A collection of papers about offensive IT security with some blogposts sprinkled in. If you want to contribute a paper just open a issue or issue a pull request.
Year | Title | Author | Link | Github/PoC |
---|---|---|---|---|
2023 | iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple Devices | Jason Kim, Stephan van Schaik, Daniel Genkin, Yuval Yarom | Link | --- |
2023 | Chrowned by an Extension: Abusing the Chrome DevTools Protocol through the Debugger API | Jose Miguel Moreno, Narseo Vallina-Rodriguez, Juan Tapiador | Link | --- |
2022 | Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses | Mojtaba Zaheri, Yossi Oren, Reza Curtmola | Link | --- |
2022 | Interactive History Sniffing with Dynamically-Generated QR Codes and CSS Difference Blending | Keith O’Neal, Scott Yilek | Link | --- |
2022 | WebSpec: Towards Machine-Checked Analysis of Browser Security Mechanisms | Lorenzo Veronese, Benjamin Farinier, Mauro Tempesta, Marco Squarcina, Matteo Maffei | Link | --- |
2022 | SOK: On the Analysis of Web Browser Security | Jungwon Lim, Yonghwi Jin, Mansour Alharthi, Xiaokuan Zhang, Jinho Jung, Rajat Gupta, Kuilin Li, Daehee Jang, Taesoo Kim | Link | --- |
2021 | Categorizing Service Worker Attacks and Mitigations | Karthika Subramani, Jordan Jueckstock, Alexandros Kapravelos, Roberto Perdisci | Link | --- |
2021 | Careful Who You Trust: Studying the Pitfalls of Cross-Origin Communication | Gordon Meiser, Pierre Laperdrix, Ben Stock | Link | --- |
2021 | Tales of Favicons and Caches: Persistent Tracking in Modern Browsers | Konstantinos Solomos, John Kristoff, Chris Kanich, Jason Polakis | Link | --- |
2021 | Timing-Based Browsing Privacy Vulnerabilities Via Site Isolation | Zihao Jin, Ziqiao Kong, Shuo Chen†, Haixin Duan | Link | --- |
2021 | Pool-Party: Exploiting Browser Resource Pools as Side-Channels for Web Tracking | Peter Snyder, Soroush Karami, Benjamin Livshits, Hamed Haddadi | Link | --- |
2021 | XSinator.com: From a Formal Model to the Automatic Evaluation of Cross-Site Leaks in Web Browsers | Lukas Knittel, Christian Mainka, Marcus Niemietz | Link | Github PoC |
2021 | Remote Memory-Deduplication Attacks | Martin Schwarzl, Erik Kraft, Moritz Lipp, Daniel Gruss | Link | --- |
2021 | T-Reqs: HTTP Request Smuggling with Differential Fuzzing | Bahruz Jabiyev, Steven Sprecher, Kaan Onarlioglu, Engin Kirda | Link | Github |
2021 | An Empirical Analysis of HTTPS Configuration Security | Camelia Simoiu, Wilson Nguyen, Zakir Durumeric | Link | --- |
2021 | Gummy Browsers: Targeted Browser Spoofing against State-of-the-Art Fingerprinting Techniques | zengrui liu, prakash shrestha, nitesh saxena | Link | --- |
2021 | CorbFuzz: Checking Browser Security Policies with Fuzzing | Chaofan Shou, ̇Ismet Burak Kadron, Qi Su, Tevfik Bultan | Link | --- |
2021 | SoK: In Search of Lost Time: A Review of JavaScript Timers in Browsers. | Thomas Rokicki, Clémentine Maurice, Pierre Laperdrix | Link | --- |
2021 | Awakening the Web's Sleeper Agents: Misusing Service Workers for Privacy Leakage | Soroush Karami, Panagiotis Ilia, Jason Polakis | Link | |
2020 | Security and Privacy of Social Logins | Louis Christopher Jannett | Link | --- |
2020 | Everything Old is New Again: Binary Security of WebAssembly | Daniel Lehmann, Johannes Kinder, Michael Pradel | Link | --- |
2020 | Cross-Origin State Inference (COSI) Attacks:Leaking Web Site States through XS-Leaks | Avinash Sudhodanan, Soheil Khodayari, Juan Caballero | Link | |
2019 | BakingTimer: privacy analysis of server-side request processing time | Iskander Sánchez-Rola, D. Balzarotti, I. Santos | Link | |
2019 | Browser Fingerprinting using Combinatorial Sequence Testing | Bernhard Garn, Dimitris E. Simos, Stefan Zauner, Rick Kuhn, Raghu Kacker | Link | |
2018 | Browser history re:visited | Michael Smith, Craig Disselkoen, Shravan Narayan, Fraser Brown, Deian Stefa | Link | --- |
2018 | How Tracking Companies Circumvented Ad Blockers Using WebSockets | Muhammad Ahmad Bashir, Sajjad Arshad, Engin Kirda, William Robertson, Christo Wilson | Link | --- |
2018 | HSTS Supports Targeted Surveillance | Paul Syverson, Matthew Traudt | Link | Github |
2017 | Fantastic Timers and Where to Find Them: High-Resolution Microarchitectural Attacks in JavaScript | Michael Schwarz, Clémentine Maurice, Daniel Gruss, Stefan Mangard | Link | --- |
2017 | Practical Keystroke Timing Attacks in Sandboxed JavaScript | Moritz Lipp, Daniel Gruss, Michael Schwarz, David Bidner, Clementine Maurice, Stefan Mangard | Link | Github |
2016 | On the Incoherencies in Web Browser Access Control Policies | Kapil Singh, Alexander Moshchuk, Helen J. Wang, Wenke Lee | Link | --- |
2016 | HEIST: HTTP Encrypted Information can be Stolen through TCP-windows | Mathy Vanhoef,Tom Van Goethem | Link | |
2016 | Trusted Browsers for Uncertain Times | David Kohlbrenner, Hovav Shacham | Link | --- |
2015 | The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications | Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis | Link | --- |
2015 | Practical Memory Deduplication Attacks in Sandboxed Javascript | Daniel Gruss(, David Bidner, Stefan Mangard | Link | --- |
2013 | Pixel Perfect Timing Attacks with HTML5 | Paul Stone | Link | PoC |
2013 | Redefining Web Browser Principals with a Configurable Origin Policy | Yinzhi Cao, Vaibhav Rastogi, Zhichun Li, Yan Chen, Alexander Moshchuk | Link | --- |
2010 | The Emperor’s New APIs: On the (In)Secure Usage of New Client-side Primitives | Steve Hanna, Eui Chul Richard Shin, Devdatta Akhawe, Arman Boehm, Prateek Saxena, Dawn Song | Link | --- |
2010 | Object views: Fine-grained sharing in browsers | Leo Meyerovich, Adrienne Porter Felt, Mark Miller | Link | --- |
2009 | Cross-origin javascript capability leaks: detection, exploitation, and defense | Adam Barth, Joel Weinberger,Dawn Song | Link | --- |
2007 | Exposing Private Information by Timing Web Applications | Andrew Bortz, Dan Boneh, Palash Nandy | Link | --- |
Year | Title | Author | Link |
---|---|---|---|
2021 | Examining JavaScript Inter-Process Communication in Firefox | Frederik Braun | Link |
2020 | Marginwidth/marginheight – the unexpected cross-origin communication channel | Michał Bentkowski | Link |
2018 | Side-channel attacking browsers through CSS3 features | Ruslan Habalov | Link |
2016 | CSS mix-blend-mode is bad for your browsing history | lcamtuf | Link |
NULL | History theft with CSS Boolean algebra | lcamtuf | Link |
Year | Title | Author | Link | Github/PoC |
---|---|---|---|---|
2024 | Towards Fine-Grained Webpage Fingerprinting at Scale | Xiyuan Zhao, Xinhao Deng, Qi Li, Yunpeng Liu, Zhuotao Liu, Kun Sun, Ke Xu | Link | --- |
2024 | GHunter: Universal Prototype Pollution Gadgets in JavaScript Runtimes | Eric Cornelissen, Mikhail Shcherbakov, Musard Balliu | Link | Github |
2024 | Fuzzing at Scale: The Untold Story of the Scheduler | Ivica Nikolic, Racchit Jain | Link | --- |
2024 | What All the PHUZZ Is About: A Coverage-guided Fuzzer for Finding Vulnerabilities in PHP Web Applications | Sebastian Neef, Lorenz Kleissner, Jean-Pierre Seifert | Link | Link |
2024 | The HTTP Garden: Discovering Parsing Vulnerabilities in HTTP/1.1 Implementations by Differential Fuzzing of Request Streams | Ben Kallus, Prashant Anantharaman, Michael Locasto, Sean W. Smith | Link | Github |
2024 | AssetHarvester: A Static Analysis Tool for Detecting Assets Protected by Secrets in Software Artifacts | Setu Kumar Basak, K. Virgil English, Ken Ogura, Vitesh Kambara, Bradley Reaves, Laurie Williams | Link | --- |
2024 | Fingerprinting web servers through Transformer-encoded HTTP response headers | Patrick Darwinkel | Link | Github |
2024 | AdvSQLi: Generating Adversarial SQL Injections against Real-world WAF-as-a-service | Zhenqing Qu, Xiang Ling, Ting Wang, Xiang Chen, Shouling Ji, Chunming Wu | Link | --- |
2024 | EDEFuzz: A Web API Fuzzer for Excessive Data Exposures | Lianglu Pan, Shaanan Cohney, Toby Murray, Van-Thuan Pham | Link | Github |
2023 | Parse Me, Baby, One More Time: Bypassing HTML Sanitizer via Parsing Differentials | David Klein, Martin Johns | Link | Github |
2023 | Unveiling the Invisible: Detection and Evaluation of Prototype Pollution Gadgets with Dynamic Taint Analysis | Mikhail Shcherbakov, Paul Moosbrugger, Musard Balliu | Link | Github |
2023 | Measuring CDNs susceptible to Domain Fronting | Karthika Subramani, Roberto Perdisci, Pierros Skafidas | Link | --- |
2023 | Stratosphere: Finding Vulnerable Cloud Storage Buckets | Jack Cable, Drew Gregory, Liz Izhikevich, Zakir Durumeric | Link | --- |
2023 | From Prompt Injections to SQL Injection Attacks: How Protected is Your LLM-Integrated Web Application? | Rodrigo Pedro, Daniel Castro, Paulo Carreira, Nuno Santos | Link | --- |
2023 | BertRLFuzzer: A BERT and Reinforcement Learning Based Fuzzer | Piyush Jha, Joseph Scott, Jaya Sriram Ganeshna, Mudit Singh, Vijay Ganesh | Link | Github |
2023 | Exploiting Input Sanitization for Regex Denial of Service | Efe Barlas, Xin Du, James C. Davis | Link | --- |
2023 | SSO-MONITOR: Fully-Automatic Large-Scale Landscape, Security, and Privacy Analyses of Single Sign-On in the Wild | Maximilian Westers, Tobias Wich, Louis Jannett, Vladislav Mladenov, Christian Mainka, Andreas Mayer | Link | Google Drive |
2023 | Automated Black-box Testing of Mass Assignment Vulnerabilities in RESTful APIs | Davide Corradini, Michele Pasqua, Mariano Ceccato | Link | Github |
2022 | FuzzOrigin: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing | Sunwoo Kim, Young Min Kim, Jaewon Hur, Suhwan Song, Gwangmu Lee, Byoungyoung Lee | Link | Github |
2022 | Mining Node.js Vulnerabilities via Object Dependence Graph and Query | Song Li, Mingqing Kang, Jianwei Hou, Yinzhi Cao | Link | Github |
2022 | Web Cache Deception Escalates! | Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo | Link | Github |
2022 | Exploring Phone-Based Authentication Vulnerabilities in Single Sign-On Systems | Matthew M. Tolbert, Elie M. Hess, Mattheus C. Nascimento, Yunsen Lei, Craig A. Shue | Link | --- |
2022 | Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web | Avinash Sudhodanan, Andrew Paverd | Link | --- |
2022 | COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation | Peng Xu, Yanhao Wang, Hong Hu, Purui Su | Link | Github |
2021 | JAW: Studying Client-side CSRF with Hybrid Property Graphs and Declarative Traversals | Soheil Khodayari, Giancarlo Pellegrino | Link | Github |
2021 | Understanding Emerging Client-Side Web Vulnerabilities using Dynamic Program Analysis | Marius Steffens | Link | --- |
2021 | Deriving Semantics-Aware Fuzzers from Web API Schemas | Zac Hatfield-Dodds, Dmitry Dygalo | Link | --- |
2021 | Black Widow: Blackbox Data-driven Web Scanning | Benjamin Eriksson, Giancarlo Pellegrino, Andrei Sabelfeld | Link | |
2021 | Over 100 Bugs in a Row: Security Analysis of the Top-Rated Joomla Extensions | Marcus Niemietz, Mario Korth, Christian Mainka, Juraj Somorovsky | Link | --- |
2021 | Security Vulnerability Detection Using Deep Learning Natural Language Processing | Noah Ziems, Shaoen Wu | Link | --- |
2020 | Mailto: Me Your Secrets. On Bugs and Features in Email End-to-End Encryption | Jens Müller, Marcus Brinkmann, Damian Poddebniak, Sebastian Schinzel, Jörg Schwenk | Link | --- |
2020 | Can I Take Your Subdomain?Exploring Related-Domain Attacks in the Modern Web | Marco Squarcina, Mauro Tempesta, Lorenzo Veronese, Stefano Calzavara, Matteo Maffe | Link | --- |
2020 | Cached and Confused: Web Cache Deception in the Wild | Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson | Link | --- |
Year | Title | Author | Link | Github/PoC |
---|---|---|---|---|
2022 | FuzzOrigin: Detecting UXSS vulnerabilities in Browsers through Origin Fuzzing | Sunwoo Kim, Young Min Kim, Jaewon Hur, Suhwan Song, Gwangmu Lee, Byoungyoung Lee | Link | Github |
2022 | Twenty-Two Years Since Revealing Cross-Site Scripting Attacks: A Systematic Mapping And A Comprehensive Survey | Abdelhakim Hannousse, Salima Yahiouche, Mohamed Cherif Nait-Hamoud | Link | --- |
2021 | Talking About My Generation: Targeted DOM-based XSS Exploit Generation using Dynamic Data Flow Analysis | Souphiane Bensalim, David Klein, Thomas Barber, Martin Johns | Link | --- |
2020 | PMForce: Systematically AnalyzingpostMessage Handlers at Scale | Marius Steffens, Ben Stock | Link | Github |
2017 | Code-Reuse Attacks for the Web: Breaking Cross-Site Scripting Mitigations via Script Gadgets | Sebastian Lekies, Krzysztof Kotowicz, Samuel Groß, Eduardo A. Vela Nava, Martin Johns | Link | --- |
2015 | Auto-Patching DOM-based XSS At Scale | Inian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena | Link | --- |
2015 | DEXTERJS: Robust Testing Platform for DOM-Based XSSVulnerabilities | Inian Parameshwaran, Enrico Budianto, Shweta Shinde, Hung Dang, Atul Sadhu, Prateek Saxena | Link | --- |
2013 | 25 Million Flows Later - Large-scale Detection of DOM-based XSS | Sebastian Lekies, Ben Stock, Martin Johns | Link | --- |
2013 | mXSS Attacks: Attacking well-secured Web-Applicationsby using innerHTML Mutations | Mario Heiderich, Jörg Schwenk, Tilman Frosch, Jonas Magazinius, Edward Z. Yang | Link | --- |
Year | Title | Author | Link |
---|---|---|---|
2021 | Exploiting Client-Side Prototype Pollution in the wild | s1r1us | Link |
Year | Title | Author | Link | Github/PoC |
---|---|---|---|---|
2021 | Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses | Anatoly Shusterman, Ayush Agarwal, Sioli O’Connell, Daniel Genkin, Yossi Oren, Yuval Yarom | Link | --- |
2021 | Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets | Pierre Laperdrix, Oleksii Starov, Quan Chen, Alexandros Kapravelos, Nick Nikiforakis | Link | Github |
2020 | Confused by Path: Analysis of Path Confusion Based Attacks | Seyed Ali Mirheidari | Link | --- |
2020 | Large-Scale Analysis of Style Injection by Relative Path Overwrite | Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William Robertson | Link | --- |
2012 | Scriptless Attacks – Stealing the Pie Without Touching the Sill | Mario Heiderich, Marcus Niemietz, Felix Schuster, Thorsten Holz, Jörg Schwenk | Link | --- |
Year | Title | Author | Link |
---|---|---|---|
2021 | Data Exfiltration via CSS + SVG Font | Masato Kinugawa | Link |
2021 | uBlock, I exfiltrate: exploiting ad blockers with CSS | Gareth Heyes | Link |
2019 | Better Exfiltration via HTML Injection | d0nut | Link |
Year | Title | Author | Link | Github/PoC |
---|---|---|---|---|
2024 | Hidden Web Caches Discovery | Matteo Golinelli, Bruno Crispo | Link | Github |
2022 | Web Cache Deception Escalates! | Seyed Ali Mirheidari, Matteo Golinelli, Kaan Onarlioglu, Engin Kirda, Bruno Crispo | Link | Github |
2020 | Cached and Confused: Web Cache Deception in the Wild | Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson | Link | --- |
2019 | Your Cache Has Fallen: Cache-Poisoned Denial-of-Service Attack | Hoai Viet Nguyen, Luigi Lo Iacono, Hannes Federrath | Link | --- |
Year | Title | Author | Link | Github/PoC |
---|---|---|---|---|
2024 | Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks | Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, Ke Xu | Link | --- |
2024 | Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack | Ziqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ganqiu Du, Ke Xu, Jianping Wu | Link | --- |
2023 | Passive SSH Key Compromise via Lattices | Keegan Ryan, Kaiwen He, George Arnold Sullivan, Nadia Heninger | Link | --- |
2020 | Timeless Timing Attacks: Exploiting Concurrency to Leak Secrets over Remote Connections | Tom Van Goethem, Christina Pöpper, Wouter Joosen, Mathy Vanhoef | Link | Github |
2020 | EtherOops Exploring Practical Methods To Exploit Ethernet Packet In Packet Attacks | Ben Seri, Gregory Vishnepolsky, Yevgeny Yusepovsky | Link | --- |
Year | Title | Author | Link | Github/PoC |
---|---|---|---|---|
2022 | POPKORN: Popping Windows Kernel Drivers At Scale | Rajat Gupta, Lukas Dresel, Noah Spahn, Giovanni Vigna, Christopher Kruegel, Taesoo Kim | Link | Github |
2018 | Exploiting Regedit- Invisible Persistence & binary storage | eWhiteHats | Link | Github |
Year | Title | Author | Link |
---|---|---|---|
2022 | DOing More Harm | Remy Hax | Link |
2022 | DOing Harm (Delivery Optimization) | Remy Hax | Link |
2022 | From KBs to CVEs: Understanding the Relationships Between Windows Security Updates and Vulnerabilities | Moran Zaks | Link |
Year | Title | Author | Link | Github/PoC |
---|---|---|---|---|
2024 | PIXHELL Attack: Leaking Sensitive Information from Air-Gap Computers via `Singing Pixels' | Mordechai Guri | Link | --- |
2024 | Cache Timing Leakages in Zero-Knowledge Protocols | Shibam Mukherjee, Christian Rechberger, Markus Schofnegger | Link | --- |
2024 | Deep-TEMPEST: Using Deep Learning to Eavesdrop on HDMI from its Unintended Electromagnetic Emanations | Santiago Fernández, Emilio Martínez, Gabriel Varela, Pablo Musé, Federico Larroca | Link | --- |
2024 | GbHammer: Malicious Inter-process Page Sharing by Hammering Global Bits in Page Table Entries | Keigo Yoshioka, Soramichi Akiyama | Link | --- |
2024 | FAULT+PROBE: A Generic Rowhammer-based Bit Recovery Attack | Kemal Derya, M. Caner Tol, Berk Sunar | Link | --- |
2024 | Last-Level Cache Side-Channel Attacks Are Feasible in the Modern Public Cloud (Extended Version) | Zirui Neil Zhao, Adam Morrison, Christopher W. Fletcher, Josep Torrellas | Link | --- |
2024 | Impedance vs. Power Side-channel Vulnerabilities: A Comparative Study | Md Sadik Awal, Buddhipriya Gayanath, Md Tauhidur Rahman | Link | --- |
2024 | Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments | Debopriya Roy Dipta, Thore Tiemann, Berk Gulmezoglu, Eduard Marin, Thomas Eisenbarth | Link | --- |
2024 | PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound | Man Zhou, Shuao Su, Qian Wang, Qi Li, Yuting Zhou, Xiaojing Ma, Zhengxiong Li | Link | --- |
2024 | SNOW-SCA: ML-assisted Side-Channel Attack on SNOW-V | Harshit Saurabh, Anupam Golder, Samarth Shivakumar Titti, Suparna Kundu, Chaoyun Li, Angshuman Karmakar, Debayan Das | Link | --- |
2024 | Acoustic Side Channel Attack on Keyboards Based on Typing Patterns | Alireza Taheritajar, Reza Rahaeimehr | Link | --- |
2024 | Prime+Retouch: When Cache is Locked and Leaked | Jaehyuk Lee, Fan Sang, Taesoo Kim | Link | --- |
2024 | Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs | Frederik Dermot Pustelnik, Xhani Marvin Sass, Jean-Pierre Seifert | Link | --- |
2023 | OverHear: Headphone based Multi-sensor Keystroke Inference | Raveen Wijewickrama, Maryam Abbasihafshejani, Anindya Maiti, Murtuza Jadliwala | Link | --- |
2023 | A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries | Antoine Geimer, Mathéo Vergnolle, Frédéric Recoules, Lesly-Ann Daniel, Sébastien Bardin, Clémentine Maurice | Link | --- |
2023 | LeakyOhm: Secret Bits Extraction using Impedance Analysis | Saleh Khalaj Monfared, Tahoura Mosavirik, Shahin Tajik | Link | --- |
2023 | From Dragondoom to Dragonstar: Side-channel Attacks and Formally Verified Implementation of WPA3 Dragonfly Handshake | Daniel De Almeida Braga, Natalia Kulatova, Mohamed Sabt, Pierre-Alain Fouque | Link | --- |
2023 | AVX Timing Side-Channel Attacks against Address Space Layout Randomization | Hyunwoo Choi, Suryeon Kim, Seungwon Shin | link | --- |
2022 | Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis | Carlton Shepherda, Konstantinos Markantonakisa, Nico van Heijningenb, Driss Aboulkassimic,Clément Gainec, Thibaut Heckmann, David Naccache | Link | --- |
2022 | Frequency Throttling Side-Channel Attack | Chen Liu, Abhishek Chakraborty, Nikhil Chawla, Neer Roggel | Link | --- |
2022 | Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86 | Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, David Kohlbrenner | Link | Github |
2021 | Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage | Patrick Cronin, Xing Gao, Chengmo Yang, Haining Wang | Link | --- |
2021 | Attacks of the Knights: Exploiting Non Uniform Cache Access Time | Farabi Mahmud, Sungkeun Kim, Harpreet Singh Chawla, Pritam Majumder, Jiayi Huang, Chia-Che Tsai, Eun Jung Kim, Abdullah Muzahid | Link | --- |
2021 | Automated Side Channel Analysis of Media Software with Manifold Learning | Yuanyuan Yuan, Qi Pang, Shuai Wang | Link | Github |
2021 | Practical Timing Side Channel Attacks on Memory Compression | Martin Schwarzl, Pietro Borrello, Daniel Gruss, Gururaj Saileshwar, Hanna Müller, Michael Schwarz | Link | --- |
2021 | Touchtone leakage attacks via smartphone sensors: mitigation without hardware modification | Connor Bolton, Yan Long, Jun Han, Josiah Hester, Kevin Fu | Link | --- |
2021 | Leaking Control Flow Information via the Hardware Prefetcher | Yun Chen, Lingfeng Pei, Trevor E. Carlson | Link | --- |
2019 | SMoTherSpectre: Exploiting Speculative Executionthrough Port Contention | Atri Bhattacharyya, Alexandra Sandulescu, Matthias Neugschwandtner, Alessandro Sorniotti, Babak Falsafi, Mathias Payer, Anil Kurmus | Link | Github |
2017 | Systematic Classification of Side-Channel Attacks: A Case Study for Mobile Devices | Raphael Spreitzer, Veelasha Moonsamy, Thomas Korak, Stefan Mangard | Link | --- |
2016 | Timecop | Link | --- |
Year | Title | Author | Link | Github/PoC |
---|---|---|---|---|
2023 | RESOLVERFUZZ: Automated Discovery of DNS Resolver Vulnerabilities with Query-Response Fuzzing | Qifan Zhang, Xuesong Bai, Xiang Li, Haixin Duan, Qi Li, Zhou Li | -Link | -Github |
2022 | Under the Hood of DANE Mismanagement in SMTP | Hyeonmin Lee, Md. Ishtiaq Ashiq, Moritz Müller, Roland van Rijswijk-Deij, Taekyoung “Ted” Kwon, Taejoong Chung | Link | Artifacts |
2022 | The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources | Tianxiang Dai, Philipp Jeitner, Haya Shulman, Michael Waidner | Link | --- |
2021 | DNS and the DNS Cache Poisoning Attack | Avi Kak | Link | |
2021 | The CNAME of the Game:Large-scale Analysis of DNS-based TrackingEvasion | Yana Dimova, Gunes Acar, Lukasz Olejnik, Wouter Joosen, Tom Van Goethem | Link | --- |
2020 | Cross Layer Attacks and How to Use Them (forDNS Cache Poisoning, Device Tracking and More) | Amit Klein | Link | --- |
2017 | Something From Nothing (There): Collecting Global IPv6 Datasets From DNS | Tobias Fiebig, Kevin Borgolte, Shuang Hao, Christopher Kruegel, Giovanni Vigna | Link | Gitlab |
2011 | Bitsquatting DNS Hijacking without Exploitation | Dinaburg | Link | --- |
2005 | NXNSAttack: Recursive DNS Inefficiencies and Vulnerabilities | Yehuda Afek, Anat Bremler-Barr, Lior Shafir | Link | --- |
Year | Title | Author | Link |
---|---|---|---|
2021 | Dangling DNS: Amazon EC2 IPs (Current State) | Mohamed Elbadry | Link |
Year | Title | Author | Link | Github/PoC |
---|---|---|---|---|
2024 | BreachSeek: A Multi-Agent Automated Penetration Tester | Ibrahim Alshehri, Adnan Alshehri, Abdulrahman Almalki, Majed Bamardouf, Alaqsa Akbar | Link | Github |
2024 | Synthetic Cancer -- Augmenting Worms with LLMs | Benjamin Zimmerman, David Zollikofer | Link | --- |
2024 | The Power of Words: Generating PowerShell Attacks from Natural Language | Pietro Liguori, Christian Marescalco, Roberto Natella, Vittorio Orbinato, Luciano Pianese | Link | --- |
2024 | Offensive AI: Enhancing Directory Brute-forcing Attack with the Use of Language Models | Alberto Castagnaro, Mauro Conti, Luca Pajola | Link | --- |
2024 | LLM Agents can Autonomously Exploit One-day Vulnerabilities | Richard Fang, Rohan Bindu, Akul Gupta, Daniel Kang | Link | --- |
2024 | Depending on yourself when you should: Mentoring LLM with RL agents to become the master in cybersecurity games | Yikuan Yan, Yaolun Zhang, Keman Huang | Link | --- |
2024 | Using Hallucinations to Bypass GPT4's Filter | Benjamin Lemkin | Link | --- |
2024 | A First Look at GPT Apps: Landscape and Vulnerability | Zejun Zhang, Li Zhang, Xin Yuan, Anlan Zhang, Mengwei Xu, Feng Qian | Link | --- |
2024 | LLM Agents can Autonomously Hack Websites | Richard Fang, Rohan Bindu, Akul Gupta, Qiusi Zhan, Daniel Kang | Link | --- |
2024 | LLMs as Hackers: Autonomous Linux Privilege Escalation Attacks | Andreas Happe, Aaron Kaplan, Jürgen Cito | Link | --- |
2023 | CATASTROPHIC JAILBREAK OF OPEN-SOURCE LLMS VIA EXPLOITING GENERATION | Yangsibo Huang, Samyak Gupta, Mengzhou Xia, Kai Li, Danqi Chen | Link | Github |
2023 | Cyber Sentinel: Exploring Conversational Agents’ Role in Streamlining Security Tasks with GPT-4 | Mehrdad Kaheh, Danial Khosh Kholgh, Panos Kostakos | Link | Github |
2023 | Evaluation of Parameter-based Attacks against Embedded Neural Networks with Laser Injection | Mathieu Dumont, Kevin Hector, Pierre-Alain Moellic, Jean-MaxDutertre, Simon Pontie | Link | --- |
2023 | How Secure is Code Generated by ChatGPT? | Raphael Khoury, Anderson R. Avila, Jacob Brunelle, Baba Mamadou Camara | Link | --- |
2023 | Prompt Stealing Attacks Against Text-to-Image Generation Models | Xinyue Shen, Yiting Qu, Michael Backes, Yang Zhang | Link | Github |
2023 | Poisoning Web-Scale Training Datasets is Practical | Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum Anderson, Andreas Terzis, Kurt Thomas, Florian Tramer | Link | --- |
2023 | Hello Me, Meet the Real Me: Audio Deepfake Attacks on Voice Assistants | Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis | Link | --- |
2023 | CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models | Hossein Hajipour, Keno Hassler, Thorsten Holz, Lea Schonherr, Mario Fritz | Link | --- |
2023 | Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection | Benjamin Steenhoek, Hongyang Gao, Wei Le | Link | PoC |
2022 | AI for Beyond 5G Networks: A Cyber-Security Defense or Offense Enable | Chafika Benzaıd, Tarik Tale | Link | --- |
2021 | A Comparison of State-of-the-Art Techniques for Generating Adversarial Malware Binaries | Prithviraj Dasgupta, Zachariah Osman | Link | --- |
2021 | Physical Side-Channel Attacks on Embedded Neural Networks: A Survey | Maria Méndez Real, Rubén Salvador | Link | --- |
2021 | A Deep Learning-based Penetration Testing Framework for Vulnerability Identification in Internet of Things Environments | Nickolaos Koroniotis, Nour Moustafa, Benjamin Turnbul, Francesco Schiliro, Praveen Gauravaram, Helge Janicke | Link | --- |
2021 | Leveraging AI to optimize website structure discovery during Penetration Testing | Diego Antonellib, Roberta Cascellab, Gaetano Perronea, Simon Pietro Romanoa, Antonio Schiano | Link | --- |
2021 | The Threat of Offensive AI to Organizations | Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Deng Gelei, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio | Link | --- |
2021 | Deep Learning-Based Autonomous DrivingSystems: A Survey of Attacks and Defenses | Yao Deng, Tiehua Zhang, Guannan Lou, Xi Zheng, Jiong Jin, Qing-Long Han | Link | --- |
2017 | Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN | Weiwei Hu, Ying Tan | Link | --- |
Year | Title | Author | Link | Github/PoC |
---|---|---|---|---|
2024 | RISCVuzz: Discovering Architectural CPU Vulnerabilities via Differential Hardware Fuzzing | Fabian Thomas, Lorenz Hetterich, Ruiyi Zhang, Daniel Weber, Lukas Gerlach, Michael Schwarz | Link | Link |
2024 | No Peer, no Cry: Network Application Fuzzing via Fault Injection | Nils Bars, Moritz Schloegel, Nico Schiller, Lukas Bernhard, Thorsten Holz | Link | Github |
2024 | DarthShader: Fuzzing WebGPU Shader Translators & Compilers | Lukas Bernhard, Nico Schiller, Moritz Schloegel, Nils Bars, Thorsten Holz | Link | --- |
2024 | Hacked in Translation -- from Subtitles to Complete Takeover | Omri Herscovici, Omer Gull | Link | --- |
2024 | eyeballvul: a future-proof benchmark for vulnerability detection in the wild | Timothee Chauvin | Link | Github |
2024 | UEFI Vulnerability Signature Generation using Static and Symbolic Analysis | Md Shafiuzzaman, Achintya Desai, Laboni Sarker, Tevfik Bultan | Link | --- |
2024 | MegaVul: A C/C++ Vulnerability Dataset with Comprehensive Code Representation | Chao Ni, Liyu Shen, Xiaohu Yang, Yan Zhu, Shaohua Wang | Link | Github |
2024 | FOX: Coverage-guided Fuzzing as Online Stochastic Control | Dongdong She, Adam Storek, Yuchong Xie, Seoyoung Kweon, Prashast Srivastava, Suman Jana | Link | Github |
2024 | Super Mario in the Pernicious Kingdoms: Classifying glitches in old games | Llewellyn Forward, Io Limmer, Joseph Hallett, Dan Page | Link | --- |
2024 | BinSym: Binary-Level Symbolic Execution using Formal Descriptions of Instruction Semantics | Sören Tempel, Tobias Brandt, Christoph Lüth, Rolf Drechsler | Link | Github |
2024 | Enhancing Code Vulnerability Detection via Vulnerability-Preserving Data Augmentation | Shangqing Liu, Wei Ma, Jian Wang, Xiaofei Xie, Ruitao Feng, Yang Liu | Link | --- |
2024 | OSS Malicious Package Analysis in the Wild | Xiaoyan Zhou, Ying Zhang, Wenjia Niu, Jiqiang Liu, Haining Wang, Qiang Li | Link | --- |
2024 | Game Rewards Vulnerabilities: Software Vulnerability Detection with Zero-Sum Game and Prototype Learning | Xin-Cheng Wen, Cuiyun Gao, Xinchen Wang, Ruiqi Wang, Tao Zhang, Qing Liao | Link | --- |
2024 | UBfuzz: Finding Bugs in Sanitizer Implementations | Shaohua Li, Zhendong Su | Link(https://arxiv.org/pdf/2401.04538) | Atrifact |
2024 | VulMatch: Binary-level Vulnerability Detection Through Signature | Zian Liu, Lei Pan, Chao Chen, Ejaz Ahmed, Shigang Liu, Jun Zhang, Dongxi Liu | Link | Github |
2023 | Hyperfuzzing: black-box security hypertesting with a grey-box fuzzer | Daniel Blackwell, Ingolf Becker, David Clark | Link | PoC |
2023 | Fuzzing the Latest NTFS in Linux with Papora: An Empirical Study | Edward Lo, Ningyu He, Yuejie Shi, Jiajia Xu, Chiachih Wu, Ding Li, Yao Guo | Link | --- |
2023 | ODDFUZZ: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing | Sicong Cao, Biao He, Xiaobing Sun, Yu Ouyang, Chao Zhang, Xiaoxue Wu, Ting Su,Lili Bo, Bin Li, Chuanlei Ma, Jiajia Li, Tao Wei | Link | Github |
2023 | autofz: Automated Fuzzer Composition at Runtime | Yu-Fu Fu, Jaehyuk Lee, Taesoo Kim | Link | Github |
2023 | Detecting Exploit Primitives Automatically for Heap Vulnerabilities on Binary Programs | Jie Liu, Hang An, Jin Li, Hongliang Liang | Link | --- |
2022 | AMPFUZZ: Fuzzing for Amplification DDoS Vulnerabilities | Johannes Krupp, Ilya Grishchenko, Christian Rossow | Link | Github |
2022 | COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation | Peng Xu, Yanhao Wang, Hong Hu, Purui Su | Link | Github |
2022 | FuzzingDriver: the Missing Dictionary to Increase Code Coverage in Fuzzers | Arash Ale Ebrahim, Mohammadreza Hazhirpasand, Oscar Nierstrasz, Mohammad Ghafari | Link | Github |
2022 | Path Transitions Tell More: Optimizing Fuzzing Schedules via Runtime Program States | Kunpeng Zhang, Xi Xiao, Xiaogang Zhu, Ruoxi Sun, Minhui Xue, Sheng Wen | Link | Github |
2021 | Attacks on Wireless Coexistence: Exploiting Cross-Technology Performance Features for Inter-Chip Privilege Escalation | Jiska Classen, Francesco Gringoli, Michael Hermann, Matthias Hollick | Link | --- |
2021 | Fuzzm: Finding Memory Bugs through Binary-Only Instrumentation and Fuzzing of WebAssembly | Daniel Lehmann, Martin Toldam Torp, Michael Pradel | Link | --- |
2021 | VIA: Analyzing Device Interfaces of Protected Virtual Machines | Felicitas Hetzelt, Martin Radev, Robert Buhren, Mathias Morbitzer, Jean-Pierre Seifert | Link | --- |
2021 | Spotting Silent Buffer Overflows in Execution Trace throughGraph Neural Network Assisted Data Flow Analysis | Zhilong Wang, Li Yu, Suhang Wang and Peng Liu | Link | --- |
2021 | QFuzz: Quantitative Fuzzing for Side Channels | Yannic Noller, Saeid Tizpaz-Niari | Link | Github |
2021 | Revizor: Fuzzing for Leaks in Black-box CPUs | Oleksii Oleksenko, Christof Fetzer, Boris Köpf, Mark Silberstein | Link | Github |
2021 | Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference | Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang | Link | --- |
2020 | The never ending war in the stack and the reincarnation of ROP attacks | Ammari Nader, Joan Calvet, Jose M. Fernandez | Link | --- |
2020 | FuzzGen: Automatic Fuzzer Generation | Kyriakos K. Ispoglou, Daniel Austin, Vishwath Mohan, Mathias Payer | Link | Github |
2020 | USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation | Hui Peng, Mathias Payer | Link | Github |
2019 | FirmFuzz: Automated IoT Firmware Introspection and Analysis | Prashast Srivastava, Hui Peng, Jiahao Li, Hamed Okhravi, Howard Shrobe, Mathias Payer | Link | Github |
2016 | Toward large-scale vulnerability discovery using Machine Learning | Gustavo Grieco, Guillermo Luis Grinblat, Lucas Uzal, Sanjay Rawat, Josselin Feist, Laurent Mounier | Link | --- |
2015 | Pattern-Based Vulnerability Discovery | Fabian Yamaguchi | Link | --- |
Year | Title | Author | Link |
---|---|---|---|
2021 | Speculating the entire x86-64 Instruction Set In Seconds with This One Weird Trick | Can Bölük | Link |
2020 | Bugs on the Windshield: Fuzzing the Windows Kernel | Netanel Ben Simon | Link |
2018 | Deep Exploit - Github Project | Isao Takaesu | Github |
Year | Title | Author | Link | Github/PoC |
---|---|---|---|---|
2024 | Jäger: Automated Telephone Call Traceback | David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro | Link | --- |
2024 | Eavesdropping Mobile Apps and Actions through Wireless Traffic in the Open World | Xiaoguang Yang, Yong Huang, Junli Guo, Dalong Zhang, Qingxian Wang | Link | --- |
2024 | AndroCon: Conning Location Services in Android | Soham Nag, Smruti R. Sarangi | Link | --- |
2024 | Never Gonna Give You Up: Exploring Deprecated NULL Ciphers in Commercial VoWiFi Deployments | Gabriel Karl Gegenhuber, Philipp Frenzel, Edgar Weippl | Link | --- |
2023 | FINDING VULNERABILITIES IN MOBILE APPLICATION APIS: A MODULAR PROGRAMMATIC APPROACH | Nate Haris, Kendree Chen, Ann Song, Benjamin Pou | Link | --- |
2023 | Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings | Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan | Link | --- |
2023 | Side-Channel VoIP Profiling Attack against Customer Service Automated Phone System | Roy Laurens, Edo Christianto, Bruce Caulkins, Cliff C. Zou | Link | --- |
2023 | Watching your call: Breaking VoLTE Privacy in LTE/5G Networks | Zishuai Cheng, Mihai Ordean, Flavio D. Garcia, Baojiang Cui, Dominik Rys | Link | --- |
2021 | An Empirical Analysis of HTTPS Configuration Security | Camelia Simoiu, Wilson Nguyen, Zakir Durumeric | Link | --- |
2021 | Security Header Fields in HTTP Clients | Pascal Gadient, Oscar Nierstrasz, Mohammad Ghafari | Link | --- |
2021 | LTrack: Stealthy Tracking of Mobile Phones in LTE | Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, Srdjan Capkun | Link | --- |
Year | Title | Author | Link |
---|---|---|---|
2021 | SeaGlass Enabling City-Wide IMSI-Catcher Detection | Peter Ney, Ian Smith, Tadayoshi Kohno, Gabriel Cadamuro | Link |
2020 | BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution | Andy Nguyen | Link |
2019 | New Type Of GPS Spoofing Attack In China Creates "Crop Circles" Of False Location Data | Joseph Trevithick | Link |
2019 | Wireless attacks on aircraft instrument landing systems | Adrian Colyer | Link |
Year | Title | Author | Link | Github/PoC |
---|---|---|---|---|
2024 | Finding (and exploiting) vulnerabilities on IP Cameras: the Tenda CP3 case study | Dario Stabili, Tobia Bocchi, Filip Valgimigli, Mirco Marchetti | Link | Github |
2024 | AutoFirm: Automatically Identifying Reused Libraries inside IoT Firmware at Large-Scale | YongLe Chen, Feng Ma, Ying Zhang, YongZhong He, Haining Wang, Qiang Li | Link | Github |
2024 | LuaTaint: A Static Taint Analysis System for Web Interface Framework Vulnerability of IoT Devices | Jiahui Xiang, Wenhai Wang, Tong Ye, Peiyu Liu | Link | --- |
2023 | AdvRain: Adversarial Raindrops to Attack Camera-Based Smart Vision Systems | Amira Guesmi , Muhammad Abdullah Hanif, Muhammad Shafique | Link | --- |
2023 | Ember-IO: Effective Firmware Fuzzing with Model-Free Memory Mapped IO | Guy Farrelly, Michael Chesser, Damith C. Ranasinghe | Link | Github |
2021 | My(o) Armband Leaks Passwords: An EMG and IMU Based Keylogging Side-Channel Attack | Matthias Gazzari, Annemarie Mattmann, Max Maass, Matthias Hollick | Link | Github |
2021 | VoIP Can Still Be Exploited — Badly | Pietro Biondi, Stefano Bognanni, Giampaolo Bella | Link | --- |
2021 | A Measurement Study on the (In)security of End-of-Life (EoL) Embedded Devices | Dingding Wang, Muhui Jiang, Rui Chang, Yajin Zhou, Baolei Hou, Xiapu Luo, Lei Wu, Kui Ren | LINK | --- |
2020 | HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation | Abraham A. Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, Mathias Payer | Link | Github |
2016 | Towards Automated Dynamic Analysis for Linux-based Embedded Firmware | Daming D. Chen, Manuel Egele, Maverick Woo, David Brumley | Link | Github |
Year | Title | Author | Link |
---|---|---|---|
2020 | Using Z3 Theorem on AVR Firmware | Ryan Cornateanu | Link |
Year | Title | Author | Link | Github/PoC |
---|---|---|---|---|
2024 | Deanonymizing Ethereum Validators: The P2P Network Has a Privacy Issue | Lioba Heimbach, Yann Vonlanthen, Juan Villacis, Lucianna Kiffer, Roger Wattenhofer | Link | --- |
2024 | DogeFuzz: A Simple Yet Efficient Grey-box Fuzzer for Ethereum Smart Contracts | Ismael Medeiros, Fausto Carvalho, Alexandre Ferreira, Rodrigo Bonifácio, Fabiano Cavalcanti Fernandes | Link | Github |
2024 | ML2SC: Deploying Machine Learning Models as Smart Contracts on the Blockchain | Zhikai Li, Steve Vott, Bhaskar Krishnamachar | Link | --- |
2024 | Larger-scale Nakamoto-style Blockchains Don't Necessarily Offer Better Security | Jannik Albrecht, Sebastien Andreina, Frederik Armknecht, Ghassan Karame, Giorgia Marson, Julian Willingmann | Link | --- |
2024 | 51% Attack via Difficulty Increase with a Small Quantum Miner | Bolton Bailey, Or Sattath | Link | --- |
2023 | Abusing the Ethereum Smart Contract Verification Services for Fun and Profit | Pengxiang Ma, Ningyu He, Yuhua Huang, Haoyu Wang | Link | --- |
2023 | The offline digital currency puzzle solved by a local blockchain | Henrique de Carvaloh Videira | Link | --- |
2023 | Explainable Ponzi Schemes Detection on Ethereum | Letterio Galletta, Fabio Pinelli | Link | Github |
2022 | Security Analysis of DeFi: Vulnerabilities, Attacks and Advances | Wenkai Li, Jiuyang Bu, Xiaoqi Li, Xianyi Chen | Link | --- |
2022 | Secure Decentralized Online Gaming with Lending Functionalities | Katharina Alefs, Florian Hartl, Luke Newman, Banu ̈Ozdeveci, Wisnu Uriawan | Link | Github |
2022 | Blockchain in a nutshell | Duc A. Tran, Bhaskar Krishnamachari | Link | --- |
2022 | A Secure File Sharing System Based on IPFS and Blockchain | Hsiao-Shan Huang, Tian-Sheuan Chang, Jhih-Yi Wu | Link | --- |
2022 | Gas Gauge: A Security Analysis Tool for Smart Contract Out-of-Gas Vulnerabilities | Behkish Nassirzadeh , Vijay Ganesh, Huaiying Sun, Sebastian Banescu | Link | Github |
2021 | (Meme) Proof of Steak | Jon Crowcroft, Hamed Haddadi, Arthur Gervais, Tristan Henderson | Link | --- |
2021 | Machine Learning Guided Cross-Contract Fuzzing | Yinxing Xue, Jiaming Ye, Wei Zhang, Jun Sun, Lei Ma, Haijun Wang, Jianjun Zhao | Link | --- |
2021 | JACK THE RIPPLER: Arbitrage on the Decentralized Exchange of the XRP Ledger | Gaspard Peduzzi, Jason James, Jiahua Xu | Link | --- |
2021 | Understanding Security Issues in the NFT Ecosystem | Dipanjan Das, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, Giovanni Vigna | Link | --- |
2021 | Franchised Quantum Money | Bhaskar Roberts, Mark Zhandry | Link | --- |
2021 | An Empirical Study of Protocols in Smart Contracts | Timothy Mou, Michael Coblenz, Jonathan Aldrich | Link | --- |
2021 | Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit | Kaihua Qin, Liyi Zhou, Benjamin Livshits, Arthur Gervais | Link | --- |
Year | Title | Author | Link | Github/PoC |
---|---|---|---|---|
2024 | RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer | Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu | Link | Github |
2024 | Red Team Redemption: A Structured Comparison of Open-Source Tools for Adversary Emulation | Max Landauer, Klaus Mayer, Florian Skopik, Markus Wurzenberger, Manuel Kern | Link | --- |
2024 | Forecasting Attacker Actions using Alert-driven Attack Graphs | Ion Băbălău, Azqa Nadeem | Link | --- |
2024 | HoneyGAN Pots: A Deep Learning Approach for Generating Honeypots | Ryan Gabrys, Daniel Silva, Mark Bilinski | Link | --- |
2024 | EarlyMalDetect: A Novel Approach for Early Windows Malware Detection Based on Sequences of API Calls | Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury | Link | --- |
2024 | HookChain: A new perspective for Bypassing EDR Solutions | Helvio Carvalho Junior | Link | --- |
2024 | Leveraging Adversarial Detection to Enable Scalable and Low Overhead RowHammer Mitigations | Oğuzhan Canpolat, A. Giray Yağlıkçı, Ataberk Olgun, İsmail Emir Yüksel, Yahya Can Tuğrul, Konstantinos Kanellopoulos, Oğuz Ergin, Onur Mutlu | Link | --- |
2023 | Nebula: Self-Attention for Dynamic Malware Analysis | Dmitrijs Trizna, Luca Demetrio, Battista Biggio, Fabio Roli | Link | --- |
2023 | Application-layer Characterization and Traffic Analysis for Encrypted QUIC Transport Protocol | Qianqian Zhang ,Chi-Jiun Su | Link | --- |
2023 | Detection of Malicious DNS-over-HTTPS Traffic: An Anomaly Detection Approach using Autoencoders | Sergio A. Salinas Monroy, Aman Kumar Gupta, Garrett Wahlstedt | --- | --- |
Year | Title | Author | Link | Github/PoC |
---|---|---|---|---|
2024 | Private and Secure Fuzzy Name Matching | Harsh Kasyap, Ugur Ilker Atmaca, Carsten Maple, Graham Cormode, Jiancong He | Link | --- |
2024 | SHA-256 Collision Attack with Programmatic SAT | Nahiyan Alamgir, Saeed Nejati, Curtis Bright | Link | --- |
