Skip to content

BitnomadLive/OffensiveReading

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 

Repository files navigation

OffensiveReading

A collection of papers about offensive IT security with some blogposts sprinkled in. If you want to contribute a paper just open a issue or issue a pull request.

Browsers / Browser Side Channel

Papers/Thesis

Year Title Author Link Github/PoC
2023 iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices Jason Kim, Stephan van Schaik, Daniel Genkin, Yuval Yarom Link ---
2023 Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API Jose Miguel Moreno, Narseo Vallina-Rodriguez, Juan Tapiador Link ---
2022 Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses Mojtaba Zaheri, Yossi Oren, Reza Curtmola Link ---
2022 Interactive History Sniffing with Dynamically-Generated QR Codes and CSS Difference Blending Keith O’Neal, Scott Yilek Link ---
2022 WebSpec: Towards Machine-Checked Analysis of Browser Security Mechanisms Lorenzo Veronese, Benjamin Farinier, Mauro Tempesta, Marco Squarcina, Matteo Maffei Link ---
2022 SOK: On the Analysis of Web Browser Security Jungwon Lim, Yonghwi Jin, Mansour Alharthi, Xiaokuan Zhang, Jinho Jung, Rajat Gupta, Kuilin Li, Daehee Jang, Taesoo Kim Link ---
2021 Categorizing Service Worker Attacks and Mitigations Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci Link ---
2021 Careful Who You Trust: Studying the Pitfalls of Cross-Origin Communication Gordon Meiser, Pierre Laperdrix, Ben Stock Link ---
2021 Tales of Favicons and Caches: Persistent Tracking in Modern Browsers Konstantinos Solomos, John Kristoff, Chris Kanich, Jason Polakis Link ---
2021 Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation Zihao Jin, Ziqiao Kong, Shuo Chen†, Haixin Duan Link ---
2021 Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web Tracking Peter Snyder, Soroush Karami, Benjamin Livshits, Hamed Haddadi Link ---
2021 XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers Lukas Knittel, Christian Mainka, Marcus Niemietz Link Github PoC
2021 Remote Memory-Deduplication Attacks Martin Schwarzl, Erik Kraft, Moritz Lipp, Daniel Gruss Link ---
2021 T-Reqs: HTTP Request Smuggling with Differential Fuzzing Bahruz Jabiyev, Steven Sprecher, Kaan Onarlioglu, Engin Kirda Link Github
2021 An Empirical Analysis of HTTPS Configuration Security Camelia Simoiu, Wilson Nguyen, Zakir Durumeric Link ---
2021 Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques zengrui liu, prakash shrestha, nitesh saxena Link ---
2021 CorbFuzz: Checking Browser Security Policies with Fuzzing Chaofan Shou, ̇Ismet Burak Kadron, Qi Su, Tevfik Bultan Link ---
2021 SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers. Thomas Rokicki, Clémentine Maurice, Pierre Laperdrix Link ---
2021 Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage Soroush Karami, Panagiotis Ilia, Jason Polakis Link
2020 Security and Privacy of Social Logins Louis Christopher Jannett Link ---
2020 Everything Old is New Again: Binary Security of WebAssembly Daniel Lehmann, Johannes Kinder, Michael Pradel Link ---
2020 Cross-Origin State Inference (COSI) Attacks:Leaking Web Site States through XS-Leaks Avinash Sudhodanan, Soheil Khodayari, Juan Caballero Link
2019 BakingTimer: privacy analysis of server-side request processing time Iskander Sánchez-Rola, D. Balzarotti, I. Santos Link
2019 Browser Fingerprinting using Combinatorial Sequence Testing Bernhard Garn, Dimitris E. Simos, Stefan Zauner, Rick Kuhn, Raghu Kacker Link
2018 Browser history re:visited Michael Smith, Craig Disselkoen, Shravan Narayan, Fraser Brown, Deian Stefa Link ---
2018 How Tracking Companies Circumvented Ad Blockers Using WebSockets Muhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William Robertson, Christo Wilson Link ---
2018 HSTS Supports Targeted Surveillance Paul Syverson, Matthew Traudt Link Github
2017 Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript Michael Schwarz, Clémentine Maurice, Daniel Gruss, Stefan Mangard Link ---
2017 Practical Keystroke Timing Attacks in Sandboxed JavaScript Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, Clementine Maurice, Stefan Mangard Link Github
2016 On the Incoherencies in Web Browser Access Control Policies Kapil Singh, Alexander Moshchuk, Helen J. Wang, Wenke Lee Link ---
2016 HEIST: HTTP Encrypted Information can be Stolen through TCP-windows Mathy Vanhoef,Tom Van Goethem Link
2016 Trusted Browsers for Uncertain Times David Kohlbrenner, Hovav Shacham Link ---
2015 The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis Link ---
2015 Practical Memory Deduplication Attacks in Sandboxed Javascript Daniel Gruss(, David Bidner, Stefan Mangard Link ---
2013 Pixel Perfect Timing Attacks with HTML5 Paul Stone Link PoC
2013 Redefining Web Browser Principals with a Configurable Origin Policy Yinzhi Cao, Vaibhav Rastogi, Zhichun Li, Yan Chen, Alexander Moshchuk Link ---
2010 The Emperor’s New APIs: On the (In)Secure Usage of New Client-side Primitives Steve Hanna, Eui Chul Richard Shin, Devdatta Akhawe, Arman Boehm, Prateek Saxena, Dawn Song Link ---
2010 Object views: Fine-grained sharing in browsers Leo Meyerovich, Adrienne Porter Felt, Mark Miller Link ---
2009 Cross-origin javascript capability leaks: detection, exploitation, and defense Adam Barth, Joel Weinberger,Dawn Song Link ---
2007 Exposing Private Information by Timing Web Applications Andrew Bortz, Dan Boneh, Palash Nandy Link ---

Blogposts

Year Title Author Link
2021 Examining JavaScript Inter-Process Communication in Firefox Frederik Braun Link
2020 Marginwidth/marginheight – the unexpected cross-origin communication channel Michał Bentkowski Link
2018 Side-channel attacking browsers through CSS3 features Ruslan Habalov Link
2016 CSS mix-blend-mode is bad for your browsing history lcamtuf Link
NULL History theft with CSS Boolean algebra lcamtuf Link

Vulnerability Discovery - Web

Papers/Thesis

Year Title Author Link Github/PoC
2024 Towards Fine-Grained Webpage Fingerprinting at Scale Xiyuan Zhao, Xinhao Deng, Qi Li, Yunpeng Liu, Zhuotao Liu, Kun Sun, Ke Xu Link ---
2024 GHunter: Universal Prototype Pollution Gadgets in JavaScript Runtimes Eric Cornelissen, Mikhail Shcherbakov, Musard Balliu Link Github
2024 Fuzzing at Scale: The Untold Story of the Scheduler Ivica Nikolic, Racchit Jain Link ---
2024 What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications Sebastian Neef, Lorenz Kleissner, Jean-Pierre Seifert Link Link
2024 The HTTP Garden: Discovering Parsing Vulnerabilities in HTTP/1.1 Implementations by Differential Fuzzing of Request Streams Ben Kallus, Prashant Anantharaman, Michael Locasto, Sean W. Smith Link Github
2024 AssetHarvester: A Static Analysis Tool for Detecting Assets Protected by Secrets in Software Artifacts Setu Kumar Basak, K. Virgil English, Ken Ogura, Vitesh Kambara, Bradley Reaves, Laurie Williams Link ---
2024 Fingerprinting web servers through Transformer-encoded HTTP response headers Patrick Darwinkel Link Github
2024 AdvSQLi: Generating Adversarial SQL Injections against Real-world WAF-as-a-service Zhenqing Qu, Xiang Ling, Ting Wang, Xiang Chen, Shouling Ji, Chunming Wu Link ---
2024 EDEFuzz: A Web API Fuzzer for Excessive Data Exposures Lianglu Pan, Shaanan Cohney, Toby Murray, Van-Thuan Pham Link Github
2023 Parse Me, Baby, One More Time: Bypassing HTML Sanitizer via Parsing Differentials David Klein, Martin Johns Link Github
2023 Unveiling the Invisible: Detection and Evaluation of Prototype Pollution Gadgets with Dynamic Taint Analysis Mikhail Shcherbakov, Paul Moosbrugger, Musard Balliu Link Github
2023 Measuring CDNs susceptible to Domain Fronting Karthika Subramani, Roberto Perdisci, Pierros Skafidas Link ---
2023 Stratosphere: Finding Vulnerable Cloud Storage Buckets Jack Cable, Drew Gregory, Liz Izhikevich, Zakir Durumeric Link ---
2023 From Prompt Injections to SQL Injection Attacks: How Protected is Your LLM-Integrated Web Application? Rodrigo Pedro, Daniel Castro, Paulo Carreira, Nuno Santos Link ---
2023 BertRLFuzzer: A BERT and Reinforcement Learning Based Fuzzer Piyush Jha, Joseph Scott, Jaya Sriram Ganeshna, Mudit Singh, Vijay Ganesh Link Github
2023 Exploiting Input Sanitization for Regex Denial of Service Efe Barlas, Xin Du, James C. Davis Link ---
2023 SSO-MONITOR: Fully-Automatic Large-Scale Landscape, Security, and Privacy Analyses of Single Sign-On in the Wild Maximilian Westers, Tobias Wich, Louis Jannett, Vladislav Mladenov, Christian Mainka, Andreas Mayer Link Google Drive
2023 Automated Black-box Testing of Mass Assignment Vulnerabilities in RESTful APIs Davide Corradini, Michele Pasqua, Mariano Ceccato Link Github
2022 FuzzOrigin: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing Sunwoo Kim, Young Min Kim, Jaewon Hur, Suhwan Song, Gwangmu Lee, Byoungyoung Lee Link Github
2022 Mining Node.js Vulnerabilities via Object Dependence Graph and Query Song Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao Link Github
2022 Web Cache Deception Escalates! Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo Link Github
2022 Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems Matthew M. Tolbert, Elie M. Hess, Mattheus C. Nascimento, Yunsen Lei, Craig A. Shue Link ---
2022 Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web Avinash Sudhodanan, Andrew Paverd Link ---
2022 COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation Peng Xu, Yanhao Wang, Hong Hu, Purui Su Link Github
2021 JAW: Studying Client-side CSRF with Hybrid Property Graphs and Declarative Traversals Soheil Khodayari, Giancarlo Pellegrino Link Github
2021 Understanding Emerging Client-Side Web Vulnerabilities using Dynamic Program Analysis Marius Steffens Link ---
2021 Deriving Semantics-Aware Fuzzers from Web API Schemas Zac Hatfield-Dodds, Dmitry Dygalo Link ---
2021 Black Widow: Blackbox Data-driven Web Scanning Benjamin Eriksson, Giancarlo Pellegrino, Andrei Sabelfeld Link
2021 Over 100 Bugs in a Row: Security Analysis of the Top-Rated Joomla Extensions Marcus Niemietz, Mario Korth, Christian Mainka, Juraj Somorovsky Link ---
2021 Security Vulnerability Detection Using Deep Learning Natural Language Processing Noah Ziems, Shaoen Wu Link ---
2020 Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk Link ---
2020 Can I Take Your Subdomain?Exploring Related-Domain Attacks in the Modern Web Marco Squarcina, Mauro Tempesta, Lorenzo Veronese, Stefano Calzavara, Matteo Maffe Link ---
2020 Cached and Confused: Web Cache Deception in the Wild Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson Link ---

