|
Description:
|
|
Sponge Examples: Energy-Latency Attacks on Neural NetworksIlia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, and Ross Anderson [Slides] [Paper] [Video] How to Use Cheated Cryptography to Overload a ServerSzilárd Pfeiffer [Slides] Bestie: Very Practical Searchable Encryption with Forward and Backward SecurityTuanyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, and Hai Jin [Paper] Symgrate: A Symbol Recovery Service for ARM FirmwareTravis Goodspeed & EVM [Site] From Graph Queries to Vulnerabilities in Binary Codeclaudiu, fabs, and niko [Slides] Fast verified post-quantum softwareDaniel J. Bernstein [Slides] AIModel-Mutator: Finding Vulnerabilities in TensorFlowQian Feng, Zhaofeng Chen, Zhenyu Zhong, Yakun Zhang, Ying Wang, Zheng Huang, Kang Li, Jie Hu and Heng Yin [Slides] DAMAS: Control-Data Isolation at Runtime through Dynamic Binary ModificationCamille Le Bon, Erven Rohou, Frederic Tronel, and Guillaume Hiet [Paper] Trojan Source: Invisible VulnerabilitiesNicholas Boucher and Ross Anderson [Paper] [Code] Who owns your hybrid Active Directory? Hunting for adversary techniques!Thirumalai Natarajan Muthiah & Anurag Khanna [Paper] Breaking Azure AD joined endpoints in zero-trust environmentsDirk-jan Mollema [Slides] [Video] Going Deeper into Schneider Modicon PAC SecurityGao Jian [Slides] [Video] New Ways of IPv6 ScanningShupeng Gao, Xingru Wu, and Jie Gao [Slides] DIY cheap gigabit data diodeMagnus [Code] Bridge your service mesh and AWSSantosh Ananthakrishnan & Harihara K Narayanan [Slides] GALILEO: In GPS We Trust?Áron Szabó, Levente Kovács, and Péter Ligeti [Slides] “We wait, because we know you.” Inside the ransomware negotiation economics.Pepijn Hack & Harihara K Narayanan [Paper] Privacy of DNS-over-HTTPS: Requiem for a dream?Levente Csikor, Himanshu Singh, Min Suk Kang, and Dinil Mon Divakaran [Slides] Sleight of ARM: Demystifying Intel HoudiniBrian Hong [Slides] [Video] |