TLStorm.pdf
18.2 MB
#SCADA_Security
"TLStorm: Critical vulnerabilities in a TLS library lead to complete pwnage of a popular Cloud-connected UPS", 2022.
"TLStorm: Critical vulnerabilities in a TLS library lead to complete pwnage of a popular Cloud-connected UPS", 2022.
bhi_spectre_bhb.pdf
1.6 MB
#Research
"Branch History Injection:
On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks", USENIX 2022.
]-> https://www.vusec.net/projects/bhi-spectre-bhb
"Branch History Injection:
On the Effectiveness of Hardware Mitigations Against Cross-Privilege Spectre-v2 Attacks", USENIX 2022.
]-> https://www.vusec.net/projects/bhi-spectre-bhb
kwampirs_shamoon_report.pdf
19 MB
#Malware_analysis
"The link between Kwampirs (Orangeworm) and Shamoon APTs", 2022.
]-> https://resources.cylera.com/new-evidence-linking-kwampirs-malware-to-shamoon-apts
"The link between Kwampirs (Orangeworm) and Shamoon APTs", 2022.
]-> https://resources.cylera.com/new-evidence-linking-kwampirs-malware-to-shamoon-apts
INDICATORS OF ATTACK VERSUS INDICATORS OF COMPROMISE.pdf
920.4 KB
INDICATORS OF ATTACK VERSUS INDICATORS
OF COMPROMISE
OF COMPROMISE
junos_ddos_guide.pdf
1.8 MB
#hardening
#Whitepaper
"Junos OS Attack Detection and Prevention User Guide for Security Devices", 2021.
#Whitepaper
"Junos OS Attack Detection and Prevention User Guide for Security Devices", 2021.
Cyber_Security_Roadmap_(Beginners) @Library_Sec.pdf
185.3 KB
#RoadMap
Cyber Security Roadmap
Cyber Security Roadmap
RevEAL.pdf
669 KB
#Research
#cryptography
"RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library", 2022.
#cryptography
"RevEAL: Single-Trace Side-Channel Leakage of the SEAL Homomorphic Encryption Library", 2022.
MS Word Forensic Locations.pdf
1.2 MB
#Forensics
MS Word Forensic Locations
MS Word Forensic Locations
examining_cve_2020_0601_crypt32dll.pdf
7 MB
#Research
#cryptography
Examining CVE-2020-0601 Crypt32.dll Elliptic Curve Cryptography (ECC) Certificate Validation Vulnerability
#cryptography
Examining CVE-2020-0601 Crypt32.dll Elliptic Curve Cryptography (ECC) Certificate Validation Vulnerability
imessage_exploitation.pdf
1.6 MB
"A Brief History of iMessage Exploitation", 2022.
TextAttack.pdf
965.2 KB
#Research
"TextAttack: A Framework for Adversarial Attacks, Data Augmentation, and Adversarial Training in NLP", 2020.
]-> Repo: https://github.com/QData/deepWordBug
"TextAttack: A Framework for Adversarial Attacks, Data Augmentation, and Adversarial Training in NLP", 2020.
]-> Repo: https://github.com/QData/deepWordBug
forensic_analysis_android_browsing_artifacts.pdf
4.1 MB
#Whitepaper
"A Forensic Analysis of Android Mobile Private Browsing Artifacts", 2022.
"A Forensic Analysis of Android Mobile Private Browsing Artifacts", 2022.