XSS

Papers/Thesis

Year Title Author Link Github/PoC
2022 FuzzOrigin: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing Sunwoo Kim, Young Min Kim, Jaewon Hur, Suhwan Song, Gwangmu Lee, Byoungyoung Lee Link Github
2022 Twenty-Two Years Since Revealing Cross-Site Scripting Attacks: A Systematic Mapping And A Comprehensive Survey Abdelhakim Hannousse, Salima Yahiouche, Mohamed Cherif Nait-Hamoud Link ---
2021 Talking About My Generation: Targeted DOM-based XSS Exploit Generation using Dynamic Data Flow Analysis Souphiane Bensalim, David Klein, Thomas Barber, Martin Johns Link ---
2020 PMForce: Systematically AnalyzingpostMessage Handlers at Scale Marius Steffens, Ben Stock Link Github
2017 Code-Reuse Attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets Sebastian Lekies, Krzysztof Kotowicz, Samuel Groß, Eduardo A. Vela Nava, Martin Johns Link ---
2015 Auto-Patching DOM-based XSS At Scale Inian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena Link ---
2015 DEXTERJS: Robust Testing Platform for DOM-Based XSSVulnerabilities Inian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena Link ---
2013 25 Million Flows Later - Large-scale Detection of DOM-based XSS Sebastian Lekies, Ben Stock, Martin Johns Link ---
2013 mXSS Attacks: Attacking well-secured Web-Applicationsby using innerHTML Mutations Mario Heiderich, Jörg Schwenk, Tilman Frosch, Jonas Magazinius, Edward Z. Yang Link ---

Blogposts

Year Title Author Link
2021 Exploiting Client-Side Prototype Pollution in the wild s1r1us Link

CSS

Papers/Thesis

Year Title Author Link Github/PoC
2021 Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses Anatoly Shusterman, Ayush Agarwal, Sioli O’Connell, Daniel Genkin, Yossi Oren, Yuval Yarom Link ---
2021 Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets Pierre Laperdrix, Oleksii Starov, Quan Chen, Alexandros Kapravelos, Nick Nikiforakis Link Github
2020 Confused by Path: Analysis of Path Confusion Based Attacks Seyed Ali Mirheidari Link ---
2020 Large-Scale Analysis of Style Injection by Relative Path Overwrite Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William Robertson Link ---
2012 Scriptless Attacks – Stealing the Pie Without Touching the Sill Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk Link ---

Blogposts

Year Title Author Link
2021 Data Exfiltration via CSS + SVG Font Masato Kinugawa Link
2021 uBlock, I exfiltrate: exploiting ad blockers with CSS Gareth Heyes Link
2019 Better Exfiltration via HTML Injection d0nut Link

Web Cache

Papers/Thesis

Year Title Author Link Github/PoC
2024 Hidden Web Caches Discovery Matteo Golinelli, Bruno Crispo Link Github
2022 Web Cache Deception Escalates! Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo Link Github
2020 Cached and Confused: Web Cache Deception in the Wild Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson Link ---
2019 Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath Link ---

Network

Papers/Thesis

Year Title Author Link Github/PoC
2024 Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu Link ---
2024 Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack Ziqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ganqiu Du, Ke Xu, Jianping Wu Link ---
2023 Passive SSH Key Compromise via Lattices Keegan Ryan, Kaiwen He, George Arnold Sullivan, Nadia Heninger Link ---
2020 Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections Tom Van Goethem, Christina Pöpper, Wouter Joosen, Mathy Vanhoef Link Github
2020 EtherOops Exploring Practical Methods To Exploit Ethernet Packet In Packet Attacks Ben Seri, Gregory Vishnepolsky, Yevgeny Yusepovsky Link ---

Windows

Papers/Thesis

Year Title Author Link Github/PoC
2022 POPKORN: Popping Windows Kernel Drivers At Scale Rajat Gupta, Lukas Dresel, Noah Spahn, Giovanni Vigna, Christopher Kruegel, Taesoo Kim Link Github
2018 Exploiting Regedit- Invisible Persistence & binary storage eWhiteHats Link Github

Blogposts

Year Title Author Link
2022 DOing More Harm Remy Hax Link
2022 DOing Harm (Delivery Optimization) Remy Hax Link
2022 From KBs to CVEs: Understanding the Relationships Between Windows Security Updates and Vulnerabilities Moran Zaks Link

Side Channels

Papers/Thesis

Year Title Author Link Github/PoC
2024 PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via `Singing Pixels' Mordechai Guri Link ---
2024 Cache Timing Leakages in Zero-Knowledge Protocols Shibam Mukherjee, Christian Rechberger, Markus Schofnegger Link ---
2024 Deep-TEMPEST: Using Deep Learning to Eavesdrop on HDMI from its Unintended Electromagnetic Emanations Santiago Fernández, Emilio Martínez, Gabriel Varela, Pablo Musé, Federico Larroca Link ---
2024 GbHammer: Malicious Inter-process Page Sharing by Hammering Global Bits in Page Table Entries Keigo Yoshioka, Soramichi Akiyama Link ---
2024 FAULT+PROBE: A Generic Rowhammer-based Bit Recovery Attack Kemal Derya, M. Caner Tol, Berk Sunar Link ---
2024 Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud (Extended Version) Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas Link ---
2024 Impedance vs. Power Side-channel Vulnerabilities: A Comparative Study Md Sadik Awal, Buddhipriya Gayanath, Md Tauhidur Rahman Link ---
2024 Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments Debopriya Roy Dipta, Thore Tiemann, Berk Gulmezoglu, Eduard Marin, Thomas Eisenbarth Link ---
2024 PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound Man Zhou, Shuao Su, Qian Wang, Qi Li, Yuting Zhou, Xiaojing Ma, Zhengxiong Li Link ---
2024 SNOW-SCA: ML-assisted Side-Channel Attack on SNOW-V Harshit Saurabh, Anupam Golder, Samarth Shivakumar Titti, Suparna Kundu, Chaoyun Li, Angshuman Karmakar, Debayan Das Link ---
2024 Acoustic Side Channel Attack on Keyboards Based on Typing Patterns Alireza Taheritajar, Reza Rahaeimehr Link ---
2024 Prime+Retouch: When Cache is Locked and Leaked Jaehyuk Lee, Fan Sang, Taesoo Kim Link ---
2024 Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs Frederik Dermot Pustelnik, Xhani Marvin Sass, Jean-Pierre Seifert Link ---
2023 OverHear: Headphone based Multi-sensor Keystroke Inference Raveen Wijewickrama, Maryam Abbasihafshejani, Anindya Maiti, Murtuza Jadliwala Link ---
2023 A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries Antoine Geimer, Mathéo Vergnolle, Frédéric Recoules, Lesly-Ann Daniel, Sébastien Bardin, Clémentine Maurice Link ---
2023 LeakyOhm: Secret Bits Extraction using Impedance Analysis Saleh Khalaj Monfared, Tahoura Mosavirik, Shahin Tajik Link ---
2023 From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake Daniel De Almeida Braga, Natalia Kulatova, Mohamed Sabt, Pierre-Alain Fouque Link ---
2023 AVX Timing Side-Channel Attacks against Address Space Layout Randomization Hyunwoo Choi, Suryeon Kim, Seungwon Shin link ---
2022 Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis Carlton Shepherda, Konstantinos Markantonakisa, Nico van Heijningenb, Driss Aboulkassimic,Clément Gainec, Thibaut Heckmann, David Naccache Link ---
2022 Frequency Throttling Side-Channel Attack Chen Liu, Abhishek Chakraborty, Nikhil Chawla, Neer Roggel Link ---
2022 Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, David Kohlbrenner Link Github
2021 Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage Patrick Cronin, Xing Gao, Chengmo Yang, Haining Wang Link ---
2021 Attacks of the Knights: Exploiting Non Uniform Cache Access Time Farabi Mahmud, Sungkeun Kim, Harpreet Singh Chawla, Pritam Majumder, Jiayi Huang, Chia-Che Tsai, Eun Jung Kim, Abdullah Muzahid Link ---
2021 Automated Side Channel Analysis of Media Software with Manifold Learning Yuanyuan Yuan, Qi Pang, Shuai Wang Link Github
2021 Practical Timing Side Channel Attacks on Memory Compression Martin Schwarzl, Pietro Borrello, Daniel Gruss, Gururaj Saileshwar, Hanna Müller, Michael Schwarz Link ---
2021 Touchtone leakage attacks via smartphone sensors: mitigation without hardware modification Connor Bolton, Yan Long, Jun Han, Josiah Hester, Kevin Fu Link ---
2021 Leaking Control Flow Information via the Hardware Prefetcher Yun Chen, Lingfeng Pei, Trevor E. Carlson Link ---
2019 SMoTherSpectre: Exploiting Speculative Executionthrough Port Contention Atri Bhattacharyya, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Babak Falsafi, Mathias Payer, Anil Kurmus Link Github
2017 Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, Stefan Mangard Link ---
2016 Timecop Link ---

DNS

Papers/Thesis

Year Title Author Link Github/PoC
2023 RESOLVERFUZZ: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing Qifan Zhang, Xuesong Bai, Xiang Li , Haixin Duan, Qi Li, Zhou Li -Link -Github
2022 Under the Hood of DANE Mismanagement in SMTP Hyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Taekyoung “Ted” Kwon, Taejoong Chung Link Artifacts
2022 The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources Tianxiang Dai, Philipp Jeitner, Haya Shulman, Michael Waidner Link ---
2021 DNS and the DNS Cache Poisoning Attack Avi Kak Link
2021 The CNAME of the Game:Large-scale Analysis of DNS-based TrackingEvasion Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom Van Goethem Link ---
2020 Cross Layer Attacks and How to Use Them (forDNS Cache Poisoning, Device Tracking and More) Amit Klein Link ---
2017 Something From Nothing (There): Collecting Global IPv6 Datasets From DNS Tobias Fiebig, Kevin Borgolte, Shuang Hao, Christopher Kruegel, Giovanni Vigna Link Gitlab
2011 Bitsquatting DNS Hijacking without Exploitation Dinaburg Link ---
2005 NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities Yehuda Afek, Anat Bremler-Barr, Lior Shafir Link ---

Blogposts

Year Title Author Link
2021 Dangling DNS: Amazon EC2 IPs (Current State) Mohamed Elbadry Link

