Artwork

Content provided by Jacob Torrey, Haroon meer, and Marco slaviero. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Torrey, Haroon meer, and Marco slaviero or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

ThinkstScapes Research Roundup - Q2 - 2022

29:57
 
Share
 

Manage episode 335862949 series 3290432
Content provided by Jacob Torrey, Haroon meer, and Marco slaviero. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Torrey, Haroon meer, and Marco slaviero or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

I am become loadbalancer, owner of your network

Nate Warfield

[Slides]

Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones

Jiska Classen, Alexander Heinrich, Robert Reith, and Matthias Hollick

[Slides] [Paper]

AirTag of the Clones: Shenanigans with Liberated Item Finders

Thomas Roth, Fabian Freyer, Matthias Hollick, and Jiska Classen

[Paper] [Code]

Are Blockchains Decentralised?

Evan Sultanik, Alexander Remie, Felipe Manzano, Trent Brunson, Sam Moelius, Eric Kilmer, Mike Myers, Talley Amir, and Sonya Schriner

[Blog] [Paper] [Audio]

What Log4j teaches us about the Software Supply Chain

Stephen Magill

[Slides] [Video]

Kani Rust Verifier

Daniel Schwartz-Narbonne and Zyad Hassan

[Slides] [Video] [Code]

Cross-Language Attacks

Samuel Mergendahl, Nathan Burow, and Hamed Okhravi

[Paper]

Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats

Giorgio Di Tizio, Michele Armellini, and Fabio Massacci

[Paper] [Data]

AMD Secure Processor for Confidential Computing Security Review

Cfir Cohen, James Forshaw, Jann Horn, and Mark Brand

[Blog] [Paper]

Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware Ecosystem

Matt Graebar

[Slides]

A Kernel Hacker Meets Fuchsia OS

Alexander Popov

[Blog] [Video]

Adaptive Multi-objective Optimization in Gray-box Fuzzing

Gen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang, Xu Zhou, and Kai Lu

[Paper]

Cooper Knows the Shortest Stave: Finding 134 Bugs in the Binding Code of Scripting Languages with Cooperative Mutation

Xu Peng, Yanhao Wang, Hong Hu, and Purui Su

[Slides] [Paper] [Code]

Bypassing CSP with dangling iframes

Gareth Heyes

[Blog]

Bypassing Dangling Markup Injection Mitigation Bypass in Chrome

SeungJu Oh

[Bug report] [Blog]

Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web

Avinash Sudhodanan and Andrew Paverd

[Blog] [Paper]

  continue reading

11 episodes

Artwork
iconShare
 
Manage episode 335862949 series 3290432
Content provided by Jacob Torrey, Haroon meer, and Marco slaviero. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Torrey, Haroon meer, and Marco slaviero or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

I am become loadbalancer, owner of your network

Nate Warfield

[Slides]

Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones

Jiska Classen, Alexander Heinrich, Robert Reith, and Matthias Hollick

[Slides] [Paper]

AirTag of the Clones: Shenanigans with Liberated Item Finders

Thomas Roth, Fabian Freyer, Matthias Hollick, and Jiska Classen

[Paper] [Code]

Are Blockchains Decentralised?

Evan Sultanik, Alexander Remie, Felipe Manzano, Trent Brunson, Sam Moelius, Eric Kilmer, Mike Myers, Talley Amir, and Sonya Schriner

[Blog] [Paper] [Audio]

What Log4j teaches us about the Software Supply Chain

Stephen Magill

[Slides] [Video]

Kani Rust Verifier

Daniel Schwartz-Narbonne and Zyad Hassan

[Slides] [Video] [Code]

Cross-Language Attacks

Samuel Mergendahl, Nathan Burow, and Hamed Okhravi

[Paper]

Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats

Giorgio Di Tizio, Michele Armellini, and Fabio Massacci

[Paper] [Data]

AMD Secure Processor for Confidential Computing Security Review

Cfir Cohen, James Forshaw, Jann Horn, and Mark Brand

[Blog] [Paper]

Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware Ecosystem

Matt Graebar

[Slides]

A Kernel Hacker Meets Fuchsia OS

Alexander Popov

[Blog] [Video]

Adaptive Multi-objective Optimization in Gray-box Fuzzing

Gen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang, Xu Zhou, and Kai Lu

[Paper]

Cooper Knows the Shortest Stave: Finding 134 Bugs in the Binding Code of Scripting Languages with Cooperative Mutation

Xu Peng, Yanhao Wang, Hong Hu, and Purui Su

[Slides] [Paper] [Code]

Bypassing CSP with dangling iframes

Gareth Heyes

[Blog]

Bypassing Dangling Markup Injection Mitigation Bypass in Chrome

SeungJu Oh

[Bug report] [Blog]

Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web

Avinash Sudhodanan and Andrew Paverd

[Blog] [Paper]

  continue reading

11 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide