Attacking Firecracker: AWS' microVM Monitor Written in Rust - https://www.graplsecurity.com/post/attacking-firecracker
Jit-Picking: Differential Fuzzing of JavaScript Engines
https://publications.cispa.saarland/3773/1/2022-CCS-JIT-Fuzzing.pdf
https://publications.cispa.saarland/3773/1/2022-CCS-JIT-Fuzzing.pdf
Fuzzing Host-to Guest Attack Surface in Android Protected KVM
https://www.youtube.com/watch?v=cJjjlSG6JEA
https://www.youtube.com/watch?v=cJjjlSG6JEA
YouTube
Fuzzing Host-to Guest Attack Surface in Android Protected KVM- Eugene Rodionov & Will Deacon, Google
Fuzzing Host-to Guest Attack Surface in Android Protected KVM - Eugene Rodionov & Will Deacon, Google
Android 13 introduces native support of virtualization services built on top of Protected KVM (pKVM) for arm64 devices. Unlike in traditional KVM where…
Android 13 introduces native support of virtualization services built on top of Protected KVM (pKVM) for arm64 devices. Unlike in traditional KVM where…
Making Fuzzing Part of Your Software Development Lifecycle
https://www.youtube.com/watch?v=eg7SiXr31Qk
https://www.youtube.com/watch?v=eg7SiXr31Qk
YouTube
Making Fuzzing Part of Your Software Development Lifecycle - Jonathan Metzman, Google
Making Fuzzing Part of Your Software Development Lifecycle - Jonathan Metzman, Google
Fuzzing is a testing technique that uses randomized inputs to find bugs in software. Fuzzing is the most successful automated vulnetability/bug-finding technique and has…
Fuzzing is a testing technique that uses randomized inputs to find bugs in software. Fuzzing is the most successful automated vulnetability/bug-finding technique and has…
CONFETTI: Amplifying Concolic Guidance for Fuzzers
https://www.youtube.com/watch?v=4WOPUFNeZXg
https://srg.doc.ic.ac.uk/klee22/talks/Kukucka-Confetti.pdf
https://www.youtube.com/watch?v=4WOPUFNeZXg
https://srg.doc.ic.ac.uk/klee22/talks/Kukucka-Confetti.pdf
YouTube
CONFETTI: Amplifying Concolic Guidance for Fuzzers
James Kukucka from George Mason University at the 3nd International KLEE Workshop on Symbolic Execution
KLEE Workshop 2022: https://srg.doc.ic.ac.uk/klee22/
Slides: https://srg.doc.ic.ac.uk/klee22/talks/Kukucka-Confetti.pdf
KLEE Workshop 2022: https://srg.doc.ic.ac.uk/klee22/
Slides: https://srg.doc.ic.ac.uk/klee22/talks/Kukucka-Confetti.pdf
RedEye is a visual analytic tool supporting Red & Blue Team operations
https://github.com/cisagov/RedEye/
https://github.com/cisagov/RedEye/
GitHub
GitHub - cisagov/RedEye: RedEye is a visual analytic tool supporting Red & Blue Team operations
RedEye is a visual analytic tool supporting Red & Blue Team operations - cisagov/RedEye
A journey of fuzzing Nvidia graphic driver leading to LPE exploitation
https://drive.google.com/file/d/1HEaQ3o1kSnrzMCec1aiYMkWYQZg7Vjb3/view
https://drive.google.com/file/d/1HEaQ3o1kSnrzMCec1aiYMkWYQZg7Vjb3/view
Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect
SQL and Command Injection Vulnerabilities
https://pagabuc.me/docs/oakland23_witcher.pdf
SQL and Command Injection Vulnerabilities
https://pagabuc.me/docs/oakland23_witcher.pdf
👍1
Microsoft fixes driver blocklist placing users at risk from BYOVD attacks
https://www.malwarebytes.com/blog/news/2022/10/microsoft-fixes-driver-blocklist-placing-users-at-risk-from-byovd-attacks
https://www.malwarebytes.com/blog/news/2022/10/microsoft-fixes-driver-blocklist-placing-users-at-risk-from-byovd-attacks
Malwarebytes
Microsoft fixes driver blocklist placing users at risk from BYOVD attacks
There may be an all-new acronym for you to try and remember, as a result of Microsoft fixing a lingering issue. This...
FixReverter: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing
https://www.usenix.org/system/files/sec22-zhang-zenong.pdf
https://www.usenix.org/system/files/sec22-zhang-zenong.pdf
Concurrence: library for fuzzing multi-threaded targets
https://github.com/googleprojectzero/SockFuzzer/tree/main/third_party/concurrence
https://github.com/googleprojectzero/SockFuzzer/tree/main/third_party/concurrence
GitHub
SockFuzzer/third_party/concurrence at main · googleprojectzero/SockFuzzer
Contribute to googleprojectzero/SockFuzzer development by creating an account on GitHub.
TCP/IP Vulnerability CVE-2022–34718 PoC Restoration and Analysis
https://medium.com/@numencyberlabs/analysis-and-summary-of-tcp-ip-protocol-remote-code-execution-vulnerability-cve-2022-34718-8fcc28538acf
https://medium.com/@numencyberlabs/analysis-and-summary-of-tcp-ip-protocol-remote-code-execution-vulnerability-cve-2022-34718-8fcc28538acf
Medium
Analysis and Summary of TCP/IP Protocol Remote Code Execution Vulnerability CVE-2022–34718
An Analysis of Remote Code Execution Vulnerability CVE-2022–34718
👍1
RC4 Is Still Considered Harmful
https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html?m=1
https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html?m=1
Blogspot
RC4 Is Still Considered Harmful
By James Forshaw, Project Zero I've been spending a lot of time researching Windows authentication implementations, specifically Kerberos...