Alaid TechThread
408 subscribers
6 photos
1 video
80 files
1.29K links
Vulnerability discovery, threat intelligence, reverse engineering, AppSec
Download Telegram
GLeeFuzz: Fuzzing WebGL Through Error Message Guided Mutation

https://www.usenix.org/system/files/sec23summer_249-peng-prepub.pdf
πŸ‘1
Reverse Engineering TikTok's VM Obfuscation (Part 2)

https://ibiyemiabiodun.com/projects/reversing-tiktok-pt2/
πŸ”₯1
kaijie-liu-malicious-code-classification-method-of.pdf
1.1 MB
Malicious Code Classification Method of Advanced Persistent Threat Based on Asm2Vec
πŸ‘2πŸ†’1
alrabaee-saed-a-survey-of-binary-code-fingerprinting.pdf
2.2 MB
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features
Detecting Excessive Data Exposures in Web Server Responses with Metamorphic Fuzzing

https://arxiv.org/pdf/2301.09258.pdf
Fuzzers for stateful systems: Survey and Research Directions

https://arxiv.org/pdf/2301.02490.pdf
πŸ”₯1
Icicle: A Re-Designed Emulator for Grey-Box Firmware Fuzzing

https://arxiv.org/pdf/2301.13346.pdf
Drone Security and
the Mysterious Case of DJI’s DroneID

https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f217_paper.pdf
πŸ‘1πŸ”₯1
POLYFUZZ: Holistic Greybox Fuzzing of Multi-Language Systems

https://www.usenix.org/system/files/sec23summer_411-li_wen-prepub.pdf
VulChecker: Graph-based Vulnerability Localization in Source Code

https://www.usenix.org/system/files/sec23summer_449-mirsky-prepub.pdf
UnGANable: Defending Against GAN-based Face Manipulation

https://www.usenix.org/system/files/sec23summer_136-li_zheng-prepub.pdf
Large Language Models are Zero-Shot Fuzzers: Fuzzing Deep-Learning Libraries via Large Language Models

https://arxiv.org/pdf/2212.14834.pdf
πŸ‘2