AI

Papers/Thesis

Year Title Author Link Github/PoC
2024 BreachSeek: A Multi-Agent Automated Penetration Tester Ibrahim Alshehri, Adnan Alshehri, Abdulrahman Almalki, Majed Bamardouf, Alaqsa Akbar Link Github
2024 Synthetic Cancer -- Augmenting Worms with LLMs Benjamin Zimmerman, David Zollikofer Link ---
2024 The Power of Words: Generating PowerShell Attacks from Natural Language Pietro Liguori, Christian Marescalco, Roberto Natella, Vittorio Orbinato, Luciano Pianese Link ---
2024 Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models Alberto Castagnaro, Mauro Conti, Luca Pajola Link ---
2024 LLM Agents can Autonomously Exploit One-day Vulnerabilities Richard Fang, Rohan Bindu, Akul Gupta, Daniel Kang Link ---
2024 Depending on yourself when you should: Mentoring LLM with RL agents to become the master in cybersecurity games Yikuan Yan, Yaolun Zhang, Keman Huang Link ---
2024 Using Hallucinations to Bypass GPT4's Filter Benjamin Lemkin Link ---
2024 A First Look at GPT Apps: Landscape and Vulnerability Zejun Zhang, Li Zhang, Xin Yuan, Anlan Zhang, Mengwei Xu, Feng Qian Link ---
2024 LLM Agents can Autonomously Hack Websites Richard Fang, Rohan Bindu, Akul Gupta, Qiusi Zhan, Daniel Kang Link ---
2024 LLMs as Hackers: Autonomous Linux Privilege Escalation Attacks Andreas Happe, Aaron Kaplan, Jürgen Cito Link ---
2023 CATASTROPHIC JAILBREAK OF OPEN-SOURCE LLMS VIA EXPLOITING GENERATION Yangsibo Huang, Samyak Gupta, Mengzhou Xia, Kai Li, Danqi Chen Link Github
2023 Cyber Sentinel: Exploring Conversational Agents’ Role in Streamlining Security Tasks with GPT-4 Mehrdad Kaheh, Danial Khosh Kholgh, Panos Kostakos Link Github
2023 Evaluation of Parameter-based Attacks against Embedded Neural Networks with Laser Injection Mathieu Dumont, Kevin Hector, Pierre-Alain Moellic, Jean-MaxDutertre, Simon Pontie Link ---
2023 How Secure is Code Generated by ChatGPT? Raphael Khoury, Anderson R. Avila, Jacob Brunelle, Baba Mamadou Camara Link ---
2023 Prompt Stealing Attacks Against Text-to-Image Generation Models Xinyue Shen, Yiting Qu, Michael Backes, Yang Zhang Link Github
2023 Poisoning Web-Scale Training Datasets is Practical Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum Anderson, Andreas Terzis, Kurt Thomas, Florian Tramer Link ---
2023 Hello Me, Meet the Real Me: Audio Deepfake Attacks on Voice Assistants Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis Link ---
2023 CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models Hossein Hajipour, Keno Hassler, Thorsten Holz, Lea Schonherr, Mario Fritz Link ---
2023 Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection Benjamin Steenhoek, Hongyang Gao, Wei Le Link PoC
2022 AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enable Chafika Benzaıd, Tarik Tale Link ---
2021 A Comparison of State-of-the-Art Techniques for Generating Adversarial Malware Binaries Prithviraj Dasgupta, Zachariah Osman Link ---
2021 Physical Side-Channel Attacks on Embedded Neural Networks: A Survey Maria Méndez Real, Rubén Salvador Link ---
2021 A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments Nickolaos Koroniotis, Nour Moustafa, Benjamin Turnbul, Francesco Schiliro, Praveen Gauravaram, Helge Janicke Link ---
2021 Leveraging AI to optimize website structure discovery during Penetration Testing Diego Antonellib, Roberta Cascellab, Gaetano Perronea, Simon Pietro Romanoa, Antonio Schiano Link ---
2021 The Threat of Offensive AI to Organizations Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Deng Gelei, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio Link ---
2021 Deep Learning-Based Autonomous DrivingSystems: A Survey of Attacks and Defenses Yao Deng, Tiehua Zhang, Guannan Lou, Xi Zheng, Jiong Jin, Qing-Long Han Link ---
2017 Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN Weiwei Hu, Ying Tan Link ---

Fuzzing / Exploitation / Vulnerability Discovery in Applications

Papers/Thesis

Year Title Author Link Github/PoC
2024 RISCVuzz: Discovering Architectural CPU Vulnerabilities via Differential Hardware Fuzzing Fabian Thomas, Lorenz Hetterich, Ruiyi Zhang, Daniel Weber, Lukas Gerlach, Michael Schwarz Link Link
2024 No Peer, no Cry: Network Application Fuzzing via Fault Injection Nils Bars, Moritz Schloegel, Nico Schiller, Lukas Bernhard, Thorsten Holz Link Github
2024 DarthShader: Fuzzing WebGPU Shader Translators & Compilers Lukas Bernhard, Nico Schiller, Moritz Schloegel, Nils Bars, Thorsten Holz Link ---
2024 Hacked in Translation -- from Subtitles to Complete Takeover Omri Herscovici, Omer Gull Link ---
2024 eyeballvul: a future-proof benchmark for vulnerability detection in the wild Timothee Chauvin Link Github
2024 UEFI Vulnerability Signature Generation using Static and Symbolic Analysis Md Shafiuzzaman, Achintya Desai, Laboni Sarker, Tevfik Bultan Link ---
2024 MegaVul: A C/C++ Vulnerability Dataset with Comprehensive Code Representation Chao Ni, Liyu Shen, Xiaohu Yang, Yan Zhu, Shaohua Wang Link Github
2024 FOX: Coverage-guided Fuzzing as Online Stochastic Control Dongdong She, Adam Storek, Yuchong Xie, Seoyoung Kweon, Prashast Srivastava, Suman Jana Link Github
2024 Super Mario in the Pernicious Kingdoms: Classifying glitches in old games Llewellyn Forward, Io Limmer, Joseph Hallett, Dan Page Link ---
2024 BinSym: Binary-Level Symbolic Execution using Formal Descriptions of Instruction Semantics Sören Tempel, Tobias Brandt, Christoph Lüth, Rolf Drechsler Link Github
2024 Enhancing Code Vulnerability Detection via Vulnerability-Preserving Data Augmentation Shangqing Liu, Wei Ma, Jian Wang, Xiaofei Xie, Ruitao Feng, Yang Liu Link ---
2024 OSS Malicious Package Analysis in the Wild Xiaoyan Zhou, Ying Zhang, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li Link ---
2024 Game Rewards Vulnerabilities: Software Vulnerability Detection with Zero-Sum Game and Prototype Learning Xin-Cheng Wen, Cuiyun Gao, Xinchen Wang, Ruiqi Wang, Tao Zhang, Qing Liao Link ---
2024 UBfuzz: Finding Bugs in Sanitizer Implementations Shaohua Li, Zhendong Su Link(https://arxiv.org/pdf/2401.04538) Atrifact
2024 VulMatch: Binary-level Vulnerability Detection Through Signature Zian Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Shigang Liu, Jun Zhang, Dongxi Liu Link Github
2023 Hyperfuzzing: black-box security hypertesting with a grey-box fuzzer Daniel Blackwell, Ingolf Becker, David Clark Link PoC
2023 Fuzzing the Latest NTFS in Linux with Papora: An Empirical Study Edward Lo, Ningyu He, Yuejie Shi, Jiajia Xu, Chiachih Wu, Ding Li, Yao Guo Link ---
2023 ODDFUZZ: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing Sicong Cao, Biao He, Xiaobing Sun , Yu Ouyang, Chao Zhang, Xiaoxue Wu, Ting Su,Lili Bo, Bin Li, Chuanlei Ma, Jiajia Li, Tao Wei Link Github
2023 autofz: Automated Fuzzer Composition at Runtime Yu-Fu Fu, Jaehyuk Lee, Taesoo Kim Link Github
2023 Detecting Exploit Primitives Automatically for Heap Vulnerabilities on Binary Programs Jie Liu, Hang An, Jin Li, Hongliang Liang Link ---
2022 AMPFUZZ: Fuzzing for Amplification DDoS Vulnerabilities Johannes Krupp, Ilya Grishchenko, Christian Rossow Link Github
2022 COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation Peng Xu, Yanhao Wang, Hong Hu, Purui Su Link Github
2022 FuzzingDriver: the Missing Dictionary to Increase Code Coverage in Fuzzers Arash Ale Ebrahim, Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari Link Github
2022 Path Transitions Tell More: Optimizing Fuzzing Schedules via Runtime Program States Kunpeng Zhang, Xi Xiao, Xiaogang Zhu, Ruoxi Sun, Minhui Xue, Sheng Wen Link Github
2021 Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation Jiska Classen, Francesco Gringoli, Michael Hermann, Matthias Hollick Link ---
2021 Fuzzm: Finding Memory Bugs through Binary-Only Instrumentation and Fuzzing of WebAssembly Daniel Lehmann, Martin Toldam Torp, Michael Pradel Link ---
2021 VIA: Analyzing Device Interfaces of Protected Virtual Machines Felicitas Hetzelt, Martin Radev, Robert Buhren, Mathias Morbitzer, Jean-Pierre Seifert Link ---
2021 Spotting Silent Buffer Overflows in Execution Trace throughGraph Neural Network Assisted Data Flow Analysis Zhilong Wang, Li Yu, Suhang Wang and Peng Liu Link ---
2021 QFuzz: Quantitative Fuzzing for Side Channels Yannic Noller, Saeid Tizpaz-Niari Link Github
2021 Revizor: Fuzzing for Leaks in Black-box CPUs Oleksii Oleksenko, Christof Fetzer, Boris Köpf, Mark Silberstein Link Github
2021 Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang Link ---
2020 The never ending war in the stack and the reincarnation of ROP attacks Ammari Nader, Joan Calvet, Jose M. Fernandez Link ---
2020 FuzzGen: Automatic Fuzzer Generation Kyriakos K. Ispoglou, Daniel Austin, Vishwath Mohan, Mathias Payer Link Github
2020 USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation Hui Peng, Mathias Payer Link Github
2019 FirmFuzz: Automated IoT Firmware Introspection and Analysis Prashast Srivastava, Hui Peng, Jiahao Li, Hamed Okhravi, Howard Shrobe, Mathias Payer Link Github
2016 Toward large-scale vulnerability discovery using Machine Learning Gustavo Grieco, Guillermo Luis Grinblat, Lucas Uzal, Sanjay Rawat, Josselin Feist, Laurent Mounier Link ---
2015 Pattern-Based Vulnerability Discovery Fabian Yamaguchi Link ---

