
Sign up to save your podcasts
Or
Erik Rye and Robert Beverly
[Slides] [Paper] [Code]
Device Tracking via Linux’s New TCP Source Port Selection AlgorithmMoshe Kol, Amit Klein, and Yossi Gilad
[Code] [Paper]
zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity InfrastructureMichael Rosenberg, Jacob White, Christina Garman, and Ian Miers
[Paper] [Code]
3 Years in China: A Tale of Building a REAL Full Speed Anti-Censorship RouterKaiJern Lau
[Slides] [Code] [Video]
Embedded [in]securityEmbedded Threats: A Deep Dive into the Attack Surface and Security Implications of eSIM TechnologyMarkus Vevier
[Code] [Video]
RPMB, a secret place inside the eMMCSergio Prado
[Blog]
Compromising Garmin’s Sport Watches: A Deep Dive into GarminOS and its MonkeyC Virtual MachineTao Sauvage
[Blog] [Video] [Slides]
The Impostor Among US(B): Off-Path Injection Attacks on USB CommunicationsRobert Dumitru, Daniel Genkin, Andrew Wabnitz, and Yuval Yarom
[Code] [Paper]
MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection AttacksTiantian Liu, Feng Lin, Zhangsen Wang, Chao Wang, Zhongjie Ba, Li Lu, Wenyao Xu, and Kui Ren
[Code] [Paper]
Issues at the operating system level(Windows) Hello from the Other SideDirk-jan Mollema
[Slides] [Code]
Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML SignaturesSimon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, and Jörg Schwenk
[Paper] [Code]
Dirty Bin Cache: A New Code Injection Poisoning Binary Translation CacheKoh Nakagawa
[Slides] [Code]
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 DecodersWilly R. Vasquez, Stephen Checkoway, and Hovav Shacham
[Slides] [Paper] [Code]
Nifty sundriesEverParse: Secure Binary Data Parsers for EveryoneTahina Ramananandro
[Slides] [Code]
InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force AttackYu Chen, Yang Yu, and Lidong Zhai
[Paper]
It’s (DOM) Clobbering Time: Attack Techniques, Prevalence, and DefensesSoheil Khodayari and Giancarlo Pellegrino
[Code] [Paper] [Site]
Can you trust ChatGPT’s package recommendations?Bar Lanyado, Ortal Keizman, and Yair Divinsky
[Blog]
Phoenix Domain Attack: Vulnerable Links in Domain Name Delegation and RevocationXiang Li, Baojun Liu, Xuesong Bai, Mingming Zhang, Qifan Zhang, Zhou Li, Haixin Duan, and Qi Li
[Slides] [Paper]
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP RedirectsXuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, and Ke Xu
[Website] [Paper]
5
11 ratings
Erik Rye and Robert Beverly
[Slides] [Paper] [Code]
Device Tracking via Linux’s New TCP Source Port Selection AlgorithmMoshe Kol, Amit Klein, and Yossi Gilad
[Code] [Paper]
zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity InfrastructureMichael Rosenberg, Jacob White, Christina Garman, and Ian Miers
[Paper] [Code]
3 Years in China: A Tale of Building a REAL Full Speed Anti-Censorship RouterKaiJern Lau
[Slides] [Code] [Video]
Embedded [in]securityEmbedded Threats: A Deep Dive into the Attack Surface and Security Implications of eSIM TechnologyMarkus Vevier
[Code] [Video]
RPMB, a secret place inside the eMMCSergio Prado
[Blog]
Compromising Garmin’s Sport Watches: A Deep Dive into GarminOS and its MonkeyC Virtual MachineTao Sauvage
[Blog] [Video] [Slides]
The Impostor Among US(B): Off-Path Injection Attacks on USB CommunicationsRobert Dumitru, Daniel Genkin, Andrew Wabnitz, and Yuval Yarom
[Code] [Paper]
MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection AttacksTiantian Liu, Feng Lin, Zhangsen Wang, Chao Wang, Zhongjie Ba, Li Lu, Wenyao Xu, and Kui Ren
[Code] [Paper]
Issues at the operating system level(Windows) Hello from the Other SideDirk-jan Mollema
[Slides] [Code]
Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML SignaturesSimon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, and Jörg Schwenk
[Paper] [Code]
Dirty Bin Cache: A New Code Injection Poisoning Binary Translation CacheKoh Nakagawa
[Slides] [Code]
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 DecodersWilly R. Vasquez, Stephen Checkoway, and Hovav Shacham
[Slides] [Paper] [Code]
Nifty sundriesEverParse: Secure Binary Data Parsers for EveryoneTahina Ramananandro
[Slides] [Code]
InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force AttackYu Chen, Yang Yu, and Lidong Zhai
[Paper]
It’s (DOM) Clobbering Time: Attack Techniques, Prevalence, and DefensesSoheil Khodayari and Giancarlo Pellegrino
[Code] [Paper] [Site]
Can you trust ChatGPT’s package recommendations?Bar Lanyado, Ortal Keizman, and Yair Divinsky
[Blog]
Phoenix Domain Attack: Vulnerable Links in Domain Name Delegation and RevocationXiang Li, Baojun Liu, Xuesong Bai, Mingming Zhang, Qifan Zhang, Zhou Li, Haixin Duan, and Qi Li
[Slides] [Paper]
Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP RedirectsXuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, and Ke Xu
[Website] [Paper]
361 Listeners
626 Listeners
590 Listeners
269 Listeners
7,879 Listeners
15,277 Listeners
43 Listeners