BOOTKITTY: A Stealthy Bootkit-Rootkit Against Modern Operating Systems
|
|
|
|
๐ Appendix
|
Be Write Back: An in-depth Study of Fault Injection Effects on FRAM Technology
|
|
|
|
|
Bluetooth Security Testing with BlueToolkit: a Large-Scale Automotive Case Study
|
|
|
|
๐ฆ Artifact
๐ Appendix
|
Comma Separated Vulnerabilities: Detecting Formula Injection in the Wild
|
|
|
|
๐ฆ Artifact
|
DeepRed: A Deep LearningโPowered Command and Control Framework for Multi-Stage Red Teaming Against ML-based Network Intrusion Detection Systems
|
|
|
|
๐ฆ Artifact
๐ Appendix
|
Extract: A PHP Foot-Gun Case Study
|
|
|
|
๐ฆ Artifact
๐ Appendix
|
Extraction of Secrets from 40nm CMOS Gate Dielectric Breakdown Antifuses by FIB Passive Voltage Contrast
|
|
|
|
๐ฆ Artifact
|
FUZZVPN: Finding Vulnerabilities in OpenVPN
|
|
|
|
๐ฆ Artifact
|
GlitchGlรผck: Enabling Software Vulnerabilities through Guided Hardware Fault Injection
|
|
|
|
๐ฆ Artifact
๐ Appendix
|
Making Acoustic Side-Channel Attacks on Noisy Keyboards Viable with LLM-Assisted Spectrogramsโ Typo Correction
|
|
|
|
๐ฆ Artifact
๐ Appendix
|
No Key, No Problem: Vulnerabilities in Master Lock Smart Locks
|
|
|
|
|
Oops, It Halted Again: Exploiting PLC Memory for Fun and Profit in Industrial Control Systems
|
|
|
|
|
Prekey Pogo: Investigating Security and Privacy Issues in WhatsAppโs Handshake Mechanism
|
|
|
|
๐ฆ Artifact
๐ Appendix
|
Reality Check on Side-Channels: Lessons learnt from breaking AES on ARM Cortex-A72 processor with Out-of-Order Execution
|
|
|
|
๐ฆ Artifact
๐ Appendix
|
SecurePoC: A Helping Hand to Identify Malicious CVE Proof of Concept Exploits in GitHub
|
|
|
|
๐ฆ Artifact
๐ Appendix
|
Security through Transparency: Tales from the RP2350 Hacking Challenge
|
|
|
|
๐ฆ Artifact
๐ Appendix
|
Stealth BGP Hijacks with uRPF Filtering
|
|
|
|
๐ฆ Artifact
๐ Appendix
|