Artwork

Jacob Torrey, Haroon meer, and Marco slaviero에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Jacob Torrey, Haroon meer, and Marco slaviero 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
Player FM -팟 캐스트 앱
Player FM 앱으로 오프라인으로 전환하세요!

ThinkstScapes Research Roundup - Q1 - 2024

25:09
 
공유
 

Manage episode 423578372 series 3290432
Jacob Torrey, Haroon meer, and Marco slaviero에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Jacob Torrey, Haroon meer, and Marco slaviero 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

Revealing more than anticipated, and preventing prying eyes

PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound

Man Zhou, Shuao Su, Qian Wang, Qi Li, Yuting Zhou, Xiaojing Ma, and Zhengxiong Li

[Paper]

ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks

Minxue Tang, Anna Dai, Louis DiValentin, Aolin Ding, Amin Hass, Neil Zhenqiang Gong, Yiran Chen, and Hai Li

[Paper] [Code]

RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users

Eric Jedermann, Martin Strohmeier, Vincent Lenders, and Jens Schmitt

[Code] [Paper]

Private web search with Tiptoe

Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, and Nickolai Zeldovich

[Slides] [Paper] [Video] [Code]

Can Virtual Reality Protect Users from Keystroke Inference Attacks?

Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, and Haitao Zheng

[Website] [Paper]

Backtrace in Time: Revealing Attackers’ Sleep Patterns and Days Off in RDP Brute-Force Attacks with Calendar Heatmaps

Andréanne Bergeron

[Code] [Blog] [Video]

Taking another look with a fresh perspective

Breaking HTTP Servers, Proxies, and Load Balancers Using the HTTP Garden

Ben Kallus and Prashant Anantharaman

[Code] [Video]

Compiler Backdooring For Beginners

Marion Marschalek

[Video]

Revisiting 2017: AI and Security, 7 years later

Thomas Dullien

[Video]

Automated Large-Scale Analysis of Cookie Notice Compliance

Ahmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, and David Basin

[Paper] [Code Access]

Turning Windows into doors

LSA Whisperer

Evan McBroom

[Slides] [Blog] [Code]

Wishing: Webhook Phishing in Teams

Matthew Eidelberg

[Blog] [Code]

Misconfiguration Manager: Overlooked and Overprivileged

Duane Michael and Chris Thompson

[Slides] [Blog] [Code]

Smoke and Mirrors: How to hide in Microsoft Azure

Aled Mehta and Christian Philipov

[Video]

Nifty sundries

Backdoor in XZ Utils allows RCE: everything you need to know

Andres Freund, Merav Bar, Amitai Cohen, Danielle Aminov, and Russ Cox

[Initial Disclosure] [Wiz Blog] [Timeline]

More Money, Fewer FOSS Security Problems? The Data, Such As It Is

John Speed Meyers, Sara Ann Brackett, and Stewart Scott

[Video]

MUDding Around: Hacking for gold in text-based games

Unix-ninja

[Blog]

DeGPT: Optimizing Decompiler Output with LLM

Peiwei Hu, Ruigang Liang, and Kai Chen

[Paper]

  continue reading

12 에피소드

Artwork
icon공유
 
Manage episode 423578372 series 3290432
Jacob Torrey, Haroon meer, and Marco slaviero에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Jacob Torrey, Haroon meer, and Marco slaviero 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

Revealing more than anticipated, and preventing prying eyes

PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound

Man Zhou, Shuao Su, Qian Wang, Qi Li, Yuting Zhou, Xiaojing Ma, and Zhengxiong Li

[Paper]

ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks

Minxue Tang, Anna Dai, Louis DiValentin, Aolin Ding, Amin Hass, Neil Zhenqiang Gong, Yiran Chen, and Hai Li

[Paper] [Code]

RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users

Eric Jedermann, Martin Strohmeier, Vincent Lenders, and Jens Schmitt

[Code] [Paper]

Private web search with Tiptoe

Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, and Nickolai Zeldovich

[Slides] [Paper] [Video] [Code]

Can Virtual Reality Protect Users from Keystroke Inference Attacks?

Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, and Haitao Zheng

[Website] [Paper]

Backtrace in Time: Revealing Attackers’ Sleep Patterns and Days Off in RDP Brute-Force Attacks with Calendar Heatmaps

Andréanne Bergeron

[Code] [Blog] [Video]

Taking another look with a fresh perspective

Breaking HTTP Servers, Proxies, and Load Balancers Using the HTTP Garden

Ben Kallus and Prashant Anantharaman

[Code] [Video]

Compiler Backdooring For Beginners

Marion Marschalek

[Video]

Revisiting 2017: AI and Security, 7 years later

Thomas Dullien

[Video]

Automated Large-Scale Analysis of Cookie Notice Compliance

Ahmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, and David Basin

[Paper] [Code Access]

Turning Windows into doors

LSA Whisperer

Evan McBroom

[Slides] [Blog] [Code]

Wishing: Webhook Phishing in Teams

Matthew Eidelberg

[Blog] [Code]

Misconfiguration Manager: Overlooked and Overprivileged

Duane Michael and Chris Thompson

[Slides] [Blog] [Code]

Smoke and Mirrors: How to hide in Microsoft Azure

Aled Mehta and Christian Philipov

[Video]

Nifty sundries

Backdoor in XZ Utils allows RCE: everything you need to know

Andres Freund, Merav Bar, Amitai Cohen, Danielle Aminov, and Russ Cox

[Initial Disclosure] [Wiz Blog] [Timeline]

More Money, Fewer FOSS Security Problems? The Data, Such As It Is

John Speed Meyers, Sara Ann Brackett, and Stewart Scott

[Video]

MUDding Around: Hacking for gold in text-based games

Unix-ninja

[Blog]

DeGPT: Optimizing Decompiler Output with LLM

Peiwei Hu, Ruigang Liang, and Kai Chen

[Paper]

  continue reading

12 에피소드

모든 에피소드

×
 
Loading …

플레이어 FM에 오신것을 환영합니다!

플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.

 

빠른 참조 가이드