[ICO]NameLast modifiedSize
[parent]Parent Directory  -
[   ]Aakanksha Saha_Unmasking APTs An Automated Approach for Real-World Threat Attribution.pdf2025-12-19 20:40 14M
[   ]Allyn Stott_How I Learned to Stop Worrying and Build a Modern Detection & Response Program.pdf2025-12-19 20:40 9.8M
[   ]Alon Leviev_The Pool Party You Will Never Forget New Process Injection Techniques Using Windows Thread Pools.pdf2025-12-19 20:40 4.8M
[   ]Andreas Kogler_Collide+Power The Evolution of Software-based Power Side-Channels Attacks.pdf2025-12-19 20:40 2.5M
[   ]Ankit Gangwal, Shubham Singh, Abhijeet Srivastava_ AutoSpill Zero Effort Credential Stealing from Mobile Password Managers.pdf2025-12-19 20:40 13M
[   ]Asaf Eitani, Nitzan Yaakov_REDIScovering HeadCrab - A Technical Analysis of a Novel Malware and the Mind Behind It.pdf2025-12-19 20:40 8.4M
[   ]Ayoub Fandi_Security Through Transparency Scaling Your Customer Trust Program.pdf2025-12-19 20:40 2.4M
[   ]Ben Nassi, Eugene Bagdasaryan_Indirect Prompt Injection Into LLMs Using Images and Sounds.pdf2025-12-19 20:40 8.9M
[   ]Bohan Liu, Zheng Wang_Reviving JIT Vulnerabilities Unleashing the Power of Maglev Compiler Bugs on Chrome Browser.pdf2025-12-19 20:40 8.9M
[   ]Brett Hawkins_Hiding in the Clouds Abusing Azure DevOps Services to Bypass Microsoft Sentinel Analytic Rules.pdf2025-12-19 20:40 3.5M
[   ]Brett Hawkins_Hiding in the Clouds Abusing Azure DevOps Services to Bypass Microsoft Sentinel Analytic Rules_wp.pdf2025-12-19 20:40 2.5M
[   ]Christine Fossaceca,Bill Marczak_Sweet QuaDreams or Nightmare Before Christmas Dissecting an iOS 0-Day.pdf2025-12-19 20:40 11M
[   ]Colin Finck, Tom Dohrmann_A Decade After Stuxnet How Siemens S7 is Still an Attacker's Heaven.pdf2025-12-19 20:40 2.6M
[   ]Craig Gibson, Vladimir Kropotov_Kidnapping Without Hostages Virtual Kidnapping and the Dark Road Ahead.pdf2025-12-19 20:40 3.2M
[   ]Daniel Cuthbert, Mark Carney, Niroshan Rajadurai, Benjamin Rodes_The Magnetic Pull of Mutable Protection Worked Examples in Cryptographic Agility.pdf2025-12-19 20:40 2.9M
[   ]Eduardo Barbaro, Yury Zhauniarovich, Anna Lukina, Daan Hofman_VoBERT Unstable Log Sequence Anomaly Detection Introducing Vocabulary-Free BERT.pdf2025-12-19 20:40 16M
[   ]Edward Prior_Breaching the Perimeter via Cloud Synchronized Browser Settings.pdf2025-12-19 20:40 3.1M
[   ]Edward Prior_Breaching the Perimeter via Cloud Synchronized Browser Settings_wp.pdf2025-12-19 20:40 6.2M
[   ]Elliott Grey_Hacking Your Documentation Who Should WTFM.pdf2025-12-19 20:40 2.3M
[   ]Eran Jacob, Ariel Harush, Roy Hodir_When The Front Door Becomes a Backdoor The Security Paradox of OSDP.pdf2025-12-19 20:40 3.5M
[   ]Fabio Pagani, Alex Matrosov, Alex Ermolov , Yegor Vasilenko , Sam Thomas , Anton Ivanov _ LogoFAIL Security Implications of Image Parsing During System Boot.pdf2025-12-19 20:40 10M
[   ]Haixin Duan, Xiang Li, Wei Xu, Chaoyi Lu_TsuKing Coordinating DNS Resolvers and Queries into Potent DoS Amplifiers.pdf2025-12-19 20:40 3.1M
[   ]Jesse Chick , Kasimir Schulz_Something Rotten in the State of Data Centers.pdf2025-12-19 20:40 7.0M
[   ]Johan Berggren&Matt Linton_My Invisible Adversary Burnout.pdf2025-12-19 20:40 3.4M
[   ]Larisa Munteanu, Mark Povey_Illegitimate Data Protection Requests - To Delete or to Address.pdf2025-12-19 20:40 685K
[   ]Lukas Gerlach, Daniel Weber, Michael Schwarz_A Security RISC The State of Microarchitectural Attacks on RISC-V.pdf2025-12-19 20:40 13M
[   ]Maarten Wullink_Deleting Your Domain Preventing Data Leaks at TLD Scale.pdf2025-12-19 20:40 9.7M
[   ]Marta Rybczynska_Through the Looking Glass How Open Source Projects See Vulnerability Disclosure.pdf2025-12-19 20:40 1.9M
[   ]Masaki Kubo, Yoshiki Mori, Kanta Okugawa_One Million ASUS Routers Under Control Exploiting ASUS DDNS to MITM Admin Credentials.pdf2025-12-19 20:40 13M
[   ]Mathy Vanhoef_TunnelCrack Leaking VPN Traffic by Manipulating Routing Tables.pdf2025-12-19 20:40 1.5M
[   ]Nicholas Lang,Andrew Hughes_Orchestrate This! Kubernetes Rootkit.pdf2025-12-19 20:40 2.3M
[text]NotInList.txt2025-12-19 20:40 377
[   ]Ori David_Off The Record - Weaponizing DHCP DNS Dynamic Updates.pdf2025-12-19 20:40 1.4M
[   ]Qian Chen, A Ben, Ruiqi Chen, Hang An, Luo Quan_Breaking Theoretical Limits The Gap Between Virtual NICs and Physical Network Cards.pdf2025-12-19 20:40 1.5M
[   ]Sina Yazdanmehr, Ibrahim Akkulak _ Millions of Patient Records at Risk The Perils of Legacy Protocols.pdf2025-12-19 20:40 817K
[   ]Stanislav Dashevskyi, Francesco La Spina_Old Code Dies Hard Finding New Vulnerabilities in Old Third-Party Software Components and the Importance of Having SBoM for IoTOT Devices.pdf2025-12-19 20:40 6.0M
[   ]Wenya Wang, Xingwei Lin, Jingyi Wang, Wang Gao, Dawu Gu _ HODOR Reducing Attack Surface on Node.js via System Call Limitation.pdf2025-12-19 20:40 4.4M
[   ]Witold Waligóra_How We Taught ChatGPT-4 to Break mbedTLS AES With Side-Channel Attacks.pdf2025-12-19 20:40 6.4M
[   ]Xingyu Jin, Richard Neal, Tony Mendez_Evils in the Sparse Texture Memory Exploit Kernel Based on Undefined Behaviors of Graphic APIs.pdf2025-12-19 20:40 5.2M
[   ]Ye Zhang,Le Wu,Shupeng Gao,Zheng Huang_Attacking NPUs of Multiple Platforms.pdf2025-12-19 20:40 11M