Yanhao Wang, Hong Hu, and Purui Su
Bypassing CSP with dangling iframes
Gareth Heyes
[Blog]
Bypassing Dangling Markup Injection Mitigation Bypass in Chrome
SeungJu Oh
[Bug report] [Blog]
Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web
Avinash Sudhodanan and Andrew Paverd
12 つのエピソード
Manage episode 335862949 series 3290432
I am become loadbalancer, owner of your network
Nate Warfield
[Slides]
Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones
Jiska Classen, Alexander Heinrich, Robert Reith, and Matthias Hollick
AirTag of the Clones: Shenanigans with Liberated Item Finders
Thomas Roth, Fabian Freyer, Matthias Hollick, and Jiska Classen
Are Blockchains Decentralised?
Evan Sultanik, Alexander Remie, Felipe Manzano, Trent Brunson, Sam Moelius, Eric Kilmer, Mike Myers, Talley Amir, and Sonya Schriner
What Log4j teaches us about the Software Supply Chain
Stephen Magill
Kani Rust Verifier
Daniel Schwartz-Narbonne and Zyad Hassan
Cross-Language Attacks
Samuel Mergendahl, Nathan Burow, and Hamed Okhravi
[Paper]
Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats
Giorgio Di Tizio, Michele Armellini, and Fabio Massacci
AMD Secure Processor for Confidential Computing Security Review
Cfir Cohen, James Forshaw, Jann Horn, and Mark Brand
Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware Ecosystem
Matt Graebar
[Slides]
A Kernel Hacker Meets Fuchsia OS
Alexander Popov
Adaptive Multi-objective Optimization in Gray-box Fuzzing
Gen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang, Xu Zhou, and Kai Lu
[Paper]
Cooper Knows the Shortest Stave: Finding 134 Bugs in the Binding Code of Scripting Languages with Cooperative Mutation
Xu Peng, Yanhao Wang, Hong Hu, and Purui Su
Bypassing CSP with dangling iframes
Gareth Heyes
[Blog]
Bypassing Dangling Markup Injection Mitigation Bypass in Chrome
SeungJu Oh
[Bug report] [Blog]
Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web
Avinash Sudhodanan and Andrew Paverd
12 つのエピソード
すべてのエピソード
×プレーヤーFMへようこそ!
Player FMは今からすぐに楽しめるために高品質のポッドキャストをウェブでスキャンしています。 これは最高のポッドキャストアプリで、Android、iPhone、そしてWebで動作します。 全ての端末で購読を同期するためにサインアップしてください。