Blogposts

Year Title Author Link
2021 Speculating the entire x86-64 Instruction Set In Seconds with This One Weird Trick Can Bölük Link
2020 Bugs on the Windshield: Fuzzing the Windows Kernel Netanel Ben Simon Link
2018 Deep Exploit - Github Project Isao Takaesu Github

Mobile/Radio

Papers/Thesis

Year Title Author Link Github/PoC
2024 Jäger: Automated Telephone Call Traceback David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro Link ---
2024 Eavesdropping Mobile Apps and Actions through Wireless Traffic in the Open World Xiaoguang Yang, Yong Huang, Junli Guo, Dalong Zhang, Qingxian Wang Link ---
2024 AndroCon: Conning Location Services in Android Soham Nag, Smruti R. Sarangi Link ---
2024 Never Gonna Give You Up: Exploring Deprecated NULL Ciphers in Commercial VoWiFi Deployments Gabriel Karl Gegenhuber, Philipp Frenzel, Edgar Weippl Link ---
2023 FINDING VULNERABILITIES IN MOBILE APPLICATION APIS: A MODULAR PROGRAMMATIC APPROACH Nate Haris, Kendree Chen, Ann Song, Benjamin Pou Link ---
2023 Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan Link ---
2023 Side-Channel VoIP Profiling Attack against Customer Service Automated Phone System Roy Laurens, Edo Christianto, Bruce Caulkins, Cliff C. Zou Link ---
2023 Watching your call: Breaking VoLTE Privacy in LTE/5G Networks Zishuai Cheng, Mihai Ordean, Flavio D. Garcia, Baojiang Cui, Dominik Rys Link ---
2021 An Empirical Analysis of HTTPS Configuration Security Camelia Simoiu, Wilson Nguyen, Zakir Durumeric Link ---
2021 Security Header Fields in HTTP Clients Pascal Gadient, Oscar Nierstrasz, Mohammad Ghafari Link ---
2021 LTrack: Stealthy Tracking of Mobile Phones in LTE Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Capkun Link ---

Blogposts

Year Title Author Link
2021 SeaGlass Enabling City-Wide IMSI-Catcher Detection Peter Ney, Ian Smith, Tadayoshi Kohno, Gabriel Cadamuro Link
2020 BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution Andy Nguyen Link
2019 New Type Of GPS Spoofing Attack In China Creates "Crop Circles" Of False Location Data Joseph Trevithick Link
2019 Wireless attacks on aircraft instrument landing systems Adrian Colyer Link

IoT

Papers/Thesis

Year Title Author Link Github/PoC
2024 Finding (and exploiting) vulnerabilities on IP Cameras: the Tenda CP3 case study Dario Stabili, Tobia Bocchi, Filip Valgimigli, Mirco Marchetti Link Github
2024 AutoFirm: Automatically Identifying Reused Libraries inside IoT Firmware at Large-Scale YongLe Chen, Feng Ma, Ying Zhang, YongZhong He, Haining Wang, Qiang Li Link Github
2024 LuaTaint: A Static Taint Analysis System for Web Interface Framework Vulnerability of IoT Devices Jiahui Xiang, Wenhai Wang, Tong Ye, Peiyu Liu Link ---
2023 AdvRain: Adversarial Raindrops to Attack Camera-Based Smart Vision Systems Amira Guesmi , Muhammad Abdullah Hanif, Muhammad Shafique Link ---
2023 Ember-IO: Effective Firmware Fuzzing with Model-Free Memory Mapped IO Guy Farrelly, Michael Chesser, Damith C. Ranasinghe Link Github
2021 My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack Matthias Gazzari, Annemarie Mattmann, Max Maass, Matthias Hollick Link Github
2021 VoIP Can Still Be Exploited — Badly Pietro Biondi, Stefano Bognanni, Giampaolo Bella Link ---
2021 A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices Dingding Wang, Muhui Jiang, Rui Chang, Yajin Zhou, Baolei Hou, Xiapu Luo, Lei Wu, Kui Ren LINK ---
2020 HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation Abraham A. Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, Mathias Payer Link Github
2016 Towards Automated Dynamic Analysis for Linux-based Embedded Firmware Daming D. Chen, Manuel Egele, Maverick Woo, David Brumley Link Github

