Overview of Modern Memory Security Concerns.Building Intuition for Lattice-Based Signatures – Part 1: Trapdoor Signatures.Intel BIOS Advisory – Memory Corruption in HID Drivers.Approximately 2000 Citrix NetScalers backdoored in mass-exploitation campaign.Building Intuition for Lattice-Based Signatures – Part 2: Fiat-Shamir with Aborts.Public Report – Penumbra Labs R1CS Implementation Review.Dancing Offbit: The Story of a Single Character Typo that Broke a ChaCha-Based PRNG.Technical Advisory – SonicWall Global Management System (GMS) & Analytics – Multiple Critical Vulnerabilities.Real World Cryptography Conference 2023 – Part II.5G security – how to minimise the threats to a 5G network.SIAM AG23: Algebraic Geometry with Friends.Public Report – Entropy/Rust Cryptography Review.HITB Phuket 2023 – Exploiting the Lexmark PostScript Stack.From ERMAC to Hook: Investigating the technical differences between two Android malware variants.On Multiplications with Unsaturated Limbs.Introduction to AWS Attribute-Based Access Control.Public Report – Caliptra Security Assessment.Public Report – Zcash FROST Security Assessment.Unveiling the Dark Side: A Deep Dive into Active Ransomware Families.Technical Advisory: Insufficient Proxyman HelperTool XPC Validation.Popping Blisters for research: An overview of past payloads and exploring recent developments.D0nut encrypt me, I have a wife and no backups.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |