Exploiting Noisy Oracles with Bayesian Inference.Getting per-user Conditional Access MFA status in Azure.Public Report – Zcash Zebra Security Assessment. Technical Advisory – Nullsoft Scriptable Installer System (NSIS) – Insecure Temporary Directory Usage.Overview of Modern Memory Security Concerns.Building Intuition for Lattice-Based Signatures – Part 1: Trapdoor Signatures.Intel BIOS Advisory – Memory Corruption in HID Drivers.Approximately 2000 Citrix NetScalers backdoored in mass-exploitation campaign.Building Intuition for Lattice-Based Signatures – Part 2: Fiat-Shamir with Aborts.Public Report – Penumbra Labs R1CS Implementation Review.Dancing Offbit: The Story of a Single Character Typo that Broke a ChaCha-Based PRNG.Technical Advisory – SonicWall Global Management System (GMS) & Analytics – Multiple Critical Vulnerabilities.Real World Cryptography Conference 2023 – Part II.5G security – how to minimise the threats to a 5G network.SIAM AG23: Algebraic Geometry with Friends.Public Report – Entropy/Rust Cryptography Review.HITB Phuket 2023 – Exploiting the Lexmark PostScript Stack.From ERMAC to Hook: Investigating the technical differences between two Android malware variants.On Multiplications with Unsaturated Limbs.Introduction to AWS Attribute-Based Access Control.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |