Artwork

Jacob Torrey, Haroon meer, and Marco slaviero에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Jacob Torrey, Haroon meer, and Marco slaviero 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
Player FM -팟 캐스트 앱
Player FM 앱으로 오프라인으로 전환하세요!

ThinkstScapes Research Roundup - Q2 - 2022

29:57
 
공유
 

Manage episode 335862949 series 3290432
Jacob Torrey, Haroon meer, and Marco slaviero에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Jacob Torrey, Haroon meer, and Marco slaviero 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

I am become loadbalancer, owner of your network

Nate Warfield

[Slides]

Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones

Jiska Classen, Alexander Heinrich, Robert Reith, and Matthias Hollick

[Slides] [Paper]

AirTag of the Clones: Shenanigans with Liberated Item Finders

Thomas Roth, Fabian Freyer, Matthias Hollick, and Jiska Classen

[Paper] [Code]

Are Blockchains Decentralised?

Evan Sultanik, Alexander Remie, Felipe Manzano, Trent Brunson, Sam Moelius, Eric Kilmer, Mike Myers, Talley Amir, and Sonya Schriner

[Blog] [Paper] [Audio]

What Log4j teaches us about the Software Supply Chain

Stephen Magill

[Slides] [Video]

Kani Rust Verifier

Daniel Schwartz-Narbonne and Zyad Hassan

[Slides] [Video] [Code]

Cross-Language Attacks

Samuel Mergendahl, Nathan Burow, and Hamed Okhravi

[Paper]

Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats

Giorgio Di Tizio, Michele Armellini, and Fabio Massacci

[Paper] [Data]

AMD Secure Processor for Confidential Computing Security Review

Cfir Cohen, James Forshaw, Jann Horn, and Mark Brand

[Blog] [Paper]

Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware Ecosystem

Matt Graebar

[Slides]

A Kernel Hacker Meets Fuchsia OS

Alexander Popov

[Blog] [Video]

Adaptive Multi-objective Optimization in Gray-box Fuzzing

Gen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang, Xu Zhou, and Kai Lu

[Paper]

Cooper Knows the Shortest Stave: Finding 134 Bugs in the Binding Code of Scripting Languages with Cooperative Mutation

Xu Peng, Yanhao Wang, Hong Hu, and Purui Su

[Slides] [Paper] [Code]

Bypassing CSP with dangling iframes

Gareth Heyes

[Blog]

Bypassing Dangling Markup Injection Mitigation Bypass in Chrome

SeungJu Oh

[Bug report] [Blog]

Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web

Avinash Sudhodanan and Andrew Paverd

[Blog] [Paper]

  continue reading

12 에피소드

Artwork
icon공유
 
Manage episode 335862949 series 3290432
Jacob Torrey, Haroon meer, and Marco slaviero에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Jacob Torrey, Haroon meer, and Marco slaviero 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

I am become loadbalancer, owner of your network

Nate Warfield

[Slides]

Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones

Jiska Classen, Alexander Heinrich, Robert Reith, and Matthias Hollick

[Slides] [Paper]

AirTag of the Clones: Shenanigans with Liberated Item Finders

Thomas Roth, Fabian Freyer, Matthias Hollick, and Jiska Classen

[Paper] [Code]

Are Blockchains Decentralised?

Evan Sultanik, Alexander Remie, Felipe Manzano, Trent Brunson, Sam Moelius, Eric Kilmer, Mike Myers, Talley Amir, and Sonya Schriner

[Blog] [Paper] [Audio]

What Log4j teaches us about the Software Supply Chain

Stephen Magill

[Slides] [Video]

Kani Rust Verifier

Daniel Schwartz-Narbonne and Zyad Hassan

[Slides] [Video] [Code]

Cross-Language Attacks

Samuel Mergendahl, Nathan Burow, and Hamed Okhravi

[Paper]

Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats

Giorgio Di Tizio, Michele Armellini, and Fabio Massacci

[Paper] [Data]

AMD Secure Processor for Confidential Computing Security Review

Cfir Cohen, James Forshaw, Jann Horn, and Mark Brand

[Blog] [Paper]

Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware Ecosystem

Matt Graebar

[Slides]

A Kernel Hacker Meets Fuchsia OS

Alexander Popov

[Blog] [Video]

Adaptive Multi-objective Optimization in Gray-box Fuzzing

Gen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang, Xu Zhou, and Kai Lu

[Paper]

Cooper Knows the Shortest Stave: Finding 134 Bugs in the Binding Code of Scripting Languages with Cooperative Mutation

Xu Peng, Yanhao Wang, Hong Hu, and Purui Su

[Slides] [Paper] [Code]

Bypassing CSP with dangling iframes

Gareth Heyes

[Blog]

Bypassing Dangling Markup Injection Mitigation Bypass in Chrome

SeungJu Oh

[Bug report] [Blog]

Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web

Avinash Sudhodanan and Andrew Paverd

[Blog] [Paper]

  continue reading

12 에피소드

모든 에피소드

×
 
Loading …

플레이어 FM에 오신것을 환영합니다!

플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.

 

빠른 참조 가이드