![[ICO]](data:,) | Name | Last modified | Size |
![[parent]](data:,) | Parent Directory | | - |
![[ ]](data:,) | Aakanksha Saha_Unmasking APTs An Automated Approach for Real-World Threat Attribution.pdf | 2025-12-19 20:40 | 14M |
![[ ]](data:,) | Allyn Stott_How I Learned to Stop Worrying and Build a Modern Detection & Response Program.pdf | 2025-12-19 20:40 | 9.8M |
![[ ]](data:,) | Alon Leviev_The Pool Party You Will Never Forget New Process Injection Techniques Using Windows Thread Pools.pdf | 2025-12-19 20:40 | 4.8M |
![[ ]](data:,) | Andreas Kogler_Collide+Power The Evolution of Software-based Power Side-Channels Attacks.pdf | 2025-12-19 20:40 | 2.5M |
![[ ]](data:,) | Ankit Gangwal, Shubham Singh, Abhijeet Srivastava_ AutoSpill Zero Effort Credential Stealing from Mobile Password Managers.pdf | 2025-12-19 20:40 | 13M |
![[ ]](data:,) | Asaf Eitani, Nitzan Yaakov_REDIScovering HeadCrab - A Technical Analysis of a Novel Malware and the Mind Behind It.pdf | 2025-12-19 20:40 | 8.4M |
![[ ]](data:,) | Ayoub Fandi_Security Through Transparency Scaling Your Customer Trust Program.pdf | 2025-12-19 20:40 | 2.4M |
![[ ]](data:,) | Ben Nassi, Eugene Bagdasaryan_Indirect Prompt Injection Into LLMs Using Images and Sounds.pdf | 2025-12-19 20:40 | 8.9M |
![[ ]](data:,) | Bohan Liu, Zheng Wang_Reviving JIT Vulnerabilities Unleashing the Power of Maglev Compiler Bugs on Chrome Browser.pdf | 2025-12-19 20:40 | 8.9M |
![[ ]](data:,) | Brett Hawkins_Hiding in the Clouds Abusing Azure DevOps Services to Bypass Microsoft Sentinel Analytic Rules.pdf | 2025-12-19 20:40 | 3.5M |
![[ ]](data:,) | Brett Hawkins_Hiding in the Clouds Abusing Azure DevOps Services to Bypass Microsoft Sentinel Analytic Rules_wp.pdf | 2025-12-19 20:40 | 2.5M |
![[ ]](data:,) | Christine Fossaceca,Bill Marczak_Sweet QuaDreams or Nightmare Before Christmas Dissecting an iOS 0-Day.pdf | 2025-12-19 20:40 | 11M |
![[ ]](data:,) | Colin Finck, Tom Dohrmann_A Decade After Stuxnet How Siemens S7 is Still an Attacker's Heaven.pdf | 2025-12-19 20:40 | 2.6M |
![[ ]](data:,) | Craig Gibson, Vladimir Kropotov_Kidnapping Without Hostages Virtual Kidnapping and the Dark Road Ahead.pdf | 2025-12-19 20:40 | 3.2M |
![[ ]](data:,) | Daniel Cuthbert, Mark Carney, Niroshan Rajadurai, Benjamin Rodes_The Magnetic Pull of Mutable Protection Worked Examples in Cryptographic Agility.pdf | 2025-12-19 20:40 | 2.9M |
![[ ]](data:,) | Eduardo Barbaro, Yury Zhauniarovich, Anna Lukina, Daan Hofman_VoBERT Unstable Log Sequence Anomaly Detection Introducing Vocabulary-Free BERT.pdf | 2025-12-19 20:40 | 16M |
![[ ]](data:,) | Edward Prior_Breaching the Perimeter via Cloud Synchronized Browser Settings.pdf | 2025-12-19 20:40 | 3.1M |
![[ ]](data:,) | Edward Prior_Breaching the Perimeter via Cloud Synchronized Browser Settings_wp.pdf | 2025-12-19 20:40 | 6.2M |
![[ ]](data:,) | Elliott Grey_Hacking Your Documentation Who Should WTFM.pdf | 2025-12-19 20:40 | 2.3M |
