TopicSec
Security topics by SEFCOM & CSE591 at ASU.
HOME
CATEGORIES
TAGS
ARCHIVES
ABOUT
Home
Archives
Archives
Cancel
Archives
2022
30
Nov
Midas: Systematic Kernel TOCTTOU Protection
09
Nov
Ground Truth for Binary Disassembly is Not Easy
26
Oct
In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication
09
Oct
Decomperson: How Humans Decompile and What We Can Learn From It
28
Sep
Hand Me Your PIN! Inferring ATM PINs of Users Typing with a Covered Hand
21
Sep
Why Users (Don't) Use Password Managers at a Large Educational Institution
14
Sep
Fuzzware: Using Precise MMIO Modeling for Effective Firmware Fuzzing
08
Sep
How Machine Learning Is Solving the Binary Function Similarity Problem
31
Aug
RE-Mind: a First Look Inside the Mind of a Reverse Engineer
27
Apr
Who’s In Control? On Security Risks of Disjointed IoT Device Management Channels
20
Apr
SmashEx: Smashing SGX Enclaves Using Exceptions
13
Apr
MirChecker: Detecting Bugs in Rust Programs via Static Analysis
06
Apr
Automated Bug Hunting With Data-Driven Symbolic Root Cause Analysis
29
Mar
DeepSight: Mitigating Backdoor Attacks in Federated Learning Through Deep Model Inspection
23
Mar
Learning to Explore Paths for Symbolic Execution
16
Mar
Catching Transparent Phish: Analyzing and Detecting MITM Phishing Toolkits
02
Mar
Igor: Crash Deduplication Through Root-Cause Clustering
22
Feb
''I need a better description'': An Investigation Into User Expectations For Differential Privacy
08
Feb
CROSSLINE: Breaking ''Security-by-Crash'' based Memory Isolation in AMD SEV
01
Feb
The Effect of Google Search on Software Security: Unobtrusive Security Interventions via Content Re-ranking
26
Jan
HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators
2021
17
Nov
Finding Bugs Using Your Own Code: Detecting Functionally-similar yet Inconsistent Code
10
Nov
Detecting Kernel Refcount Bugs with Two-Dimensional Consistency Checking
03
Nov
Charger-Surfing: Exploiting a Power Line Side-Channel for Smartphone Information Leakage
27
Oct
You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion
20
Oct
Hopper - Modeling and Detecting Lateral Movement
13
Oct
Preventing Use-After-Free Attacks with Fast Forward Allocation
05
Oct
Constraint-guided Directed Greybox Fuzzing
29
Sep
Breaking Through Binaries: Compiler-quality Instrumentation for Better Binary-only Fuzzing
22
Sep
Why Older Adults (Don't) Use Password Managers
14
Sep
Token-Level Fuzzing
14
Apr
WINNIE: Fuzzing Windows Applications with Harness Synthesis and Fast Cloning
14
Apr
Refining Indirect Call Targets at the Binary Level
07
Apr
Censored Planet: An Internet-wide, Longitudinal Censorship Observatory
31
Mar
FREEDOM: Engineering a State-of-the-Art DOM Fuzzer
17
Mar
Speculative Probing - Hacking Blind in the Spectre Era
10
Mar
A Generic technique fro Automatically Finding Defense-Aware Code Reuse Attacks
03
Mar
A Qualitative Study of Dependency Management and Its Security Implications
24
Feb
Gotta Catch ’Em All: Using Honeypots to Catch Adversarial
16
Feb
The Cookie Hunter: Automated Black-box Auditing
11
Feb
Finding Cracks in Shields On the Security of CFI Mechanisms
27
Jan
Devil is Virtual: Reversing Virtual Inheritance in C++ Binaries
20
Jan
BlackMirror: Preventing Wallhacks in 3D Online FPS Games
2020
02
Dec
Talking with Familiar Strangers: An Empirical Study on HTTPS Context Confusion Attacks
18
Nov
Symbolic execution with SymCC: Don't interpret, compile!
11
Nov
Remote Side-Channel Attacks on Anonymous Transactions
04
Nov
FuzzGen
28
Oct
An Observational Investigation of Reverse Engineers’ Processes
21
Oct
Timeless Timing Attacks
13
Oct
Cardpliance
07
Oct
The Industrial Age of Hacking
30
Sep
Datalog Disassembly
16
Sep
Everything Old is New Again
09
Sep
Security Mistakes Developers Make
02
Sep
Agamotto
Trending Tags
bug finding
machine learning
fuzzing
human subjects
x86
web
static analysis
memory allocation
kernel
exploit
Trending Tags
bug finding
machine learning
fuzzing
human subjects
x86
web
static analysis
memory allocation
kernel
exploit