Bosen's Playground
Name
Last modified
Size
Parent Directory
-
Alina Tan & George Chen & Chee Peng Tan & Ri-Sheng Tan & Penelope Chua & Benjamin Cao_DriveThru Car Hacking Fast Food, Faster Data Breach.pdf
2025-12-19 20:40
6.9M
Alisa Esage_Unveiling the Mysteries of Qualcomm's QDSP6 JTAG A Journey into Advanced Theoretical Reverse Engineering.pdf
2025-12-19 20:40
5.1M
Anusha Penumacha & Srinija Kammari_Determining Exploitability of Vulnerabilities with SBOM and VEX.pdf
2025-12-19 20:40
1.9M
Bofei Chen & Yinzhi Cao & Lei Zhang & Xinyou Huang & Yuan Zhang & Min Yang_JDD In-depth Mining of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction.pdf
2025-12-19 20:40
5.0M
Bonan Ruan & Jiahao Liu & Chuqi Zhang & Zhenkai Liang_KernJC Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities-wp.pdf
2025-12-19 20:40
1.1M
Bonan Ruan & Jiahao Liu & Chuqi Zhang & Zhenkai Liang_KernJC Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities.pdf
2025-12-19 20:40
3.3M
Daniel dos Santos & Francesco La Spina & Stanislav Dashevskyi_A Closer Look at the Gaps in the Grid New Vulnerabilities and Exploits Affecting Solar Power Systems.pdf
2025-12-19 20:40
3.3M
Donika Mirdita & Jens Frieß & Haya Schulmann & Michael Waidner_The ByzRP Solution A Global Operational Shield for RPKI Validators.pdf
2025-12-19 20:40
6.9M
Florian Draschbacher & Lukas Maar_Watch Your Phone Novel USB-Based File Access Attacks Against Mobile Devices.pdf
2025-12-19 20:40
5.4M
Franky Saegerman_Foreign Information Manipulation and Interference (Disinformation 2.0) - How Patterns of Behavior in the Information Domain Threaten or Attack Organizations' Values, Procedures and Poli.pdf
2025-12-19 20:40
9.9M
Hao Zheng & Zibo Li & Yue Liu_vCenter Lost How the DCERPC Vulnerabilities Changed the Fate of ESXi.pdf
2025-12-19 20:40
3.9M
Hiroaki Hara_Think Inside the Box In-the-Wild Abuse of Windows Sandbox in Targeted Attacks.pdf
2025-12-19 20:40
3.0M
Hyeji Heo & Sungchan Jang & Byungwoo Hwang & Jinyong Byun & Kuyju Kim_Operation BlackEcho Voice Phishing Using Fake Financial and Vaccine Apps.pdf
2025-12-19 20:40
11M
Iceman & Adam (evildaemond) Foster_Dismantling the SEOS Protocol.pdf
2025-12-19 20:40
3.9M
Invisible Ink Privacy Risks of CSS in Browsers and Emails_Compressed.pdf
2025-12-19 20:40
10M
Jiahe Zhang & Jianjun Chen & Qi Wang & Hangyu Zhang & Shengqiang Li & Chuhan Wang & Jianwei Zhuge & Haixin Duan_Inbox Invasion Exploiting MIME Ambiguities to Evade Email Attachment Detectors_Compressed.pdf
2025-12-19 20:40
7.5M
Julia Zduńczyk_Behind Closed Doors - Bypassing RFID Readers.pdf
2025-12-19 20:40
3.8M
Karim Abdellatif_I Have Got to Warn You, It Is a Learning Robot Using Deep Learning Attribution Methods for Fault Injection Attacks.pdf
2025-12-19 20:40
14M
Lidong Li & Oliver Dong & Xiao Wang & Lewei Qu_State Manipulation Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine Reconfiguration.pdf
2025-12-19 20:40
8.4M
Lorin Wu & Porot Mo & Jack Tang_Enhancing Modern Threat Intelligence The Pivotal Role of Large Language Models in Extracting Actionable TTP Attack Chains.pdf
2025-12-19 20:40
3.8M
Lukas Maar & Jonas Juffinger_KernelSnitch Leaking Kernel Heap Pointers by Exploiting Software-Induced Side-Channel Leakage of Kernel Hash Tables.pdf
2025-12-19 20:40
2.3M
Marcell Molnár & Magdalena Oczadły_Impostor Syndrome - Hacking Apple MDMs Using Rogue Device Enrolments.pdf
2025-12-19 20:40
12M
Nan Wang & Zhenghang Xiao & Xuehao Guo& Ming Hu_Bridging the Gap Type Confusion and Boundary Vulnerabilities Between WebAssembly and JavaScript in V8.pdf
2025-12-19 20:40
8.4M
Nicola Stauffer & Gürkan Gür_(Mis)adventures with Copilot+ Attacking and Exploiting Windows NPU Drivers.pdf
2025-12-19 20:40
5.8M
NotInList.txt
2025-12-19 20:40
2.3K
Or Yair & Shmuel Cohen_QuickShell Sharing is Caring About an RCE Attack Chain on Quick Share.pdf
2025-12-19 20:40
7.1M
Pellaeon Lin & Mona Wang & Jeffrey Knockel_Should We Chat, Too Security Analysis of WeChat's MMTLS Encryption Protocol.pdf
2025-12-19 20:40
3.8M
Peng Zhou_The Oversights Under the Flow Discovering and Demystifying the Vulnerable Tooling Suites From Azure MLOps.pdf
2025-12-19 20:40
7.0M
Pierre Lee & Vickie Su & Philip Chen_The Drone Supply Chain's Grand Siege From Initial Breaches to Long-Term Espionage on High-Value Targets.pdf
2025-12-19 20:40
4.1M
Qian Feng & Chris Navarrete_AI-Powered Image-Based Command and Control (C2) Framework Utilizing AI Models to Conceal and Extract Commands in C2 Images-wp.pdf
2025-12-19 20:40
867K
Qian Feng & Chris Navarrete_AI-Powered Image-Based Command and Control (C2) Framework Utilizing AI Models to Conceal and Extract Commands in C2 Images.pdf
2025-12-19 20:40
2.4M
Radu Motspan & Mikhail Evdokimov & Polina Smirnova_Remote Exploitation of Nissan Leaf Controlling Critical Body Elements from the Internet.pdf
2025-12-19 20:40
6.0M
Shalom Carmel & Ofir Carmel_The Problems of Embedded Python in Excel, or How to Excel in Pwning Pandas.pdf
2025-12-19 20:40
2.7M
Tian Zhou & Yiwen Wang & Xiu Zhang_The Illusion of Isolation How Isolation Failures in CICD Servers Lead to RCE and Privacy Risks.pdf
2025-12-19 20:40
4.2M
Tim Pappa_Weaponized Deception Lessons from Indonesia's Muslim Cyber Army.pdf
2025-12-19 20:40
18M
Vikas Gupta & Peter Garba_Standing on the Shoulders of Giants De-Obfuscating WebAssembly Using LLVM.pdf
2025-12-19 20:40
12M
Wei Wen & Xiangyu Cao & Jiangchunxi Hou & Zixi Liao & Yingyan Song & Zhongcheng Li & Yijie Zhao & Bin Ma_Mini-App But Great Impact New Ways to Compromise Mobile Apps.pdf
2025-12-19 20:40
1.8M
Wenkai Li & Zhijie Liu & Xiaoqi Li_Sweeping the Blockchain Unmasking Illicit Accounts in Web3 Scams.pdf
2025-12-19 20:40
3.6M
Yingjie Cao & Xinfeng Chen_Double Tap at the Blackbox Hacking a Car Remotely Twice with MiTM.pdf
2025-12-19 20:40
3.0M
Zhiniang Peng & Ver & Zishan Lin_One Bug to Rule Them All Stably Exploiting a Preauth RCE Vulnerability on Windows Server 2025.pdf
2025-12-19 20:40
1.8M
Zhiwei Lin & Ziyu Lin_CDN Cannon Exploiting CDN Back-to-Origin Strategies for Amplification Attacks-wp.pdf
2025-12-19 20:40
1.1M
Zhiwei Lin & Ziyu Lin_CDN Cannon Exploiting CDN Back-to-Origin Strategies for Amplification Attacks.pdf
2025-12-19 20:40
958K