[ICO]NameLast modifiedSize
[parent]Parent Directory  -
[   ]Alina Tan & George Chen & Chee Peng Tan & Ri-Sheng Tan & Penelope Chua & Benjamin Cao_DriveThru Car Hacking Fast Food, Faster Data Breach.pdf2025-12-19 20:40 6.9M
[   ]Alisa Esage_Unveiling the Mysteries of Qualcomm's QDSP6 JTAG A Journey into Advanced Theoretical Reverse Engineering.pdf2025-12-19 20:40 5.1M
[   ]Anusha Penumacha & Srinija Kammari_Determining Exploitability of Vulnerabilities with SBOM and VEX.pdf2025-12-19 20:40 1.9M
[   ]Bofei Chen & Yinzhi Cao & Lei Zhang & Xinyou Huang & Yuan Zhang & Min Yang_JDD In-depth Mining of Java Deserialization Gadget Chains via Bottom-up Gadget Search and Dataflow-aided Payload Construction.pdf2025-12-19 20:40 5.0M
[   ]Bonan Ruan & Jiahao Liu & Chuqi Zhang & Zhenkai Liang_KernJC Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities-wp.pdf2025-12-19 20:40 1.1M
[   ]Bonan Ruan & Jiahao Liu & Chuqi Zhang & Zhenkai Liang_KernJC Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities.pdf2025-12-19 20:40 3.3M
[   ]Daniel dos Santos & Francesco La Spina & Stanislav Dashevskyi_A Closer Look at the Gaps in the Grid New Vulnerabilities and Exploits Affecting Solar Power Systems.pdf2025-12-19 20:40 3.3M
[   ]Donika Mirdita & Jens Frieß & Haya Schulmann & Michael Waidner_The ByzRP Solution A Global Operational Shield for RPKI Validators.pdf2025-12-19 20:40 6.9M
[   ]Florian Draschbacher & Lukas Maar_Watch Your Phone Novel USB-Based File Access Attacks Against Mobile Devices.pdf2025-12-19 20:40 5.4M
[   ]Franky Saegerman_Foreign Information Manipulation and Interference (Disinformation 2.0) - How Patterns of Behavior in the Information Domain Threaten or Attack Organizations' Values, Procedures and Poli.pdf2025-12-19 20:40 9.9M
[   ]Hao Zheng & Zibo Li & Yue Liu_vCenter Lost How the DCERPC Vulnerabilities Changed the Fate of ESXi.pdf2025-12-19 20:40 3.9M
[   ]Hiroaki Hara_Think Inside the Box In-the-Wild Abuse of Windows Sandbox in Targeted Attacks.pdf2025-12-19 20:40 3.0M
[   ]Hyeji Heo & Sungchan Jang & Byungwoo Hwang & Jinyong Byun & Kuyju Kim_Operation BlackEcho Voice Phishing Using Fake Financial and Vaccine Apps.pdf2025-12-19 20:40 11M
[   ]Iceman & Adam (evildaemond) Foster_Dismantling the SEOS Protocol.pdf2025-12-19 20:40 3.9M
[   ]Invisible Ink Privacy Risks of CSS in Browsers and Emails_Compressed.pdf2025-12-19 20:40 10M
[   ]Jiahe Zhang & Jianjun Chen & Qi Wang & Hangyu Zhang & Shengqiang Li & Chuhan Wang & Jianwei Zhuge & Haixin Duan_Inbox Invasion Exploiting MIME Ambiguities to Evade Email Attachment Detectors_Compressed.pdf2025-12-19 20:40 7.5M
[   ]Julia Zduńczyk_Behind Closed Doors - Bypassing RFID Readers.pdf2025-12-19 20:40 3.8M
[   ]Karim Abdellatif_I Have Got to Warn You, It Is a Learning Robot Using Deep Learning Attribution Methods for Fault Injection Attacks.pdf2025-12-19 20:40 14M
[   ]Lidong Li & Oliver Dong & Xiao Wang & Lewei Qu_State Manipulation Unveiling New Attack Vectors in Bluetooth Vulnerability Discovery through Protocol State Machine Reconfiguration.pdf2025-12-19 20:40 8.4M
[   ]Lorin Wu & Porot Mo & Jack Tang_Enhancing Modern Threat Intelligence The Pivotal Role of Large Language Models in Extracting Actionable TTP Attack Chains.pdf2025-12-19 20:40 3.8M
[   ]Lukas Maar & Jonas Juffinger_KernelSnitch Leaking Kernel Heap Pointers by Exploiting Software-Induced Side-Channel Leakage of Kernel Hash Tables.pdf2025-12-19 20:40 2.3M
[   ]Marcell Molnár & Magdalena Oczadły_Impostor Syndrome - Hacking Apple MDMs Using Rogue Device Enrolments.pdf2025-12-19 20:40 12M
[   ]Nan Wang & Zhenghang Xiao & Xuehao Guo& Ming Hu_Bridging the Gap Type Confusion and Boundary Vulnerabilities Between WebAssembly and JavaScript in V8.pdf2025-12-19 20:40 8.4M
[   ]Nicola Stauffer & Gürkan Gür_(Mis)adventures with Copilot+ Attacking and Exploiting Windows NPU Drivers.pdf2025-12-19 20:40 5.8M
[text]NotInList.txt2025-12-19 20:40 2.3K
[   ]Or Yair & Shmuel Cohen_QuickShell Sharing is Caring About an RCE Attack Chain on Quick Share.pdf2025-12-19 20:40 7.1M
[   ]Pellaeon Lin & Mona Wang & Jeffrey Knockel_Should We Chat, Too Security Analysis of WeChat's MMTLS Encryption Protocol.pdf2025-12-19 20:40 3.8M
[   ]Peng Zhou_The Oversights Under the Flow Discovering and Demystifying the Vulnerable Tooling Suites From Azure MLOps.pdf2025-12-19 20:40 7.0M
[   ]Pierre Lee & Vickie Su & Philip Chen_The Drone Supply Chain's Grand Siege From Initial Breaches to Long-Term Espionage on High-Value Targets.pdf2025-12-19 20:40 4.1M
[   ]Qian Feng & Chris Navarrete_AI-Powered Image-Based Command and Control (C2) Framework Utilizing AI Models to Conceal and Extract Commands in C2 Images-wp.pdf2025-12-19 20:40 867K
[   ]Qian Feng & Chris Navarrete_AI-Powered Image-Based Command and Control (C2) Framework Utilizing AI Models to Conceal and Extract Commands in C2 Images.pdf2025-12-19 20:40 2.4M
[   ]Radu Motspan & Mikhail Evdokimov & Polina Smirnova_Remote Exploitation of Nissan Leaf Controlling Critical Body Elements from the Internet.pdf2025-12-19 20:40 6.0M
[   ]Shalom Carmel & Ofir Carmel_The Problems of Embedded Python in Excel, or How to Excel in Pwning Pandas.pdf2025-12-19 20:40 2.7M
[   ]Tian Zhou & Yiwen Wang & Xiu Zhang_The Illusion of Isolation How Isolation Failures in CICD Servers Lead to RCE and Privacy Risks.pdf2025-12-19 20:40 4.2M
[   ]Tim Pappa_Weaponized Deception Lessons from Indonesia's Muslim Cyber Army.pdf2025-12-19 20:40 18M
[   ]Vikas Gupta & Peter Garba_Standing on the Shoulders of Giants De-Obfuscating WebAssembly Using LLVM.pdf2025-12-19 20:40 12M
[   ]Wei Wen & Xiangyu Cao & Jiangchunxi Hou & Zixi Liao & Yingyan Song & Zhongcheng Li & Yijie Zhao & Bin Ma_Mini-App But Great Impact New Ways to Compromise Mobile Apps.pdf2025-12-19 20:40 1.8M
[   ]Wenkai Li & Zhijie Liu & Xiaoqi Li_Sweeping the Blockchain Unmasking Illicit Accounts in Web3 Scams.pdf2025-12-19 20:40 3.6M
[   ]Yingjie Cao & Xinfeng Chen_Double Tap at the Blackbox Hacking a Car Remotely Twice with MiTM.pdf2025-12-19 20:40 3.0M
[   ]Zhiniang Peng & Ver & Zishan Lin_One Bug to Rule Them All Stably Exploiting a Preauth RCE Vulnerability on Windows Server 2025.pdf2025-12-19 20:40 1.8M
[   ]Zhiwei Lin & Ziyu Lin_CDN Cannon Exploiting CDN Back-to-Origin Strategies for Amplification Attacks-wp.pdf2025-12-19 20:40 1.1M
[   ]Zhiwei Lin & Ziyu Lin_CDN Cannon Exploiting CDN Back-to-Origin Strategies for Amplification Attacks.pdf2025-12-19 20:40 958K