![[ ]](data:,) | Eran Jacob, Ariel Harush, Roy Hodir_When The Front Door Becomes a Backdoor The Security Paradox of OSDP.pdf | 2025-12-19 20:40 | 3.5M |
![[ ]](data:,) | Fabio Pagani, Alex Matrosov, Alex Ermolov , Yegor Vasilenko , Sam Thomas , Anton Ivanov _ LogoFAIL Security Implications of Image Parsing During System Boot.pdf | 2025-12-19 20:40 | 10M |
![[ ]](data:,) | Haixin Duan, Xiang Li, Wei Xu, Chaoyi Lu_TsuKing Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers.pdf | 2025-12-19 20:40 | 3.1M |
![[ ]](data:,) | Jesse Chick , Kasimir Schulz_Something Rotten in the State of Data Centers.pdf | 2025-12-19 20:40 | 7.0M |
![[ ]](data:,) | Johan Berggren&Matt Linton_My Invisible Adversary Burnout.pdf | 2025-12-19 20:40 | 3.4M |
![[ ]](data:,) | Larisa Munteanu, Mark Povey_Illegitimate Data Protection Requests - To Delete or to Address.pdf | 2025-12-19 20:40 | 685K |
![[ ]](data:,) | Lukas Gerlach, Daniel Weber, Michael Schwarz_A Security RISC The State of Microarchitectural Attacks on RISC-V.pdf | 2025-12-19 20:40 | 13M |
![[ ]](data:,) | Maarten Wullink_Deleting Your Domain Preventing Data Leaks at TLD Scale.pdf | 2025-12-19 20:40 | 9.7M |
![[ ]](data:,) | Marta Rybczynska_Through the Looking Glass How Open Source Projects See Vulnerability Disclosure.pdf | 2025-12-19 20:40 | 1.9M |
![[ ]](data:,) | Masaki Kubo, Yoshiki Mori, Kanta Okugawa_One Million ASUS Routers Under Control Exploiting ASUS DDNS to MITM Admin Credentials.pdf | 2025-12-19 20:40 | 13M |
![[ ]](data:,) | Mathy Vanhoef_TunnelCrack Leaking VPN Traffic by Manipulating Routing Tables.pdf | 2025-12-19 20:40 | 1.5M |
![[ ]](data:,) | Nicholas Lang,Andrew Hughes_Orchestrate This! Kubernetes Rootkit.pdf | 2025-12-19 20:40 | 2.3M |
![[text]](data:,) | NotInList.txt | 2025-12-19 20:40 | 377 |
![[ ]](data:,) | Ori David_Off The Record - Weaponizing DHCP DNS Dynamic Updates.pdf | 2025-12-19 20:40 | 1.4M |
![[ ]](data:,) | Qian Chen, A Ben, Ruiqi Chen, Hang An, Luo Quan_Breaking Theoretical Limits The Gap Between Virtual NICs and Physical Network Cards.pdf | 2025-12-19 20:40 | 1.5M |
![[ ]](data:,) | Sina Yazdanmehr, Ibrahim Akkulak _ Millions of Patient Records at Risk The Perils of Legacy Protocols.pdf | 2025-12-19 20:40 | 817K |
![[ ]](data:,) | Stanislav Dashevskyi, Francesco La Spina_Old Code Dies Hard Finding New Vulnerabilities in Old Third-Party Software Components and the Importance of Having SBoM for IoTOT Devices.pdf | 2025-12-19 20:40 | 6.0M |
![[ ]](data:,) | Wenya Wang, Xingwei Lin, Jingyi Wang, Wang Gao, Dawu Gu _ HODOR Reducing Attack Surface on Node.js via System Call Limitation.pdf | 2025-12-19 20:40 | 4.4M |
![[ ]](data:,) | Witold Waligóra_How We Taught ChatGPT-4 to Break mbedTLS AES With Side-Channel Attacks.pdf | 2025-12-19 20:40 | 6.4M |
![[ ]](data:,) | Xingyu Jin, Richard Neal, Tony Mendez_Evils in the Sparse Texture Memory Exploit Kernel Based on Undefined Behaviors of Graphic APIs.pdf | 2025-12-19 20:40 | 5.2M |
![[ ]](data:,) | Ye Zhang,Le Wu,Shupeng Gao,Zheng Huang_Attacking NPUs of Multiple Platforms.pdf | 2025-12-19 20:40 | 11M |