RMD_Attacks.pdf
629.8 KB
#Red_Team
Remote Memory-Deduplication Attacks
Remote Memory-Deduplication Attacks
Exploiting_CPU_Features.pdf
354.7 KB
#Research
"Finding and Exploiting CPU Features using MSR Templating", 2022.
]-> UEFIPatch tool:
https://github.com/LongSoft/UEFITool/tree/master/UEFIPatch
]-> source code:
https://github.com/Mbed-TLS/mbedtls/blob/dd57b2f240c597e4cf6cc2492d5c03d067f234f9/library/aes.c#L587
"Finding and Exploiting CPU Features using MSR Templating", 2022.
]-> UEFIPatch tool:
https://github.com/LongSoft/UEFITool/tree/master/UEFIPatch
]-> source code:
https://github.com/Mbed-TLS/mbedtls/blob/dd57b2f240c597e4cf6cc2492d5c03d067f234f9/library/aes.c#L587
apple_platform_sec_22.pdf
2.4 MB
#Whitepaper
"Apple Platform Security", May 2022.
// This documentation provides details about how security technology and features are implemented within Apple platforms. It also helps organizations combine Apple platform security technology and features with their own policies and procedures to meet their specific security needs
📚
"Apple Platform Security", May 2022.
// This documentation provides details about how security technology and features are implemented within Apple platforms. It also helps organizations combine Apple platform security technology and features with their own policies and procedures to meet their specific security needs
📚
Cerberus.pdf
1.5 MB
#Threat_Research
"Cerberus: Query-driven Scalable Security Checking for OAuth Service Provider Implementations", 2022.
📚
"Cerberus: Query-driven Scalable Security Checking for OAuth Service Provider Implementations", 2022.
📚
Phishpedia.pdf
3.5 MB
#Research
"Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages", 2021.
📚
"Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages", 2021.
📚
Recursive_MMIO.pdf
1.3 MB
Black Hat Asia 2022:
"Hunting and Exploiting Recursive MMIO Flaws in QEMU/KVM".
📚
"Hunting and Exploiting Recursive MMIO Flaws in QEMU/KVM".
📚
Learn Splunk in 1 day by Sumit Pandey.pdf
1.1 MB
Learn Splunk in 1 day by Sumit Pandey
📚
📚
iPhone_Never_Sleep.pdf
2.3 MB
#Research
#Malware_analysis
"Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones", 2022.
// As a practical example what this means to security, we demonstrate the possibility to load malware onto a Bluetooth chip that is executed while the iPhone is off
📚
#Malware_analysis
"Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones", 2022.
// As a practical example what this means to security, we demonstrate the possibility to load malware onto a Bluetooth chip that is executed while the iPhone is off
📚
Hidden_rce_Droids.pdf
3.5 MB
Black Hat Asia 2022:
"The Hidden RCE Surfaces that Control the droids".
📚
"The Hidden RCE Surfaces that Control the droids".
📚