2024 | Inferring Discussion Topics about Exploitation of Vulnerabilities from Underground Hacking Forums | Felipe Moreno-Vera | Link | --- |
2024 | CRATOR: a Dark Web Crawler | Daniel De Pascale, Giuseppe Cascavilla, Damian A. Tamburri, Willem-Jan Van Den Heuvel | Link | --- |
2024 | Statistical testing of random number generators and their improvement using randomness extraction | Cameron Foreman, Richie Yeung, Florian J. Curchod | Link | --- |
2024 | Inception Attacks: Immersive Hijacking in Virtual Reality Systems | Zhuolin Yang, Cathy Yuanchen Li, Arman Bhalla, Ben Y. Zhao, Haitao Zheng | Link | --- |
2024 | Username Squatting on Online Social Networks: A Study on X | Anastasios Lepipas, Anastasia Borovykh, Soteris Demetriou | Link | --- |
2024 | UVL2: A Unified Framework for Video Tampering Localization | Pengfei Pei, Yun Cao, Jinchuan Li, Zeyu Zhang, Yuqi Pang | Link | --- |
2023 | The Software Genome Project: Venture to the Genomic Pathways of Open Source Software and Its Applications | Yueming Wu, Chengwei Liu, Yang Liu | Link | --- |
2023 | JFinder: A Novel Architecture for Java Vulnerability Identification Based Quad Self-Attention and Pre-training Mechanism | Jin Wanga, Zishan Huanga, Hui Xiaoa, Yinhao Xiao | Link | Github |
2023 | Twitter Bots Influence on the Russo-Ukrainian War During the 2022 Italian General Elections | Francesco Luigi De Faveri, Luca Cosuti, Pier Paolo Tricomi, Mauro Conti | Link | --- |
2023 | A Survey on Learning to Hash | Jingdong Wang, Heng Tao Shen, Ting Zhang | Link | --- |
2023 | MAWSEO: Adversarial Wiki Search Poisoning for Illicit Online Promotion | Zilong Lin , Zhengyi Li , Xiaojing Liao , XiaoFeng Wang , Xiaozhong Liu | Link | --- |
2023 | Quantifying User Password Exposure to Third-Party CDNs | Rui Xin, Shihan Lin, Xiaowei Yang | Link | Github |
2022 | GhostTouch: Targeted Attacks on Touchscreens without Physical Touch | Kai Wang, Richard Mitev, Chen Yan, Xiaoyu Ji, Ahmad-Reza Sadeghi, Wenyuan Xu | Link | Github |
2022 | Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations | Ben Nassi, Yaron Pirutin, Raz Swisa, Adi Shamir, Yuval Elovici, Boris Zadov | Link | --- |
2022 | Too Afraid to Drive: Systematic Discovery of Semantic DoS Vulnerability in Autonomous Driving Planning under Physical-World Attacks | Ziwen Wan Junjie Shen, Jalen Chuang, Xin Xia, Joshua Garcia, Jiaqi Ma, Qi Alfred Chen | Link | --- |
2021 | Characterizing Retweet Bots: The Case of Black Market Accounts | Tugrulcan Elmas, Rebekah Overdorf, Karl Abere | Link | --- |
2021 | Hardware Trojan Insertion in Finalized Layouts: a Silicon Demonstration | Tiago Perez, Samuel Pagliarini | Link | --- |
2021 | Trojan Source: Invisible Vulnerabilities | Nicholas Boucher, Ross Anderson | Link | --- |
2021 | Demystifying Scam Tokens on Uniswap Decentralized Exchange | Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu | Link | --- |
2021 | BGPeek-a-Boo: Active BGP-based Traceback for Amplification DDoS Attacks | Johannes Krupp, Christian Rossow | Link | --- |
2021 | The Rise and Fall of Fake News sites: A Traffic Analysis | Manolis Chalkiadakis, Alexandros Kornilakis, Pangiotis Papadopoulos, Evangelos P. Markatos, Nicolas Kourtellis | -Link | --- |
2021 | Kubernetes Auto-Scaling: YoYo attack vulnerability and mitigation | Ronen Ben-David, Anat Bremler-Barr | Link | --- |
2021 | Intrinsic Propensity for Vulnerability in Computers?Arbitrary Code Execution in the Universal Turing Machine | Pontus Johnson | Link | --- |
2021 | Python and Malware: Developing Stealth and Evasive Malware WithoutObfuscation | Vasilios Koutsokostas, Constantinos Patsakis | Link | --- |
2021 | The Closer You Look, The More You Learn: A Grey-box Approach to Protocol State Machine Learning | Chris McMahon Stone, Sam L. Thomas, Mathy Vanhoef, James Henderson, Nicolas Bailluet, Tom Chothia | LINK | --- |
2021 | How Great is the Great Firewall? Measuring China’s DNS Censorship | Nguyen Phong Hoang, Arian Akhavan Niaki, Jakub Dalek, Jeffrey Knockel, Pellaeon Lin, Bill Marczak, Masashi Crete-Nishihata, Phillipa Gill, Michalis Polychronakis | Link | --- |
2021 | SEVerity: Code Injection Attacks against Encrypted Virtual Machines | Mathias Morbitzer, Sergej Proskurin, Martin Radev, Marko Dorfhuber, Erick Quintanar Salas | Link | --- |
2021 | Web Content Signing with Service Workers | Thomas Sutter, Peter Berlich, Marc Rennhard, Kevin Lapagna, Fabio Germann | Link | --- |
2021 | Memory-Safety Challenge Considered Solved? An In-DepthStudy with All Rust CVEs | Hui Xu, Zhuangbin Chen, Mingshen Sun, Yangfan Zhou, Michael R. Lyu | Link | --- |
2020 | Light CommANDS: Laser-Based Audio Injection on Voice-Controolable Systems | Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, Kevin Fu | Link | --- |
2020 | Understanding Memory and Thread Safety Practices and Issues in Real-World Rust Programs | Boqin Qin, Yilun Chen, Zeming Yu, Linhai Song, Yiying Zhang | Link | --- |
2020 | Security and Privacy of Social Login | Louis Christopher Jannett | Link | --- |
2014 | ECMAScript 6 for Penetration Testers | Mario Heiderich | Link | --- |
2005 | A Self-Learning Worm Using Importance Scanning | Zesheng Chen, Chuanyi Ji | Link | --- |
2005 | Network Protocol Analysis using Bioinformatics Algorithms | Marshall A. Beddoe | Link |
Year | Title | Author | Link |
---|---|---|---|
2021 | Security and Privacy of Social Logins (I) | Louis Christopher Jannett | Link |
2021 | Security and Privacy of Social Logins (II) | Louis Christopher Jannett | Link |
2021 | Security and Privacy of Social Logins (III) | Louis Christopher Jannett | Link |
2021 | Weird Ways to Run Unmanaged Code in .NET | XPN/Adam Chester | Link |
2020 | Reverse Engineering the source code of the BioNTech/Pfizer SARS-CoV-2 Vaccine | Bert Hubert | Link |
2020 | Practical Exploitation of Math.random on V8 | d0nut | YT Github |
2018 | Introduction to Locality-Sensitive Hashing | Tyler Neylon | Link |