Listen

Description

Networking beyond plug-and-play

GET /large file HTTP/1.1: Connection-Based TCP Amplification Attacks

Yepeng Pan, Lars Richter, and Christian Rossow

[Paper] [Code]

WAFFLED: Exploiting Parsing Discrepancies to Bypass Web Application Firewalls

Seyed Ali Akhavani, Bahruz Jabiyev, Ben Kallus, Cem Topcuoglu, Sergey Bratus, and Engin Kirda

[Paper] [Code]

Excuse me, what precise time is it?

Oliver Ettlin

[Video]

Cut To The QUIC: Slashing QUIC's Performance With A Hash DoS

Paul Bottinelli

[Slides] [Code]

High-impact security at the foundations

Understanding the Security Impact of CHERI on the Operating System Kernel

Zhaofeng Li, Jerry Zhang, Joshua Tlatelpa-Agustin, Xiangdong Chen, and Anton Burtsev

[Code] [Paper]

CUDA de Grâce: Owning AI Cloud Infrastructure with GPU Exploits

Valentina Palmiotti and Samuel Lovejoy

[Video]

Defeating KASLR by Doing Nothing at All

Seth Jenkins

[Blog post] [Code]

Build a Fake Phone, Find Real Bugs: Qualcomm GPU Emulation and Fuzzing with LibAFL QEMU

Romain Malmain and Scott Bauer

[Code] [Video]

Rust in Android: move fast and fix things 

Jeff Vander Stoep

[Blog post] [Rust course]

Skynet Starter Kit: From Embodied AI Jailbreak to Remote Takeover of Humanoid Robots

Shipei Qu, Zikai Xu, and Xuangan Xiao

[Video]

Wins and losses with LLMs and security

Scaling agentic architectures for autonomous security testing and offensive operations

Jason Garman, Jake Coyne, and Aaron Brown

[Slides] [Code]

Forced Descent: Google Antigravity Persistent Code Execution Vulnerability

Aaron Portnoy

[Blog post]

Flaw And Order: Finding The Needle In The Haystack Of CodeQL Using LLMs

Simcha Kosman

[Slides] [Blog post] [Code]

Rescuing the Unpoisoned: Efficient Defense against Knowledge Corruption Attacks on RAG Systems

Kim Minseok, Lee Hankook, and Koo Hyungjoon

[Code] [Paper]

Whisper Leak: A novel side-channel attack on remote language models 

Jonathan Bar Or and Geoff McDonald

[Blog post] [Paper] [Code]

Nifty sundries

Format-Preserving Compression-Tolerating Authenticated Encryption for Images

Alexandra Boldyreva, Kaishuo Cheng, and Jehad Hussein

[Slides] [Paper]

Why Quantum Cryptanalysis is Bollocks

Peter Gutmann

[Video] [Slides]

Unmasking Organizations' Security Postures: Insights From Phishing-Resistant Authentication

Fei Liu

[Slides]

Those Who Do Not Learn from Advisories Are Doomed to Repeat Them

Louis Nyffenegger

[Video]