![[ICO]](data:,) | Name | Last modified | Size |
![[parent]](data:,) | Parent Directory | | - |
![[ ]](data:,) | Ali Ahmed & Brian Lee & Amit Deokar_Does Public Disclosure of Vulnerabilities Affect Hacker Participation in Bug Bounty Programs.pdf | 2025-12-19 20:40 | 1.1M |
![[ ]](data:,) | Andy Ellis & Meghan Jacquot & Aastha Sahni & Sherri Davidoff_Diversity Microtalks Perspectives on Creating Change.pdf | 2025-12-19 20:40 | 2.7M |
![[ ]](data:,) | Biao He & Haowen Mu & Yu Ouyang_ODDFuzz Hunting Java Deserialization Gadget Chains via Structure-Aware Directed Greybox Fuzzing.pdf | 2025-12-19 20:40 | 6.2M |
![[ ]](data:,) | Bob Lord & Jack Cable_Unsafe At Any Speed CISA's Plan to Foster Tech Ecosystem Security.pdf | 2025-12-19 20:40 | 7.3M |
![[ ]](data:,) | Carlo Meijer & Wouter Bokslag & Jos Wetzels_All Cops Are Broadcasting Breaking TETRA After Decades in the Shadows.pdf | 2025-12-19 20:40 | 5.8M |
![[ ]](data:,) | Catherine Lyle_Why Cyber Insurance Should be Your SOC's New Best Friend.pdf | 2025-12-19 20:40 | 1.4M |
![[ ]](data:,) | Cat Self & Kate Esprit_Becoming a Dark Knight Adversary Emulation Demonstration for ATT&CK Evaluations.pdf | 2025-12-19 20:40 | 5.7M |
![[text]](data:,) | Christian Werling & Niclas Kühnapfel & Hans Niklas Jacob & Oleg Drokin_Jailbreaking an Electric Vehicle in 2023 or What It Means to Hotwire Tesla's x86-Based Seat Heater_tools.txt | 2025-12-19 20:40 | 29 |
![[ ]](data:,) | Christian Werling _ Niclas Kühnapfel _ Hans Niklas Jacob _ Oleg Drokin_Jailbreaking an Electric Vehicle in 2023 or What It Means to Hotwire Tesla's x86-Based Seat Heater.pdf | 2025-12-19 20:40 | 3.8M |
![[ ]](data:,) | Christopher Wade_Physical Attacks Against Smartphones.pdf | 2025-12-19 20:40 | 2.1M |
![[ ]](data:,) | Colin O'Flynn_Oven Repair (The Hardware Hacking Way).pdf | 2025-12-19 20:40 | 14M |
![[ ]](data:,) | Daniel Cooper & Mike Hintze & Leslie Katz & Adam Shostack _Hot Topics in Cyber and Privacy Regulation.pdf | 2025-12-19 20:40 | 733K |
![[ ]](data:,) | Daniel dos Santos & Simon Guiot & Stanislav Dashevskyi & Amine Amri & Oussama Kerro_Route to Bugs Analyzing the Security of BGP Message Parsing.pdf | 2025-12-19 20:40 | 2.3M |
![[ ]](data:,) | Daniel Jary_From Dead Data to Digestion Extracting Windows Fibers for Your Digital Forensics Diet.pdf | 2025-12-19 20:40 | 1.6M |
![[text]](data:,) | Daniel Moghimi_Single Instruction Multiple Data Leaks in Cutting-edge CPUs, AKA Downfall.txt | 2025-12-19 20:40 | 22 |
![[ ]](data:,) | Daniel Woods_Lemons and Liability Cyber Warranties as an Experiment in Software Regulation.pdf | 2025-12-19 20:40 | 1.7M |
![[ ]](data:,) | Daniel Woods_Lemons and Liability Cyber Warranties as an Experiment in Software Regulation_wp.pdf | 2025-12-19 20:40 | 229K |
![[ ]](data:,) | Dan Petro & David Vargas _ Badge of Shame Breaking into Secure Facilities with OSDP.pdf | 2025-12-19 20:40 | 12M |
![[ ]](data:,) | David Renardy & Zach Miller_Know Thy Enemy The Taxonomies That Meta Uses to Map the Offensive Privacy Space.pdf | 2025-12-19 20:40 | 1.5M |
![[ ]](data:,) | Din Serussi_Evasive Maneuvers Trends in Phishing Evasion & Anti-Evasion.pdf | 2025-12-19 20:40 | 4.7M |
![[ ]](data:,) | Duy Hieu Nguyen,Anh Khoa Nguyen,Huu Giap Nguyen,Thanh Nguyen,Anh Quynh Nguyen_TSSHOCK Breaking MPC Wallets and Digital Custodians for $BILLION$ Profit.pdf | 2025-12-19 20:40 | 1.2M |
![[ ]](data:,) | Duy Hieu Nguyen,Anh Khoa Nguyen,Huu Giap Nguyen,Thanh Nguyen,Anh Quynh Nguyen_TSSHOCK Breaking MPC Wallets and Digital Custodians for $BILLION$ Profit_wp.pdf | 2025-12-19 20:40 | 425K |
![[ ]](data:,) | Erik Decker_Leverage and Demonstrate Value with your Cyber Insurance Renewal.pdf | 2025-12-19 20:40 | 664K |
![[ ]](data:,) | Fan Wu & Xuankai Zhang_Endoscope Unpacking Android Apps with VM-Based Obfuscation.pdf | 2025-12-19 20:40 | 4.1M |
![[ ]](data:,) | Farzan Karimi & Xuan Xing & Xiling Gong & Eugene Rodionov_Over the Air, Under the Radar Attacking and Securing the Pixel Modem.pdf | 2025-12-19 20:40 | 2.4M |
![[ ]](data:,) | Fredrik Heiding & Bruce Schneier & Arun Vishwanath & Jeremy Bernstein _ Devising and Detecting Phishing Large Language Models (GPT3, GPT4) vs. Smaller Human Models (V-Triad, Generic Emails).pdf | 2025-12-19 20:40 | 2.4M |
![[ ]](data:,) | Fredrik Heiding & Bruce Schneier & Arun Vishwanath & Jeremy Bernstein _ Devising and Detecting Phishing Large Language Models (GPT3, GPT4) vs. Smaller Human Models (V-Triad, Generic Emails)_WP.pdf | 2025-12-19 20:40 | 13M |
![[ ]](data:,) | Guanxing Wen_Core Escalation Unleashing the Power of Cross-Core Attacks on Heterogeneous System.pdf | 2025-12-19 20:40 | 23M |
![[ ]](data:,) | Haiquan Zhang & Rhettxie Rhettxie_CodeQL Also a Powerful Binary Analysis Engine.pdf | 2025-12-19 20:40 | 8.8M |
![[ ]](data:,) | Hillai Ben-Sasson_BingBang Hacking Bing.com (and much more) with Azure Active Directory.pdf | 2025-12-19 20:40 | 9.8M |
![[ ]](data:,) | James Kettle_Smashing the State Machine The True Potential of Web Race Conditions.pdf | 2025-12-19 20:40 | 2.4M |
![[ ]](data:,) | James Kettle_Smashing the State Machine The True Potential of Web Race Conditions_wp.pdf | 2025-12-19 20:40 | 793K |
![[ ]](data:,) | Jeremy Long_Reflections on Trust in the Software Supply Chain.pdf | 2025-12-19 20:40 | 7.2M |
![[ ]](data:,) | Johannes Willbold_Houston, We Have a Problem Analyzing the Security of Low Earth Orbit Satellites.pdf | 2025-12-19 20:40 | 2.7M |
![[ ]](data:,) | John Caruthers_Bridging Cyber and Insurance.pdf | 2025-12-19 20:40 | 8.2M |
![[ ]](data:,) | John Miller & Ron Graf_What Does an LLM-Powered Threat Intelligence Program Look Like.pdf | 2025-12-19 20:40 | 2.1M |
![[ ]](data:,) | John Swanson_I Was Tasked With Enrolling Millions of Developers in 2FA - Here's What Happened.pdf | 2025-12-19 20:40 | 7.0M |
![[ ]](data:,) | Jonathan Birch_Second Breakfast Implicit and Mutation-Based Serialization Vulnerabilities in dotNET.pdf | 2025-12-19 20:40 | 1.0M |
![[ ]](data:,) | Jonathan Birch_Second Breakfast Implicit and Mutation-Based Serialization Vulnerabilities in dotNET_wp.pdf | 2025-12-19 20:40 | 265K |
