vca_mute.pdf
6.3 MB
#Research
"Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps", 2022.
📰
📚
"Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps", 2022.
📰
📚
NARCISSUS.pdf
1.8 MB
#Research
"NARCISSUS: A Practical Clean-Label Backdoor Attack with Limited Information", 2022.
]-> The official implementation of Narcissus clean-label backdoor attack:
https://github.com/ruoxi-jia-group/Narcissus-backdoor-attack
📰
📚
"NARCISSUS: A Practical Clean-Label Backdoor Attack with Limited Information", 2022.
]-> The official implementation of Narcissus clean-label backdoor attack:
https://github.com/ruoxi-jia-group/Narcissus-backdoor-attack
📰
📚
SQL_Injection_Strategies.pdf
15.7 MB
#Tech_book
"SQL Injection Strategies:
Practical techniques to secure old vulnerabilities against modern attacks", 2020.
📰
📚
"SQL Injection Strategies:
Practical techniques to secure old vulnerabilities against modern attacks", 2020.
📰
📚
Spara Spring4Shell Analysis.pdf
1.4 MB
#Report of the version2 of #Spring4shell vulnerability analysis from #Spara security company
Language : English
📰
📚
Language : English
📰
📚
Spring4Shell گزارش بررسی آسیبپذیری.pdf
665.2 KB
#Report of the version1 of #Spring4shell vulnerability analysis from #Spara security company
Language: Persian
📰
📚
Language: Persian
📰
📚
myo.pdf
10.4 MB
#Research
"My(o) Armband Leaks Passwords:
An EMG and IMU Based Keylogging Side-Channel Attack", 2021.
📰
📚
"My(o) Armband Leaks Passwords:
An EMG and IMU Based Keylogging Side-Channel Attack", 2021.
📰
📚
NIST_SP_800_40_4.pdf
549.8 KB
#Infosec_Standards
NISTIR 8270 (2nd Draft):
"Introduction to Cybersecurity for Commercial Satellite Operations", Feb 2022.
📰
📚
NISTIR 8270 (2nd Draft):
"Introduction to Cybersecurity for Commercial Satellite Operations", Feb 2022.
📰
📚