Player FM 앱으로 오프라인으로 전환하세요!
ThinkstScapes Research Roundup - Q3 - 2023
Manage episode 383791155 series 3290432
Cryptography still isn’t easy
certmitm: automatic exploitation of TLS certificate validation vulnerabilities
Aapo Oksman
Escaping Phishermen Nets: Cryptographic Methods Unveiled in the Fight Against Reverse Proxy Attacks
Ksandros Apostoli
[Blog]
mTLS: When certificate authentication is done wrong
Michael Stepankin
Ultrablue: User-friendly Lightweight TPM Remote Attestation over Bluetooth
Nicolas Bouchinet, Loïc Buckwell, and Gabriel Kerneis
HECO: Fully Homomorphic Encryption Compiler
Alexander Viand, Patrick Jattke, Miro Haller, and Anwar Hithnawi
[Continued] attack of the side-channels
Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings
Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, and Aanjhan Ranganathan
Downfall: Exploiting Speculative Data Gathering
Daniel Moghimi
Your Clocks Have Ears – Timing-Based Browser-Based Local Network Port Scanner
Dongsung Kim
Composition is hard in the cloud
Using Cloudflare to bypass Cloudflare
Florian Schweitzer and Stefan Proksch
[Blog]
The GitHub Actions Worm: Compromising GitHub repositories through the Actions dependency tree
Asaf Greenholts
All You Need is Guest
Michael Bargury
Nifty sundries
Contactless Overflow: Critical contactless vulnerabilities in NFC readers used in point of sales and ATMs
Josep Pi Rodriguez
Defender-Pretender: When Windows Defender Updates Become a Security Risk
Omer Attias and Tomer Bar
Fuzz target generation using LLMs
Dongge Liu, Jonathan Metzman, and Oliver Chang
Route to Bugs: Analyzing the Security of BGP Message Parsing
Daniel dos Santos, Simon Guiot, Stanislav Dashevskyi, Amine Amri, and Oussama Kerro
It was harder to sniff Bluetooth through my mask during the pandemic…
Xeno Kovah
12 에피소드
Manage episode 383791155 series 3290432
Cryptography still isn’t easy
certmitm: automatic exploitation of TLS certificate validation vulnerabilities
Aapo Oksman
Escaping Phishermen Nets: Cryptographic Methods Unveiled in the Fight Against Reverse Proxy Attacks
Ksandros Apostoli
[Blog]
mTLS: When certificate authentication is done wrong
Michael Stepankin
Ultrablue: User-friendly Lightweight TPM Remote Attestation over Bluetooth
Nicolas Bouchinet, Loïc Buckwell, and Gabriel Kerneis
HECO: Fully Homomorphic Encryption Compiler
Alexander Viand, Patrick Jattke, Miro Haller, and Anwar Hithnawi
[Continued] attack of the side-channels
Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings
Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, and Aanjhan Ranganathan
Downfall: Exploiting Speculative Data Gathering
Daniel Moghimi
Your Clocks Have Ears – Timing-Based Browser-Based Local Network Port Scanner
Dongsung Kim
Composition is hard in the cloud
Using Cloudflare to bypass Cloudflare
Florian Schweitzer and Stefan Proksch
[Blog]
The GitHub Actions Worm: Compromising GitHub repositories through the Actions dependency tree
Asaf Greenholts
All You Need is Guest
Michael Bargury
Nifty sundries
Contactless Overflow: Critical contactless vulnerabilities in NFC readers used in point of sales and ATMs
Josep Pi Rodriguez
Defender-Pretender: When Windows Defender Updates Become a Security Risk
Omer Attias and Tomer Bar
Fuzz target generation using LLMs
Dongge Liu, Jonathan Metzman, and Oliver Chang
Route to Bugs: Analyzing the Security of BGP Message Parsing
Daniel dos Santos, Simon Guiot, Stanislav Dashevskyi, Amine Amri, and Oussama Kerro
It was harder to sniff Bluetooth through my mask during the pandemic…
Xeno Kovah
12 에피소드
모든 에피소드
×플레이어 FM에 오신것을 환영합니다!
플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.