Artwork

Content provided by Jacob Torrey, Haroon meer, and Marco slaviero. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Torrey, Haroon meer, and Marco slaviero or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

ThinkstScapes Research Roundup - Q4 - 2023

29:58
 
Share
 

Manage episode 403598968 series 3290432
Content provided by Jacob Torrey, Haroon meer, and Marco slaviero. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Torrey, Haroon meer, and Marco slaviero or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

LLMs ain't making life any easier

Abusing Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs

Tsung-Yin Hsieh, Ben Nassi, Vitaly Shmatikov, and Eugene Bagdasaryan

[Slides] [Paper] [Code]

Tree of Attacks: Jailbreaking Black-Box LLMs Automatically

Anay Mehrotra, Manolis Zampetakis, Paul Kassianik, Blaine Nelson, Hyrum Anderson, Yaron Singer, and Amin Karbasi

[Paper] [Code]

Avoiding the basilisk's fangs: State-of-the-art in AI LLM detection

Jacob Torrey

[Slides] [Code] [Video]

Dystopian much: The Rise of the Influence Machines

Nea Paw

[Blog] [Video]

Problems in well-trodden areas

SMTP Smuggling – Spoofing E-mails Worldwide

Timo Longin

[Blog] [Video]

Blind CSS Exfiltration: Exfiltrate unknown web pages

Gareth Heyes

[Slides] [Blog] [Code]

OLE object are still dangerous today – Exploiting Microsoft Office

wh1tc and Zhiniang Peng

[Slides] [Demo Videos]

The Nightmare of Apple’s OTA Update

Mickey Jin

[Slides] [Blog] [Video]

Reflecting on our efforts

Evaluating the Security Posture of Real-World FIDO2 Deployments

Dhruv Kuchhal, Muhammad Saad, Adam Oest, and Frank Li

[Paper]

Talking about Pros and Cons

Jacob Torrey

[Slides] [Video]

NCC Group’s 2022 & 2023 Research Report

NCC Group

[Paper] [Blog]

A 3-Year Tale of Hacking a Pwn2Own Target: The Attacks, Vendor Evolution, and Lessons Learned

Orange Tsai

[Slides] [Video]

Nifty sundries

Breaking "DRM" in Polish trains

MrTick, Redford, and q3k

[Video]

Detection and Blocking with BPF via YAML

Kevin Sheldrake

[Slides] [Code]

AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis

Zhiyuan Yu, Shixuan Zhai, and Ning Zhang

[Paper] [Code]

A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier

Changqing Miao, Jianan Feng, Wei You, Wenchang Shi, Jianjun Huang, and Bin Liang

[Paper] [Code]

Spoofing DNS Records by Abusing DHCP DNS Dynamic Updates

Ori David

[Blog] [Code]

Operation Triangulation: What You Get When Attack iPhones of Researchers

Boris Larin, Leonid Bezvershenko, and Georgy Kucherin

[Blog] [Video]

Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping

Jingyang Hu, Hongbo Wang, Tianyue Zheng, Jingzhi Hu, Zhe Chen, Hongbo Jiang, and Jun Luo

[Paper] [Code]

  continue reading

12 episodes

Artwork
iconShare
 
Manage episode 403598968 series 3290432
Content provided by Jacob Torrey, Haroon meer, and Marco slaviero. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jacob Torrey, Haroon meer, and Marco slaviero or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

LLMs ain't making life any easier

Abusing Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs

Tsung-Yin Hsieh, Ben Nassi, Vitaly Shmatikov, and Eugene Bagdasaryan

[Slides] [Paper] [Code]

Tree of Attacks: Jailbreaking Black-Box LLMs Automatically

Anay Mehrotra, Manolis Zampetakis, Paul Kassianik, Blaine Nelson, Hyrum Anderson, Yaron Singer, and Amin Karbasi

[Paper] [Code]

Avoiding the basilisk's fangs: State-of-the-art in AI LLM detection

Jacob Torrey

[Slides] [Code] [Video]

Dystopian much: The Rise of the Influence Machines

Nea Paw

[Blog] [Video]

Problems in well-trodden areas

SMTP Smuggling – Spoofing E-mails Worldwide

Timo Longin

[Blog] [Video]

Blind CSS Exfiltration: Exfiltrate unknown web pages

Gareth Heyes

[Slides] [Blog] [Code]

OLE object are still dangerous today – Exploiting Microsoft Office

wh1tc and Zhiniang Peng

[Slides] [Demo Videos]

The Nightmare of Apple’s OTA Update

Mickey Jin

[Slides] [Blog] [Video]

Reflecting on our efforts

Evaluating the Security Posture of Real-World FIDO2 Deployments

Dhruv Kuchhal, Muhammad Saad, Adam Oest, and Frank Li

[Paper]

Talking about Pros and Cons

Jacob Torrey

[Slides] [Video]

NCC Group’s 2022 & 2023 Research Report

NCC Group

[Paper] [Blog]

A 3-Year Tale of Hacking a Pwn2Own Target: The Attacks, Vendor Evolution, and Lessons Learned

Orange Tsai

[Slides] [Video]

Nifty sundries

Breaking "DRM" in Polish trains

MrTick, Redford, and q3k

[Video]

Detection and Blocking with BPF via YAML

Kevin Sheldrake

[Slides] [Code]

AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis

Zhiyuan Yu, Shixuan Zhai, and Ning Zhang

[Paper] [Code]

A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier

Changqing Miao, Jianan Feng, Wei You, Wenchang Shi, Jianjun Huang, and Bin Liang

[Paper] [Code]

Spoofing DNS Records by Abusing DHCP DNS Dynamic Updates

Ori David

[Blog] [Code]

Operation Triangulation: What You Get When Attack iPhones of Researchers

Boris Larin, Leonid Bezvershenko, and Georgy Kucherin

[Blog] [Video]

Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping

Jingyang Hu, Hongbo Wang, Tianyue Zheng, Jingzhi Hu, Zhe Chen, Hongbo Jiang, and Jun Luo

[Paper] [Code]

  continue reading

12 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide