<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/nrxyNeko" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>ThinkstScapes</title>
    <description>The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don&apos;t have to) and then bring this to you in small, digestible chunks.</description>
    <language>en</language>
    <pubDate>Thu, 12 Feb 2026 19:11:22 +0000</pubDate>
    <lastBuildDate>Thu, 12 Feb 2026 19:11:33 +0000</lastBuildDate>
    <image>
      <link>https://thinkst.com/ts.html</link>
      <title>ThinkstScapes</title>
      <url>https://image.simplecastcdn.com/images/e664ac97-a122-4b82-a50c-f9091bb83149/063a09ec-352f-437b-9fbb-4566360922dc/3000x3000/thinkst-scapes-simple-cast.jpg?aid=rss_feed</url>
    </image>
    <link>https://thinkst.com/ts.html</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don&apos;t have to) and then bring this to you in small, digestible chunks.</itunes:summary>
    <itunes:author>Jacob Torrey, research@thinkst.com, haroon meer, marco slaviero</itunes:author>
    <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/e664ac97-a122-4b82-a50c-f9091bb83149/063a09ec-352f-437b-9fbb-4566360922dc/3000x3000/thinkst-scapes-simple-cast.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/nrxyNeko</itunes:new-feed-url>
    <itunes:keywords>cyber-security, cybersecurity, hacking, information security, infosec</itunes:keywords>
    <itunes:owner>
      <itunes:name>Jacob Torrey</itunes:name>
      <itunes:email>jacob@thinkst.com</itunes:email>
    </itunes:owner>
    <itunes:category text="Technology"/>
    <item>
      <guid isPermaLink="false">887ba0a5-f664-4933-bb23-a8b9ceb5a1c1</guid>
      <title>ThinkstScapes Research Roundup - Q4 - 2025</title>
      <description><![CDATA[<h2>Networking beyond plug-and-play</h2><h3>GET /large file HTTP/1.1: Connection-Based TCP Amplification Attacks</h3><p><i>Yepeng Pan, Lars Richter, and Christian Rossow</i></p><p>[<a href="https://cispa.saarland/group/rossow/papers/tcp-amp-acsac25.pdf">Paper</a>] [<a href="https://github.com/acsac2025-tcp-amp/acsac2025_tcp_amp">Code</a>]</p><h3>WAFFLED: Exploiting Parsing Discrepancies to Bypass Web Application Firewalls</h3><p><i>Seyed Ali Akhavani, Bahruz Jabiyev, Ben Kallus, Cem Topcuoglu, Sergey Bratus, and Engin Kirda</i></p><p>[<a href="https://arxiv.org/abs/2503.10846v1">Paper</a>] [<a href="https://github.com/sa-akhavani/waffled">Code</a>]</p><h3>Excuse me, what precise time is it?</h3><p><i>Oliver Ettlin</i></p><p>[<a href="https://www.youtube.com/watch?v=dOt-zRIG5co">Video</a>]</p><h3>Cut To The QUIC: Slashing QUIC's Performance With A Hash DoS</h3><p>Paul Bottinelli</p><p>[<a href="https://i.blackhat.com/BH-EU-25/EU-25-Bottinelli-CutToTheQUIC-Wednesday-Final.pdf">Slides</a>] [<a href="http://github.com/pbottine/quic-hash-collisions">Code</a>]</p><h2>High-impact security at the foundations</h2><h3>Understanding the Security Impact of CHERI on the Operating System Kernel</h3><p><i>Zhaofeng Li, Jerry Zhang, Joshua Tlatelpa-Agustin, Xiangdong Chen, and Anton Burtsev</i></p><p>[<a href="https://github.com/mars-research/cheri-impact-artifact">Code</a>] [<a href="https://mars-research.github.io/doc/2025-cheri-acsac25.pdf">Paper</a>]</p><h3>CUDA de Grâce: Owning AI Cloud Infrastructure with GPU Exploits</h3><p><i>Valentina Palmiotti and Samuel Lovejoy</i></p><p>[<a href="https://www.youtube.com/watch?v=Lvz2_ZHj3lo">Video</a>]</p><h3>Defeating KASLR by Doing Nothing at All</h3><p><i>Seth Jenkins</i></p><p>[<a href="https://projectzero.google/2025/11/defeating-kaslr-by-doing-nothing-at-all.html">Blog post</a>] [<a href="https://project-zero.issues.chromium.org/issues/434208461">Code</a>]</p><h3>Build a Fake Phone, Find Real Bugs: Qualcomm GPU Emulation and Fuzzing with LibAFL QEMU</h3><p><i>Romain Malmain and Scott Bauer</i></p><p>[<a href="https://github.com/rmalmain/39C3-build-a-fake-phone-find-real-bugs">Code</a>] [<a href="https://www.youtube.com/watch?v=kRzF2LXSLgk">Video</a>]</p><h3>Rust in Android: move fast and fix things </h3><p><i>Jeff Vander Stoep</i></p><p>[<a href="https://security.googleblog.com/2025/11/rust-in-android-move-fast-fix-things.html">Blog post</a>] [<a href="https://google.github.io/comprehensive-rust/">Rust course</a>]</p><h3>Skynet Starter Kit: From Embodied AI Jailbreak to Remote Takeover of Humanoid Robots</h3><p><i>Shipei Qu, Zikai Xu, and Xuangan Xiao</i></p><p>[<a href="https://www.youtube.com/watch?v=qjA__5-Bybs">Video</a>]</p><h2>Wins and losses with LLMs and security</h2><h3>Scaling agentic architectures for autonomous security testing and offensive operations</h3><p><i>Jason Garman, Jake Coyne, and Aaron Brown</i></p><p>[<a href="https://drive.google.com/file/d/12KP0QUOdBGLLLQoYQ_0lDD75-1DthHH3/view">Slides</a>] [<a href="https://github.com/westonbrown/Cyber-AutoAgent">Code</a>]</p><h3>Forced Descent: Google Antigravity Persistent Code Execution Vulnerability</h3><p><i>Aaron Portnoy</i></p><p>[<a href="https://mindgard.ai/blog/google-antigravity-persistent-code-execution-vulnerability">Blog post</a>]</p><h3>Flaw And Order: Finding The Needle In The Haystack Of CodeQL Using LLMs</h3><p><i>Simcha Kosman</i></p><p>[<a href="https://i.blackhat.com/BH-EU-25/eu-25-Kosman-Flaw-And-Order-Final.pdf">Slides</a>] [<a href="https://www.cyberark.com/resources/threat-research-blog/vulnhalla-picking-the-true-vulnerabilities-from-the-codeql-haystack">Blog post</a>] [<a href="https://github.com/cyberark/Vulnhalla">Code</a>]</p><h3>Rescuing the Unpoisoned: Efficient Defense against Knowledge Corruption Attacks on RAG Systems</h3><p><i>Kim Minseok, Lee Hankook, and Koo Hyungjoon</i></p><p>[<a href="https://github.com/SecAI-Lab/RAGDefender">Code</a>] [<a href="https://arxiv.org/pdf/2511.01268">Paper</a>]</p><h3>Whisper Leak: A novel side-channel attack on remote language models </h3><p><i>Jonathan Bar Or and Geoff McDonald</i></p><p>[<a href="https://www.microsoft.com/en-us/security/blog/2025/11/07/whisper-leak-a-novel-side-channel-cyberattack-on-remote-language-models/">Blog post</a>] [<a href="https://arxiv.org/abs/2511.03675">Paper</a>] [<a href="http://github.com/yo-yo-yo-jbo/whisper_leak">Code</a>]</p><h2>Nifty sundries</h2><h3>Format-Preserving Compression-Tolerating Authenticated Encryption for Images</h3><p><i>Alexandra Boldyreva, Kaishuo Cheng, and Jehad Hussein</i></p><p>[<a href="https://kaishuocheng.github.io/slides/AC25.pptx">Slides</a>] [<a href="https://link.springer.com/content/pdf/10.1007/978-981-95-5119-4_4.pdf?pdf=inline+link">Paper</a>]</p><h3>Why Quantum Cryptanalysis is Bollocks</h3><p><i>Peter Gutmann</i></p><p>[<a href="https://www.youtube.com/watch?v=xa4Ok7WNFHY">Video</a>] [<a href="https://www.cs.auckland.ac.nz/~pgut001/pubs/bollocks.pdf">Slides</a>]</p><h3>Unmasking Organizations' Security Postures: Insights From Phishing-Resistant Authentication</h3><p><i>Fei Liu</i></p><p>[<a href="https://i.blackhat.com/BH-EU-25/BHEU25-Liu-Unmasking-Security-Postures.pdf">Slides</a>]</p><h3>Those Who Do Not Learn from Advisories Are Doomed to Repeat Them</h3><p><i>Louis Nyffenegger</i></p><p>[<a href="https://www.youtube.com/watch?v=gL1xIK81HqY">Video</a>]</p>
]]></description>
      <pubDate>Thu, 12 Feb 2026 19:11:22 +0000</pubDate>
      <author>jacob@thinkst.com (haroon meer, Marco Slaviero, Jacob Torrey)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<h2>Networking beyond plug-and-play</h2><h3>GET /large file HTTP/1.1: Connection-Based TCP Amplification Attacks</h3><p><i>Yepeng Pan, Lars Richter, and Christian Rossow</i></p><p>[<a href="https://cispa.saarland/group/rossow/papers/tcp-amp-acsac25.pdf">Paper</a>] [<a href="https://github.com/acsac2025-tcp-amp/acsac2025_tcp_amp">Code</a>]</p><h3>WAFFLED: Exploiting Parsing Discrepancies to Bypass Web Application Firewalls</h3><p><i>Seyed Ali Akhavani, Bahruz Jabiyev, Ben Kallus, Cem Topcuoglu, Sergey Bratus, and Engin Kirda</i></p><p>[<a href="https://arxiv.org/abs/2503.10846v1">Paper</a>] [<a href="https://github.com/sa-akhavani/waffled">Code</a>]</p><h3>Excuse me, what precise time is it?