Blogposts

Year Title Author Link
2020 Using Z3 Theorem on AVR Firmware Ryan Cornateanu Link

Crypto/DeFi

Papers/Thesis

Year Title Author Link Github/PoC
2024 Deanonymizing Ethereum Validators: The P2P Network Has a Privacy Issue Lioba Heimbach, Yann Vonlanthen, Juan Villacis, Lucianna Kiffer, Roger Wattenhofer Link ---
2024 DogeFuzz: A Simple Yet Efficient Grey-box Fuzzer for Ethereum Smart Contracts Ismael Medeiros, Fausto Carvalho, Alexandre Ferreira, Rodrigo Bonifácio, Fabiano Cavalcanti Fernandes Link Github
2024 ML2SC: Deploying Machine Learning Models as Smart Contracts on the Blockchain Zhikai Li, Steve Vott, Bhaskar Krishnamachar Link ---
2024 Larger-scale Nakamoto-style Blockchains Don't Necessarily Offer Better Security Jannik Albrecht, Sebastien Andreina, Frederik Armknecht, Ghassan Karame, Giorgia Marson, Julian Willingmann Link ---
2024 51% Attack via Difficulty Increase with a Small Quantum Miner Bolton Bailey, Or Sattath Link ---
2023 Abusing the Ethereum Smart Contract Verification Services for Fun and Profit Pengxiang Ma, Ningyu He, Yuhua Huang, Haoyu Wang Link ---
2023 The offline digital currency puzzle solved by a local blockchain Henrique de Carvaloh Videira Link ---
2023 Explainable Ponzi Schemes Detection on Ethereum Letterio Galletta, Fabio Pinelli Link Github
2022 Security Analysis of DeFi: Vulnerabilities, Attacks and Advances Wenkai Li, Jiuyang Bu, Xiaoqi Li, Xianyi Chen Link ---
2022 Secure Decentralized Online Gaming with Lending Functionalities Katharina Alefs, Florian Hartl, Luke Newman, Banu ̈Ozdeveci, Wisnu Uriawan Link Github
2022 Blockchain in a nutshell Duc A. Tran, Bhaskar Krishnamachari Link ---
2022 A Secure File Sharing System Based on IPFS and Blockchain Hsiao-Shan Huang, Tian-Sheuan Chang, Jhih-Yi Wu Link ---
2022 Gas Gauge: A Security Analysis Tool for Smart Contract Out-of-Gas Vulnerabilities Behkish Nassirzadeh , Vijay Ganesh, Huaiying Sun, Sebastian Banescu Link Github
2021 (Meme) Proof of Steak Jon Crowcroft, Hamed Haddadi, Arthur Gervais, Tristan Henderson Link ---
2021 Machine Learning Guided Cross-Contract Fuzzing Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun, Lei Ma, Haijun Wang, Jianjun Zhao Link ---
2021 JACK THE RIPPLER: Arbitrage on the Decentralized Exchange of the XRP Ledger Gaspard Peduzzi, Jason James, Jiahua Xu Link ---
2021 Understanding Security Issues in the NFT Ecosystem Dipanjan Das, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, Giovanni Vigna Link ---
2021 Franchised Quantum Money Bhaskar Roberts, Mark Zhandry Link ---
2021 An Empirical Study of Protocols in Smart Contracts Timothy Mou, Michael Coblenz, Jonathan Aldrich Link ---
2021 Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit Kaihua Qin, Liyi Zhou, Benjamin Livshits, Arthur Gervais Link ---

BlueTeam

Papers/Thesis

Year Title Author Link Github/PoC
2024 RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu Link Github
2024 Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary Emulation Max Landauer, Klaus Mayer, Florian Skopik, Markus Wurzenberger, Manuel Kern Link ---
2024 Forecasting Attacker Actions using Alert-driven Attack Graphs Ion Băbălău, Azqa Nadeem Link ---
2024 HoneyGAN Pots: A Deep Learning Approach for Generating Honeypots Ryan Gabrys, Daniel Silva, Mark Bilinski Link ---
2024 EarlyMalDetect: A Novel Approach for Early Windows Malware Detection Based on Sequences of API Calls Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury Link ---
2024 HookChain: A new perspective for Bypassing EDR Solutions Helvio Carvalho Junior Link ---
2024 Leveraging Adversarial Detection to Enable Scalable and Low Overhead RowHammer Mitigations Oğuzhan Canpolat, A. Giray Yağlıkçı, Ataberk Olgun, İsmail Emir Yüksel, Yahya Can Tuğrul, Konstantinos Kanellopoulos, Oğuz Ergin, Onur Mutlu Link ---
2023 Nebula: Self-Attention for Dynamic Malware Analysis Dmitrijs Trizna, Luca Demetrio, Battista Biggio, Fabio Roli Link ---
2023 Application-layer Characterization and Traffic Analysis for Encrypted QUIC Transport Protocol Qianqian Zhang ,Chi-Jiun Su Link ---
2023 Detection of Malicious DNS-over-HTTPS Traffic: An Anomaly Detection Approach using Autoencoders Sergio A. Salinas Monroy, Aman Kumar Gupta, Garrett Wahlstedt --- ---