![[ ]](data:,) | Joseph Tartaro & Enrique Nissim & Ethan Shackelford_Shuffle Up and Deal Analyzing the Security of Automated Card Shufflers.pdf | 2025-12-19 20:40 | 4.3M |
![[ ]](data:,) | Joseph Tartaro & Enrique Nissim & Ethan Shackelford_Shuffle Up and Deal Analyzing the Security of Automated Card Shufflers_wp.pdf | 2025-12-19 20:40 | 4.7M |
![[ ]](data:,) | Kai Greshake & Christoph Endres & Mario Fritz & Shailesh Mishra & Sahar Abdelnabi_Compromising LLMs The Advent of AI Malware.pdf | 2025-12-19 20:40 | 4.0M |
![[ ]](data:,) | Kai Greshake & Christoph Endres & Mario Fritz & Shailesh Mishra & Sahar Abdelnabi_Compromising LLMs The Advent of AI Malware_wp.pdf | 2025-12-19 20:40 | 7.0M |
![[ ]](data:,) | Kaileigh McCrea_The Yandex Leak How a Russian Search Giant Uses Consumer Data.pdf | 2025-12-19 20:40 | 5.8M |
![[ ]](data:,) | Kelly Shortridge_Fast, Ever-Evolving Defenders The Resilience Revolution.pdf | 2025-12-19 20:40 | 24M |
![[ ]](data:,) | Kirsten Bay_The Integration Cyber Security and Insurance The Journey of Cysurance.pdf | 2025-12-19 20:40 | 2.7M |
![[ ]](data:,) | Marco Squarcina & Pedro Adão_Cookie Crumbles Unveiling Web Session Integrity Vulnerabilities.pdf | 2025-12-19 20:40 | 3.2M |
![[ ]](data:,) | Margaret Zimmermann_When a Zero Day and Access Keys Collide in the Cloud Responding to the SugarCRM 0-Day Vulnerability.pdf | 2025-12-19 20:40 | 1.3M |
![[text]](data:,) | Margaret Zimmermann_When a Zero Day and Access Keys Collide in the Cloud Responding to the SugarCRM 0-Day Vulnerability.txt | 2025-12-19 20:40 | 92 |
![[ ]](data:,) | Michael Bargury_All You Need is Guest.pdf | 2025-12-19 20:41 | 14M |
![[ ]](data:,) | Michael Kouremetis & Ron Alford & Dean Lawrence_Mirage Cyber Deception Against Autonomous Cyber Attacks.pdf | 2025-12-19 20:41 | 5.0M |
![[ ]](data:,) | Michael Stepankin_mTLS When Certificate Authentication is Done Wrong.pdf | 2025-12-19 20:41 | 1.3M |
![[ ]](data:,) | Moritz Abrell_Zero-Touch-Pwn Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones.pdf | 2025-12-19 20:41 | 19M |
![[ ]](data:,) | MoustachedBouncer AitM-Powered Surveillance via Belarus ISPs.pdf | 2025-12-19 20:41 | 5.0M |
![[ ]](data:,) | Mrityunjay Gautam & Pavan Kolachoor_AI Assisted Decision Making of Security Review Needs for New Features.pdf | 2025-12-19 20:41 | 2.8M |
![[ ]](data:,) | Nan Wang & Zhenghang Xiao_The Hat Trick Exploit Chrome Twice from Runtime to JIT.pdf | 2025-12-19 20:41 | 6.0M |
![[ ]](data:,) | Nan Wang & Zhenghang Xiao_The Hat Trick Exploit Chrome Twice from Runtime to JIT_wp.pdf | 2025-12-19 20:41 | 2.4M |
![[ ]](data:,) | Nicholas Dubois & Jessica Hyde_nput Output + Syslog (iO+S) Obtaining Data From Locked iOS Devices via Live Monitoring.pdf | 2025-12-19 20:41 | 4.7M |
![[ ]](data:,) | Nick Frichette_Evading Logging in the Cloud Bypassing AWS CloudTrail.pdf | 2025-12-19 20:41 | 2.4M |
![[ ]](data:,) | Nick Merker & Stephen Reynolds_Protecting the CISO A Legal Journey.pdf | 2025-12-19 20:41 | 1.9M |
![[ ]](data:,) | Nikolaos Makriyannis & Oren Yomtov & Arik Galansky_Small Leaks, Billions Of Dollars Practical Cryptographic Exploits That Undermine Leading Crypto Wallets.pdf | 2025-12-19 20:41 | 4.3M |
![[ ]](data:,) | Nitesh Surana & Magno Logan & David Fiser_Uncovering Azure's Silent Threats A Journey into Cloud Vulnerabilities.pdf | 2025-12-19 20:41 | 4.5M |
![[ ]](data:,) | Noam Moshe & Sharon Brizinov _ A Pain in the NAS Exploiting Cloud Connectivity to PWN Your NAS.pdf | 2025-12-19 20:41 | 7.0M |
![[text]](data:,) | NOT_IN_LIST.txt | 2025-12-19 20:41 | 3.7K |
![[ ]](data:,) | Olivier Bilodeau & Andréanne Bergeron_I Watched You Roll the Die Unparalleled RDP Monitoring Reveal Attackers' Tradecraft.pdf | 2025-12-19 20:41 | 9.2M |
![[ ]](data:,) | Or Yair_One Drive, Double Agent Clouded OneDrive Turns Sides.pdf | 2025-12-19 20:41 | 5.2M |
![[ ]](data:,) | Pankaj Moolrajani_Identifying and Reducing Permission Explosion in AWS A Graph-Based and Analytical Approach.pdf | 2025-12-19 20:41 | 3.8M |
![[ ]](data:,) | Rita Doerr _ Making and Breaking NSA's Codebreaker Challenge.pdf | 2025-12-19 20:41 | 704K |
![[ ]](data:,) | Ruben Boonen & Valentina Palmiotti_Close Encounters of the Advanced Persistent Kind Leveraging Rootkits for Post-Exploitation.pdf | 2025-12-19 20:41 | 15M |
![[ ]](data:,) | Ruben Santamarta_Seeing Through the Invisible Radiation Spikes Detected in Chernobyl During the Russian Invasion Show Possible Evidence of Fabrication.pdf | 2025-12-19 20:41 | 6.1M |
![[ ]](data:,) | Seunghun Han _Lost Control Breaking Hardware-Assisted Kernel Control-Flow Integrity with Page-Oriented Programming.pdf | 2025-12-19 20:41 | 13M |
![[ ]](data:,) | Sharon Brizinov & Noam Moshe_Exploiting OPC-UA in Every Possible Way Practical Attacks Against Modern OPC-UA Architectures.pdf | 2025-12-19 20:41 | 12M |
![[ ]](data:,) | Sian-Yao Huang & Cheng-Lin Yang & Chung-Kuan Chen_IRonMAN InterpRetable Incident Inspector Based ON Large-Scale Language Model and Association miNing.pdf | 2025-12-19 20:41 | 3.2M |
![[ ]](data:,) | Stiv Kupchik_Lifting the Fog of War - Monitoring, Identifying and Mitigating MS-RPC Based Threats.pdf | 2025-12-19 20:41 | 1.6M |
![[ ]](data:,) | STOK_Weaponizing Plain Text ANSI Escape Sequences as a Forensic Nightmare.pdf | 2025-12-19 20:41 | 25M |
![[ ]](data:,) | Tiffany Rad & Austin Shamlin_ Civil Cyber Defense Use Your Resources to Defend Non-Profits as They Combat Human Trafficking and Subvert Authoritarian Regimes.pdf | 2025-12-19 20:41 | 2.2M |
![[ ]](data:,) | Tomer Bar & Omer Attias_Defender-Pretender When Windows Defender Updates Become a Security Risk.pdf | 2025-12-19 20:41 | 4.9M |
![[ ]](data:,) | Tomer Bar & Shmuel Cohen_EDR = Erase Data Remotely, By Cooking An Unforgettable (Byte) Signature Dish.pdf | 2025-12-19 20:41 | 4.9M |
![[ ]](data:,) | Tom Tervoort_Three New Attacks Against JSON Web Tokens.pdf | 2025-12-19 20:41 | 2.9M |
![[ ]](data:,) | Tom Tervoort_Three New Attacks Against JSON Web Tokens_wp.pdf | 2025-12-19 20:41 | 252K |
![[ ]](data:,) | Vladimir Eliezer Tokarev_CoDe16; 16 Zero-Day Vulnerabilities Affecting CODESYS Framework Leading to Remote Code Execution on Millions of Industrial Devices Across Industries.pdf | 2025-12-19 20:41 | 6.4M |
