KNIHOVNA()

HOME  PAPERS(523REPORTS(264CONFERENCE(22)  WHITEPAPERS(29KNIHY(24)  RFC popisy(9411)  SLOVNÍČEK(9)  Podpůrné materiály(16) 


DATE

NAME

CATEGORY

SUBCATE

INFO

10.5.24

Bypassing Tunnels: Leaking VPN Client Traffic by Abusing Routing TablPapersPapersVirtual Private Networks (VPNs) authenticate and encrypt network traffic to protect users’ security and privacy, and are used in professional and personal settings to defend against malicious actors, circumvent censorship, remotely work from home, etc. It is therefore essential that VPNs are secure.

8.5.24

Pathfinder

Papers

CPU

Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor

3.5.24

The Shape of Money Laundering: Subgraph Representation
Learning on the Blockchain with the Elliptic2 Dataset

Papers

Papers

Subgraph representation learning is a technique for analyzing local structures (or shapes) within complex networks. Enabled by recent developments in scalable Graph Neural Networks (GNNs), this approach encodes relational information at a subgroup level (multiple connected nodes) rather than at a node level of abstraction.

5.4.24JSOutProx RATPapersPapersMulti-Staged JSOutProx RAT Targets Indian Co-Operative Banks and Finance Companies
26.3.24Generic and Automated Drive-by GPU Cache Attacks
from the Browser
PapersPapersGeneric and Automated Drive-by GPU Cache Attacks from the Browser
16.3.24GhostRacePapersVulnerebilityGhostRace: Exploiting and Mitigating Speculative Race Conditio
4.3.24Fast Adversarial Attacks on Language Models In One GPU Minute PapersCPU 
4.3.24Abusing Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMsPapersCPU 

12.1.24

Flying Under the Radar: Abusing GitHub for Malicious InfrastructurePapersMalware 

6.1.24

No-justice” wiperPapersMalware 

1.1.24

Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number ManipulationPapersAttack 
16.11.23The attack against Danish, CLEAR critical infrastructurePapersICS 
15.11.23CacheWarp: Software-based Fault Injection using Selective State ResPapersCPU 

27.10.23

iLeakage: Browser-based Timerless Speculative Execution Attacks on Apple DevicesPapersApple 
26.8.23Practical Attacks Against Privacy and Availability in 4G/LTE Mobile Communication Systems PapersAttack 
13.7.23Digitally-Signed Rootkits are Back – A Look at FiveSys and CompanionsPapersMalware 
5.5.23Iran turning to cyber-enabled influence operations for greater effectPapersCampaign 
28.4.23Nomadic Octopus’ Paperbug CampaignPapersCampaign 
17.4.23BlueBravo Uses Ambassador Lure to Deploy GraphicalNeutrino MalwarePapersMalware 

25.3.23

Detect and Prevent Web Shell MalwarePapersMalware 

17.3.23

SILKLOADER PapersMalware 

15.3.23

Operation ENDTRAD

Papers

Operation

 
2022The Lazarus Constellation A study on North Korean malwarePapersAPT