Misc/Other

Papers/Thesis

Year Title Author Link Github/PoC
2024 Private and Secure Fuzzy Name Matching Harsh Kasyap, Ugur Ilker Atmaca, Carsten Maple, Graham Cormode, Jiancong He Link ---
2024 SHA-256 Collision Attack with Programmatic SAT Nahiyan Alamgir, Saeed Nejati, Curtis Bright Link ---
2024 Inferring Discussion Topics about Exploitation of Vulnerabilities from Underground Hacking Forums Felipe Moreno-Vera Link ---
2024 CRATOR: a Dark Web Crawler Daniel De Pascale, Giuseppe Cascavilla, Damian A. Tamburri, Willem-Jan Van Den Heuvel Link ---
2024 Statistical testing of random number generators and their improvement using randomness extraction Cameron Foreman, Richie Yeung, Florian J. Curchod Link ---
2024 Inception Attacks: Immersive Hijacking in Virtual Reality Systems Zhuolin Yang, Cathy Yuanchen Li, Arman Bhalla, Ben Y. Zhao, Haitao Zheng Link ---
2024 Username Squatting on Online Social Networks: A Study on X Anastasios Lepipas, Anastasia Borovykh, Soteris Demetriou Link ---
2024 UVL2: A Unified Framework for Video Tampering Localization Pengfei Pei, Yun Cao, Jinchuan Li, Zeyu Zhang, Yuqi Pang Link ---
2023 The Software Genome Project: Venture to the Genomic Pathways of Open Source Software and Its Applications Yueming Wu, Chengwei Liu, Yang Liu Link ---
2023 JFinder: A Novel Architecture for Java Vulnerability Identification Based Quad Self-Attention and Pre-training Mechanism Jin Wanga, Zishan Huanga, Hui Xiaoa, Yinhao Xiao Link Github
2023 Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections Francesco Luigi De Faveri, Luca Cosuti, Pier Paolo Tricomi, Mauro Conti Link ---
2023 A Survey on Learning to Hash Jingdong Wang, Heng Tao Shen, Ting Zhang Link ---
2023 MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion Zilong Lin , Zhengyi Li , Xiaojing Liao , XiaoFeng Wang , Xiaozhong Liu Link ---
2023 Quantifying User Password Exposure to Third-Party CDNs Rui Xin, Shihan Lin, Xiaowei Yang Link Github
2022 GhostTouch: Targeted Attacks on Touchscreens without Physical Touch Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu Link Github
2022 Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations Ben Nassi, Yaron Pirutin, Raz Swisa, Adi Shamir, Yuval Elovici, Boris Zadov Link ---
2022 Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks Ziwen Wan Junjie Shen, Jalen Chuang, Xin Xia, Joshua Garcia, Jiaqi Ma, Qi Alfred Chen Link ---
2021 Characterizing Retweet Bots: The Case of Black Market Accounts Tugrulcan Elmas, Rebekah Overdorf, Karl Abere Link ---
2021 Hardware Trojan Insertion in Finalized Layouts: a Silicon Demonstration Tiago Perez, Samuel Pagliarini Link ---
2021 Trojan Source: Invisible Vulnerabilities Nicholas Boucher, Ross Anderson Link ---
2021 Demystifying Scam Tokens on Uniswap Decentralized Exchange Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu Link ---
2021 BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks Johannes Krupp, Christian Rossow Link ---
2021 The Rise and Fall of Fake News sites: A Traffic Analysis Manolis Chalkiadakis, Alexandros Kornilakis, Pangiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis -Link ---
2021 Kubernetes Auto-Scaling: YoYo attack vulnerability and mitigation Ronen Ben-David, Anat Bremler-Barr Link ---
2021 Intrinsic Propensity for Vulnerability in Computers?Arbitrary Code Execution in the Universal Turing Machine Pontus Johnson Link ---
2021 Python and Malware: Developing Stealth and Evasive Malware WithoutObfuscation Vasilios Koutsokostas, Constantinos Patsakis Link ---
2021 The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning Chris McMahon Stone, Sam L. Thomas, Mathy Vanhoef, James Henderson, Nicolas Bailluet, Tom Chothia LINK ---
2021 How Great is the Great Firewall? Measuring China’s DNS Censorship Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis Link ---
2021 SEVerity: Code Injection Attacks against Encrypted Virtual Machines Mathias Morbitzer, Sergej Proskurin, Martin Radev, Marko Dorfhuber, Erick Quintanar Salas Link ---
2021 Web Content Signing with Service Workers Thomas Sutter, Peter Berlich, Marc Rennhard, Kevin Lapagna, Fabio Germann Link ---
2021 Memory-Safety Challenge Considered Solved? An In-DepthStudy with All Rust CVEs Hui Xu, Zhuangbin Chen, Mingshen Sun, Yangfan Zhou, Michael R. Lyu Link ---
2020 Light CommANDS: Laser-Based Audio Injection on Voice-Controolable Systems Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu Link ---
2020 Understanding Memory and Thread Safety Practices and Issues in Real-World Rust Programs Boqin Qin, Yilun Chen, Zeming Yu, Linhai Song, Yiying Zhang Link ---
2020 Security and Privacy of Social Login Louis Christopher Jannett Link ---
2014 ECMAScript 6 for Penetration Testers Mario Heiderich Link ---
2005 A Self-Learning Worm Using Importance Scanning Zesheng Chen, Chuanyi Ji Link ---
2005 Network Protocol Analysis using Bioinformatics Algorithms Marshall A. Beddoe Link

Blogposts

Year Title Author Link
2021 Security and Privacy of Social Logins (I) Louis Christopher Jannett Link
2021 Security and Privacy of Social Logins (II) Louis Christopher Jannett Link
2021 Security and Privacy of Social Logins (III) Louis Christopher Jannett Link
2021 Weird Ways to Run Unmanaged Code in .NET XPN/Adam Chester Link
2020 Reverse Engineering the source code of the BioNTech/Pfizer SARS-CoV-2 Vaccine Bert Hubert Link
2020 Practical Exploitation of Math.random on V8 d0nut YT Github
2018 Introduction to Locality-Sensitive Hashing Tyler Neylon Link

About

A curated reading list about offensive IT security

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published