![[ ]](data:,) | Willy Vasquez & Stephen Checkoway & Hovav Shacham_The Most Dangerous Codec in the World Finding and Exploiting Vulnerabilities in H.264 Decoders.pdf | 2025-12-19 20:41 | 4.9M |
![[text]](data:,) | Willy Vasquez & Stephen Checkoway & Hovav Shacham_The Most Dangerous Codec in the World Finding and Exploiting Vulnerabilities in H.264 Decoders_tools.txt | 2025-12-19 20:41 | 36 |
![[ ]](data:,) | Xianbo Wang & Kaixuan Luo & Wing Cheong Lau_The Living Dead Hacking Mobile Face Recognition SDKs with Non-Deepfake Attacks.pdf | 2025-12-19 20:41 | 13M |
![[ ]](data:,) | Yong Wang_Make KSMA Great Again The Art of Rooting Android Devices by GPU MMU Features.pdf | 2025-12-19 20:41 | 6.0M |
![[ ]](data:,) | Yueqi Chen,Minghao Lin,Chaoyang Lin,Jiahe Wang,Zicheng Wang,Minghang Shen_Kill Latest MPU-based Protections in Just One Shot Targeting All Commodity RTOSes.pdf | 2025-12-19 20:41 | 4.0M |
![[ ]](data:,) | Yuki Chen_Diving into Windows Remote Access Service for Pre-Auth Bugs.pdf | 2025-12-19 20:41 | 3.5M |
![[ ]](data:,) | Yuki Osawa & Satoru Higuchi & Satoshi Ito & Manabu Nakano & Takayuki Uchiyama_A Manufacturer's Post-Shipment Approach to Fend-Off IoT Malware in Home Appliances.pdf | 2025-12-19 20:41 | 2.7M |
![[ ]](data:,) | Yvan Genuer & Pablo Artuso_Chained to Hit Discovering New Vectors to Gain Remote and Root Access in SAP Enterprise Software.pdf | 2025-12-19 20:41 | 6.2M |
![[ ]](data:,) | Yvan Genuer & Pablo Artuso_Chained to Hit Discovering New Vectors to Gain Remote and Root Access in SAP Enterprise Software_WP.pdf | 2025-12-19 20:41 | 747K |
![[ ]](data:,) | Zechao Cai,Jiaxun Zhu,Yutian Yang,Wenbo Shen ,Yu Wang _Apple PAC, Four Years Later Reverse Engineering the Customized Pointer Authentication Hardware Implementation on Apple M1.pdf | 2025-12-19 20:41 | 6.1M |
![[ ]](data:,) | Zhenpeng Lin & Xinyu Xing & Zhaofeng Chen & Kang Li_Bad io_uring A New Era of Rooting for Android.pdf | 2025-12-19 20:41 | 6.3M |
![[ ]](data:,) | Zhenpeng Lin & Xinyu Xing & Zhaofeng Chen & Kang Li_Bad io_uring A New Era of Rooting for Android_wp.pdf | 2025-12-19 20:41 | 1.9M |
![[ ]](data:,) | Zhibo Liu & Yuanyuan Yuan & Xiaofei Xie & Tianxiang Li & Wenqiang Li & Shuai Wang_BTD Unleashing the Power of Decompilation for x86 Deep Neural Network Executables.pdf | 2025-12-19 20:41 | 2.2M |
![[ ]](data:,) | Zhibo Liu & Yuanyuan Yuan & Xiaofei Xie & Tianxiang Li & Wenqiang Li & Shuai Wang_BTD Unleashing the Power of Decompilation for x86 Deep Neural Network Executables_WP.pdf | 2025-12-19 20:41 | 1.5M |
![[ ]](data:,) | Zhou Li & Xiang Li & Qifan Zhang_MaginotDNS Attacking the Boundary of DNS Caching Protection.pdf | 2025-12-19 20:41 | 4.3M |
![[ ]](data:,) | Zhuonan Li & Qi Li & Zimin Lin_Low-level RASP Protecting Applications Implemented in High-level Programming Languages.pdf | 2025-12-19 20:41 | 1.9M |
![[ ]](data:,) | Zuozhi Fan_Dive into Apple UserFS (Userspace Filesystem).pdf | 2025-12-19 20:41 | 6.9M |