Privacy in the modern era
IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation
Erik Rye and Robert Beverly
[Slides] [Paper] [Code]
Device Tracking via Linux’s New TCP Source Port Selection Algorithm
Moshe Kol, Amit Klein, and Yossi Gilad
[Code] [Paper]
zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure
Michael Rosenberg, Jacob White, Christina Garman, and Ian Miers
[Paper] [Code]
3 Years in China: A Tale of Building a REAL Full Speed Anti-Censorship Router
KaiJern Lau
[Slides] [Code] [Video]
Embedded [in]security
Embedded Threats: A Deep Dive into the Attack Surface and Security Implications of eSIM Technology
Markus Vevier
[Code] [Video]
RPMB, a secret place inside the eMMC
Sergio Prado
[Blog]
Compromising Garmin’s Sport Watches: A Deep Dive into GarminOS and its MonkeyC Virtual Machine
Tao Sauvage
[Blog] [Video] [Slides]
The Impostor Among US(B): Off-Path Injection Attacks on USB Communications
Robert Dumitru, Daniel Genkin, Andrew Wabnitz, and Yuval Yarom
[Code] [Paper]
MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks
Tiantian Liu, Feng Lin, Zhangsen Wang, Chao Wang, Zhongjie Ba, Li Lu, Wenyao Xu, and Kui Ren
[Code] [Paper]
Issues at the operating system level
(Windows) Hello from the Other Side
Dirk-jan Mollema
[Slides] [Code]
Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures
Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, and Jörg Schwenk
[Paper] [Code]
Dirty Bin Cache: A New Code Injection Poisoning Binary Translation Cache
Koh Nakagawa
[
Information
- Show
- PublishedAugust 5, 2023 at 9:36 PM UTC
- Length31 min
- Episode8
- RatingClean