OCSF.pdf
206.9 KB
#Infosec_Standards
Open Cybersecurity Schema Framework
https://schema.ocsf.io
]-> https://github.com/ocsf/ocsf-schema
📰
📚
Open Cybersecurity Schema Framework
https://schema.ocsf.io
]-> https://github.com/ocsf/ocsf-schema
📰
📚
sec22_arp.pdf
716.7 KB
#Research
"Dos and Don'ts of Machine Learning in Computer Security", 2022.
]-> https://dodo-mlsec.org
📰
📚
"Dos and Don'ts of Machine Learning in Computer Security", 2022.
]-> https://dodo-mlsec.org
📰
📚
Vulnerabilities_Live_in_Code.pdf
6.9 MB
#Threat_Research
"How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes", 2022.
📰
📚
"How Long Do Vulnerabilities Live in the Code? A Large-Scale Empirical Measurement Study on FOSS Vulnerability Lifetimes", 2022.
📰
📚
aepic_leak.pdf
263.9 KB
#Research
"ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture", 2022.
]-> https://aepicleak.com
📰
📚
"ÆPIC Leak: Architecturally Leaking Uninitialized Data from the Microarchitecture", 2022.
]-> https://aepicleak.com
📰
📚
P1OVD.pdf
387.4 KB
#Research
"P1OVD: Patch-Based 1-Day Out-of-Bounds Vulnerabilities Detection Tool for Downstream Binaries", 2022.
📰
📚
"P1OVD: Patch-Based 1-Day Out-of-Bounds Vulnerabilities Detection Tool for Downstream Binaries", 2022.
📰
📚
Samsung_TrustZone.pdf
2.1 MB
#Research
#cryptography
#Hardware_Security
"Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design", USENIX 2022.
// In this work, we expose the cryptographic design and implementation of Android's Hardware-Backed Keystore in Samsung's Galaxy S8, S9, S10, S20, S21 devices
]-> Repo: https://github.com/shakevsky/keybuster
📰
📚
#cryptography
#Hardware_Security
"Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design", USENIX 2022.
// In this work, we expose the cryptographic design and implementation of Android's Hardware-Backed Keystore in Samsung's Galaxy S8, S9, S10, S20, S21 devices
]-> Repo: https://github.com/shakevsky/keybuster
📰
📚
LISSA.pdf
733.3 KB
#Research
"LISSA: An efficient symbolic execution approach for programs manipulating complex heap-allocated data structures", 2022.
]-> Repo: https://github.com/JuanmaCopia/lissa
📰
📚
"LISSA: An efficient symbolic execution approach for programs manipulating complex heap-allocated data structures", 2022.
]-> Repo: https://github.com/JuanmaCopia/lissa
📰
📚
Texas_Instruments_Attack.pdf
2.8 MB
#Research
"On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks", 2022.
]-> Non-invasive physical attacks on SimpleLink microcontrollers:
https://github.com/KULeuven-COSIC/SimpleLink-FI
📰
📚
"On the susceptibility of Texas Instruments SimpleLink platform microcontrollers to non-invasive physical attacks", 2022.
]-> Non-invasive physical attacks on SimpleLink microcontrollers:
https://github.com/KULeuven-COSIC/SimpleLink-FI
📰
📚
Forgotten_Threat_Voltage_Glitching.pdf
4 MB
#Research
#Hardware_Security
"The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs", 2021.
📰
📚
#Hardware_Security
"The Forgotten Threat of Voltage Glitching: A Case Study on Nvidia Tegra X2 SoCs", 2021.
📰
📚
Attacks_neural_net.pdf
5.7 MB
#Research
"Attacks On Image Processing Neural Networks", 2022.
]-> Repo: https://github.com/oreganko/Attacks-On-Image-Processing-Neural-Networks
📰
📚
"Attacks On Image Processing Neural Networks", 2022.
]-> Repo: https://github.com/oreganko/Attacks-On-Image-Processing-Neural-Networks
📰
📚
SIDH_Key_Recovery.pdf
429 KB
#cryptography
"An Efficient Key Recovery Attack on Supersingular Isogeny Diffie-Hellman (SIDH) Protocol (Preliminary Version)", 2022.
📰
📚
"An Efficient Key Recovery Attack on Supersingular Isogeny Diffie-Hellman (SIDH) Protocol (Preliminary Version)", 2022.
📰
📚
stealthy_quasar_evolving.pdf
11.2 MB
#Whitepaper
#Malware_analysis
"Stealthy Quasar Evolving to Lead the RAT Race: Technical Analysis of a Quasar RAT Campaign", 22.07.2022.
📰
📚
#Malware_analysis
"Stealthy Quasar Evolving to Lead the RAT Race: Technical Analysis of a Quasar RAT Campaign", 22.07.2022.
📰
📚
Attack_Surface_Enumerating_Auth_Methods.pdf
2.8 MB
#Research
"Exploring Azure Active Directory Attack Surface: Enumerating Authentication Methods with Open-Source Intelligence Tools", 2022.
📰
📚
"Exploring Azure Active Directory Attack Surface: Enumerating Authentication Methods with Open-Source Intelligence Tools", 2022.
📰
📚