PIM_YUPANA.pdf
542.5 KB
#Whitepaper
"Passive Inter-Modulation Sources and Cancellation Methods", 2022.
// Also, a review of PIM mitigation techniques is presented in the article
📰
📚
"Passive Inter-Modulation Sources and Cancellation Methods", 2022.
// Also, a review of PIM mitigation techniques is presented in the article
📰
📚
ICPS_Perspective.pdf
596.5 KB
#SCADA_Security
"Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective", 2022.
📰
📚
"Cybersecurity Challenges in the Offshore Oil and Gas Industry: An Industrial Cyber-Physical Systems (ICPS) Perspective", 2022.
📰
📚
Webhook_Security.pdf
95.7 KB
#Whitepaper
"Webhook Security Guidelines".
]-> Simple webhook to block exploitation of CVE-2022-0811:
https://github.com/spiarh/webhook-cve-2022-0811
📰
📚
"Webhook Security Guidelines".
]-> Simple webhook to block exploitation of CVE-2022-0811:
https://github.com/spiarh/webhook-cve-2022-0811
📰
📚
Relaying_RPC_DCOM.pdf
2.2 MB
"Relaying to Greatness:
Windows Privilege Escalation by abusing the RPC/DCOM protocols", 2022.
#privilege
📰
📚
Windows Privilege Escalation by abusing the RPC/DCOM protocols", 2022.
#privilege
📰
📚
heapster.pdf
11.3 MB
#Research
"HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images", 2021.
📰
📚
"HEAPSTER: Analyzing the Security of Dynamic Allocators for Monolithic Firmware Images", 2021.
📰
📚
memory_safety.pdf
4.8 MB
#Research
"Why is memory safety still a concern?", 2020.
// The evolution of memory corruption exploit techniques & mitigations
📰
📚
"Why is memory safety still a concern?", 2020.
// The evolution of memory corruption exploit techniques & mitigations
📰
📚
RECON_BRX_2018_Reverse_Engineering_Windows_Defender_s_JavaScript.pdf
9.2 MB
#RE #JavaScript
Reverse Engineering Windows Defender’s JavaScript Engine
Outline :
1. Introduction
2. Tooling & Process
3. Reverse Engineering
4. Vulnerability Discussion
5. Conclusion
📰
📚
Reverse Engineering Windows Defender’s JavaScript Engine
Outline :
1. Introduction
2. Tooling & Process
3. Reverse Engineering
4. Vulnerability Discussion
5. Conclusion
📰
📚
Snort Cheatsheet.pdf
599 KB
#Snort #Cheatsheet
Snort Cheatsheet
(FREE) Learn to use Snort to detect real-time threats & analyze recorded traffic files Learn through a web-based machine with all the tools you need to get started
📰
📚
Snort Cheatsheet
(FREE) Learn to use Snort to detect real-time threats & analyze recorded traffic files Learn through a web-based machine with all the tools you need to get started
📰
📚
How_to_tame_your_unicorn.pdf
1 MB
#Research
"How To Tame Your Unicorn: Exploring And Exploiting Zero-Click Remote Interfaces of Huawei Smartphones", 2021.
]-> Exploiting CSN.1 Bugs in MediaTek Basebands:
https://labs.taszk.io/articles/post/mtk_baseband_csn1_exploitation
📰
📚
"How To Tame Your Unicorn: Exploring And Exploiting Zero-Click Remote Interfaces of Huawei Smartphones", 2021.
]-> Exploiting CSN.1 Bugs in MediaTek Basebands:
https://labs.taszk.io/articles/post/mtk_baseband_csn1_exploitation
📰
📚
Compilers_Security_Frontier.pdf
1.1 MB
"Compilers: The Old New Security Frontier", 2022.
]-> Low-Level Software Security for Compiler Developers:
https://llsoftsec.github.io/llsoftsecbook
]-> Low-Level Software Security for Compiler Developers:
https://llsoftsec.github.io/llsoftsecbook
DeepSight.pdf
775.7 KB
#Research
"DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection", NDSS 2022.
"DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection", NDSS 2022.
DNNs.pdf
5.9 MB
#Research
"Robust Adversarial Attacks Against DNN Based Wireless Communication Systems", 2021.
"Robust Adversarial Attacks Against DNN Based Wireless Communication Systems", 2021.
RamBoAttack.pdf
15.7 MB
#Research
"RamBoAttack: A Robust and Query Efficient Deep Neural Network Decision Exploit", 2022.
"RamBoAttack: A Robust and Query Efficient Deep Neural Network Decision Exploit", 2022.
VMware_LPE.pdf
362.1 KB
#Whitepaper
"VMware Workstation/Player Host LPE Vulnerability", 2022.
"VMware Workstation/Player Host LPE Vulnerability", 2022.