
Sign up to save your podcasts
Or
Nate Warfield
[Slides]
Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhonesJiska Classen, Alexander Heinrich, Robert Reith, and Matthias Hollick
[Slides] [Paper]
AirTag of the Clones: Shenanigans with Liberated Item FindersThomas Roth, Fabian Freyer, Matthias Hollick, and Jiska Classen
[Paper] [Code]
Are Blockchains Decentralised?Evan Sultanik, Alexander Remie, Felipe Manzano, Trent Brunson, Sam Moelius, Eric Kilmer, Mike Myers, Talley Amir, and Sonya Schriner
[Blog] [Paper] [Audio]
What Log4j teaches us about the Software Supply ChainStephen Magill
[Slides] [Video]
Kani Rust VerifierDaniel Schwartz-Narbonne and Zyad Hassan
[Slides] [Video] [Code]
Cross-Language AttacksSamuel Mergendahl, Nathan Burow, and Hamed Okhravi
[Paper]
Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent ThreatsGiorgio Di Tizio, Michele Armellini, and Fabio Massacci
[Paper] [Data]
AMD Secure Processor for Confidential Computing Security ReviewCfir Cohen, James Forshaw, Jann Horn, and Mark Brand
[Blog] [Paper]
Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware EcosystemMatt Graebar
[Slides]
A Kernel Hacker Meets Fuchsia OSAlexander Popov
[Blog] [Video]
Adaptive Multi-objective Optimization in Gray-box FuzzingGen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang, Xu Zhou, and Kai Lu
[Paper]
Cooper Knows the Shortest Stave: Finding 134 Bugs in the Binding Code of Scripting Languages with Cooperative MutationXu Peng, Yanhao Wang, Hong Hu, and Purui Su
[Slides] [Paper] [Code]
Bypassing CSP with dangling iframesGareth Heyes
[Blog]
Bypassing Dangling Markup Injection Mitigation Bypass in ChromeSeungJu Oh
[Bug report] [Blog]
Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the WebAvinash Sudhodanan and Andrew Paverd
[Blog] [Paper]
5
11 ratings
Nate Warfield
[Slides]
Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhonesJiska Classen, Alexander Heinrich, Robert Reith, and Matthias Hollick
[Slides] [Paper]
AirTag of the Clones: Shenanigans with Liberated Item FindersThomas Roth, Fabian Freyer, Matthias Hollick, and Jiska Classen
[Paper] [Code]
Are Blockchains Decentralised?Evan Sultanik, Alexander Remie, Felipe Manzano, Trent Brunson, Sam Moelius, Eric Kilmer, Mike Myers, Talley Amir, and Sonya Schriner
[Blog] [Paper] [Audio]
What Log4j teaches us about the Software Supply ChainStephen Magill
[Slides] [Video]
Kani Rust VerifierDaniel Schwartz-Narbonne and Zyad Hassan
[Slides] [Video] [Code]
Cross-Language AttacksSamuel Mergendahl, Nathan Burow, and Hamed Okhravi
[Paper]
Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent ThreatsGiorgio Di Tizio, Michele Armellini, and Fabio Massacci
[Paper] [Data]
AMD Secure Processor for Confidential Computing Security ReviewCfir Cohen, James Forshaw, Jann Horn, and Mark Brand
[Blog] [Paper]
Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware EcosystemMatt Graebar
[Slides]
A Kernel Hacker Meets Fuchsia OSAlexander Popov
[Blog] [Video]
Adaptive Multi-objective Optimization in Gray-box FuzzingGen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang, Xu Zhou, and Kai Lu
[Paper]
Cooper Knows the Shortest Stave: Finding 134 Bugs in the Binding Code of Scripting Languages with Cooperative MutationXu Peng, Yanhao Wang, Hong Hu, and Purui Su
[Slides] [Paper] [Code]
Bypassing CSP with dangling iframesGareth Heyes
[Blog]
Bypassing Dangling Markup Injection Mitigation Bypass in ChromeSeungJu Oh
[Bug report] [Blog]
Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the WebAvinash Sudhodanan and Andrew Paverd
[Blog] [Paper]
361 Listeners
626 Listeners
590 Listeners
269 Listeners
7,879 Listeners
15,277 Listeners
43 Listeners