Alaid TechThread
406 subscribers
6 photos
1 video
80 files
1.29K links
Vulnerability discovery, threat intelligence, reverse engineering, AppSec
Download Telegram
kaijie-liu-malicious-code-classification-method-of.pdf
1.1 MB
Malicious Code Classification Method of Advanced Persistent Threat Based on Asm2Vec
πŸ‘2πŸ†’1
alrabaee-saed-a-survey-of-binary-code-fingerprinting.pdf
2.2 MB
A Survey of Binary Code Fingerprinting Approaches: Taxonomy, Methodologies, and Features
Detecting Excessive Data Exposures in Web Server Responses with Metamorphic Fuzzing

https://arxiv.org/pdf/2301.09258.pdf
Fuzzers for stateful systems: Survey and Research Directions

https://arxiv.org/pdf/2301.02490.pdf
πŸ”₯1
Icicle: A Re-Designed Emulator for Grey-Box Firmware Fuzzing

https://arxiv.org/pdf/2301.13346.pdf
Drone Security and
the Mysterious Case of DJI’s DroneID

https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_f217_paper.pdf
πŸ‘1πŸ”₯1
POLYFUZZ: Holistic Greybox Fuzzing of Multi-Language Systems

https://www.usenix.org/system/files/sec23summer_411-li_wen-prepub.pdf
VulChecker: Graph-based Vulnerability Localization in Source Code

https://www.usenix.org/system/files/sec23summer_449-mirsky-prepub.pdf
UnGANable: Defending Against GAN-based Face Manipulation

https://www.usenix.org/system/files/sec23summer_136-li_zheng-prepub.pdf
Large Language Models are Zero-Shot Fuzzers: Fuzzing Deep-Learning Libraries via Large Language Models

https://arxiv.org/pdf/2212.14834.pdf
πŸ‘2
Exploiting aCropalypse: Recovering Truncated PNGs

https://www.da.vidbuchanan.co.uk/blog/exploiting-acropalypse.html
πŸ‘1