CustomProcessingUnit: Reverse Engineering and Customization of Intel Microcode
|
|
|
Artifact
|
Hakuin: Optimizing Blind SQL Injection with Probabilistic Language Models
|
|
|
Artifact
|
Emoji shellcoding in RISC-V
|
|
|
Artifact
|
ROPfuscator: Robust Obfuscation with ROP
|
|
|
Artifact
|
The ghost is the machine: weird machines in transient execution
|
|
|
Artifact
|
Divergent Representations: When Compiler Optimizations Enable Exploitation
|
|
|
Artifact
|
Reflections on Trusting Docker: Invisible Malware in Continuous Integration Systems
|
|
|
Artifact
|
ASanity: On Bug Shadowing by Early ASan Exits
|
|
|
Artifact
|
ESPwn32: Hacking with ESP32 System-on-Chips
|
|
|
Artifact
|