- A new secret stash for fileless malware
- Active Directory 安全:有時候真實比小說更加荒誕
- Actually, your blue team is red. Stealing your red move from the blue side
- How we use Dirty Pipe to get reverse root shell on Android Emulator and Pixel 6
- Introduction to decentralized online identities and how to implement it wrong
- Malware Behavior Analysis Acceleration based on Graph Neural Networks
- Pain Pickle:系統化地繞過 Restricted Unpickler
- Ring0 Rootkit-在 Windows Kernel 與病毒共存
- Timing Attack 從入門到發現沒時間了
- Your Printer is not your Printer ! - Hacking Printers at Pwn2Own
- 從 Binary Researcher 到 Bounty Hunter 的致富之路
- 隔離網路,隔離了什麼?
- 基於圖特徵惡意軟件檢測器的結構型對抗式樣本
- 藍隊新曙光 - 以語意感知之的啟發式符號引擎挫敗在野勒索軟體
- 逆向 C 語言前傳
- 如何幫你(不)發射飛彈
- AIoT安全体系建设实践
- All in one:基于运行时单探针插桩的代码疫苗技术
- Beacon完整逆向工程研究
- DevSecOps-SCA建设中码纹识别痛点和解决方案
- macOS+混合符号执行
- 被动资产识别 从人工到AI
- 从NTLM Relay看Windows RPC攻击面
- 第六代Android QDEX VMP加固引擎
- 攻防实战下的加密威胁检测技术创新与实践
- 基于SASE的安全运营解决方案与实践
- 剑指工控主机安全防护的脆弱性
- 蓝军视角剖析BYOVD实战利用
- 流量中的威胁:Chrome网络组件漏洞剖析
- 蜻蜓可视化编排架构与应用
- 隐藏在工业控制系统中的间谍
- 元宇宙的焦虑:安全先行
- Dumart fuzz:让黑盒像白盒一样fuzz
- Linux内核漏洞检测与防御
- Paralles Desktop虚拟机逃逸之旅
- 从后门到漏洞——智能设备私有协议中的安全问题
- 从应用场景看金融安全 —— 逻辑为王
- 国产智能网联汽车漏洞挖掘中的几个突破点
- 基于硬件虚拟化技术的新一代二进制分析利器
- 漫谈AOSP蓝牙漏洞挖掘技术
- 猫鼠游戏:如何进行Windows平台在野0day狩猎
- 面向业务守护的移动安全对抗实践
- firmWar-An-Imminent-Threat-to-the-Foundation-of-Computing
- Stealthy-Sensitive-Information-Collection-from-Android-Apps
- Attacking-WebAssembly-Compiler-of-Webkit
- New-Wine-in-an-Old-Bottle-Attacking-Chrome-WebSQL
- Operation-Clairvoyance-How-APT-Groups-Spy-on-the-Media-Industry
- PMFault
- A-Run-a-Day-Wont-Keep-the-Hacker-Away
- Cloudy-With-a-Chance-of-Exploits
- Breaking-the-Chain
- Dirty-Bin-Cache-A-New-Code-Injection-Poisoning-Binary-Translation-Cache
- PPLdump-Is-Dead-Long-Live-PPLdump
- Grand-Theft-House-RF-Lock-Pick-Tool-to-Unlock-Smart-Door-Lock
- Phoenix-Domain-Attack
- Fuzzing-the-Native-NTFS-Read-Write-Driver
- Insider-Threats-Packing-Their-Bags-With-Corporate-Data
- Alice-In-Kernel-Land
- Emit-My-Keystroke
- Hand-Me-Your-Secret-MCU
- Weaponizing-mobile-Infrastructure
- Prototype-Pollution-Leads-to-RCE
- You-Can-Run-But-You-Cant-Hide
- Dirty-Stream-Attack-Turning-Android
- Sweet-Dreams-Abusing-Sleep-Mode-to-Break-Wi-Fi-Encryption-and-Disrupt-WPA23-Networks
- Leveraging-Streaming-Based-Outlier-Detection
- Two-bugs-with-one-PoC-Rooting-Pixel-6-from-Android-12-to-Android-13
- Nakatomi-Space
- Knowledge-Graph-Meets-TTPs-Highly-Automated-and-Adaptive-Executable-TTP-Intelligence-for-Security-Evaluation
- Dilemma-In-IoT-Access-Control
- Security-Advocacy-Shouldnt-Be-For-Security-Professionals
- A-new-attack-interface-in-Java
References