
Sign up to save your podcasts
Or
Tal Be'ery and Roi Vazan
[Blog] [Video]
Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt InjectionKai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, and Mario Fritz
[Paper] [Code] [Demo Website]
Using ZK Proofs to Fight DisinformationTrisha Datta and Dan Boneh
[Slides] [Video] [Code] [Blog]
Crypto Agility and Post-Quantum Cryptography @ GoogleStefan Kölbl, Anvita Pandit, Rafael Misoczki, and Sophie Schmieg
[Code] [Video]
Server-side prototype pollution: Black-box detection without the DoSGareth Heyes
[Blog] [Slides] [Video]
Phantom of the Pipeline – Abusing Self-Hosted CI/CD RunnersAdnan Khan, Mason Davis, and Matt Jackoski
[Slides] [Code] [Blog]
Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit QueuesDomien Schepers, Aanjhan Ranganathan, and Mathy Vanhoef
[Slides] [Paper] [Video]
Let Me Unwind That For You: Exceptions to Backward-Edge ProtectionVictor Duta, Fabian Freyer, Fabio Pagani, Marius Muench, and Cristiano Giuffrida
[Slides] [Paper] [Code]
Protect the System Call, Protect (Most of) the World with BASTIONChristopher Jelesnianski, Mohannad Ismail, Yeongjin Jang, Dan Williams, and Changwoo Min
[Paper]
Interoperability in End-to-End Encrypted MessagingEsha Ghosh, Paul Grubbs, Julia Len, and Paul Rösler
[Slides] [Paper] [Video]
High Risk Users and Where to Find ThemMasha Sedova
[Paper] [Video]
Why I write my own security toolingJames Forshaw
[Code] [Video]
Polynonce: A tale of a novel ECDSA attack and Bitcoin tearsMarco Macchetti and Nils Amiet
[Blog] [Paper] [Code]
Finding 10x+ Performance Improvements in C++ with CodeQLSean Heelan
[Blog] [Code]
Bridging the gap in the static and dynamic analysis of binaries through decompiler tomfoolery!Zion Basque
[Code] [Video]
5
11 ratings
Tal Be'ery and Roi Vazan
[Blog] [Video]
Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt InjectionKai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, and Mario Fritz
[Paper] [Code] [Demo Website]
Using ZK Proofs to Fight DisinformationTrisha Datta and Dan Boneh
[Slides] [Video] [Code] [Blog]
Crypto Agility and Post-Quantum Cryptography @ GoogleStefan Kölbl, Anvita Pandit, Rafael Misoczki, and Sophie Schmieg
[Code] [Video]
Server-side prototype pollution: Black-box detection without the DoSGareth Heyes
[Blog] [Slides] [Video]
Phantom of the Pipeline – Abusing Self-Hosted CI/CD RunnersAdnan Khan, Mason Davis, and Matt Jackoski
[Slides] [Code] [Blog]
Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit QueuesDomien Schepers, Aanjhan Ranganathan, and Mathy Vanhoef
[Slides] [Paper] [Video]
Let Me Unwind That For You: Exceptions to Backward-Edge ProtectionVictor Duta, Fabian Freyer, Fabio Pagani, Marius Muench, and Cristiano Giuffrida
[Slides] [Paper] [Code]
Protect the System Call, Protect (Most of) the World with BASTIONChristopher Jelesnianski, Mohannad Ismail, Yeongjin Jang, Dan Williams, and Changwoo Min
[Paper]
Interoperability in End-to-End Encrypted MessagingEsha Ghosh, Paul Grubbs, Julia Len, and Paul Rösler
[Slides] [Paper] [Video]
High Risk Users and Where to Find ThemMasha Sedova
[Paper] [Video]
Why I write my own security toolingJames Forshaw
[Code] [Video]
Polynonce: A tale of a novel ECDSA attack and Bitcoin tearsMarco Macchetti and Nils Amiet
[Blog] [Paper] [Code]
Finding 10x+ Performance Improvements in C++ with CodeQLSean Heelan
[Blog] [Code]
Bridging the gap in the static and dynamic analysis of binaries through decompiler tomfoolery!Zion Basque
[Code] [Video]
361 Listeners
626 Listeners
590 Listeners
269 Listeners
7,879 Listeners
15,277 Listeners
43 Listeners