</h3><p><i>Oliver Ettlin</i></p><p>[<a href="https://www.youtube.com/watch?v=dOt-zRIG5co">Video</a>]</p><h3>Cut To The QUIC: Slashing QUIC's Performance With A Hash DoS</h3><p>Paul Bottinelli</p><p>[<a href="https://i.blackhat.com/BH-EU-25/EU-25-Bottinelli-CutToTheQUIC-Wednesday-Final.pdf">Slides</a>] [<a href="http://github.com/pbottine/quic-hash-collisions">Code</a>]</p><h2>High-impact security at the foundations</h2><h3>Understanding the Security Impact of CHERI on the Operating System Kernel</h3><p><i>Zhaofeng Li, Jerry Zhang, Joshua Tlatelpa-Agustin, Xiangdong Chen, and Anton Burtsev</i></p><p>[<a href="https://github.com/mars-research/cheri-impact-artifact">Code</a>] [<a href="https://mars-research.github.io/doc/2025-cheri-acsac25.pdf">Paper</a>]</p><h3>CUDA de Grâce: Owning AI Cloud Infrastructure with GPU Exploits</h3><p><i>Valentina Palmiotti and Samuel Lovejoy</i></p><p>[<a href="https://www.youtube.com/watch?v=Lvz2_ZHj3lo">Video</a>]</p><h3>Defeating KASLR by Doing Nothing at All</h3><p><i>Seth Jenkins</i></p><p>[<a href="https://projectzero.google/2025/11/defeating-kaslr-by-doing-nothing-at-all.html">Blog post</a>] [<a href="https://project-zero.issues.chromium.org/issues/434208461">Code</a>]</p><h3>Build a Fake Phone, Find Real Bugs: Qualcomm GPU Emulation and Fuzzing with LibAFL QEMU</h3><p><i>Romain Malmain and Scott Bauer</i></p><p>[<a href="https://github.com/rmalmain/39C3-build-a-fake-phone-find-real-bugs">Code</a>] [<a href="https://www.youtube.com/watch?v=kRzF2LXSLgk">Video</a>]</p><h3>Rust in Android: move fast and fix things </h3><p><i>Jeff Vander Stoep</i></p><p>[<a href="https://security.googleblog.com/2025/11/rust-in-android-move-fast-fix-things.html">Blog post</a>] [<a href="https://google.github.io/comprehensive-rust/">Rust course</a>]</p><h3>Skynet Starter Kit: From Embodied AI Jailbreak to Remote Takeover of Humanoid Robots</h3><p><i>Shipei Qu, Zikai Xu, and Xuangan Xiao</i></p><p>[<a href="https://www.youtube.com/watch?v=qjA__5-Bybs">Video</a>]</p><h2>Wins and losses with LLMs and security</h2><h3>Scaling agentic architectures for autonomous security testing and offensive operations</h3><p><i>Jason Garman, Jake Coyne, and Aaron Brown</i></p><p>[<a href="https://drive.google.com/file/d/12KP0QUOdBGLLLQoYQ_0lDD75-1DthHH3/view">Slides</a>] [<a href="https://github.com/westonbrown/Cyber-AutoAgent">Code</a>]</p><h3>Forced Descent: Google Antigravity Persistent Code Execution Vulnerability</h3><p><i>Aaron Portnoy</i></p><p>[<a href="https://mindgard.ai/blog/google-antigravity-persistent-code-execution-vulnerability">Blog post</a>]</p><h3>Flaw And Order: Finding The Needle In The Haystack Of CodeQL Using LLMs</h3><p><i>Simcha Kosman</i></p><p>[<a href="https://i.blackhat.com/BH-EU-25/eu-25-Kosman-Flaw-And-Order-Final.pdf">Slides</a>] [<a href="https://www.cyberark.com/resources/threat-research-blog/vulnhalla-picking-the-true-vulnerabilities-from-the-codeql-haystack">Blog post</a>] [<a href="https://github.com/cyberark/Vulnhalla">Code</a>]</p><h3>Rescuing the Unpoisoned: Efficient Defense against Knowledge Corruption Attacks on RAG Systems</h3><p><i>Kim Minseok, Lee Hankook, and Koo Hyungjoon</i></p><p>[<a href="https://github.com/SecAI-Lab/RAGDefender">Code</a>] [<a href="https://arxiv.org/pdf/2511.01268">Paper</a>]</p><h3>Whisper Leak: A novel side-channel attack on remote language models </h3><p><i>Jonathan Bar Or and Geoff McDonald</i></p><p>[<a href="https://www.microsoft.com/en-us/security/blog/2025/11/07/whisper-leak-a-novel-side-channel-cyberattack-on-remote-language-models/">Blog post</a>] [<a href="https://arxiv.org/abs/2511.03675">Paper</a>] [<a href="http://github.com/yo-yo-yo-jbo/whisper_leak">Code</a>]</p><h2>Nifty sundries</h2><h3>Format-Preserving Compression-Tolerating Authenticated Encryption for Images</h3><p><i>Alexandra Boldyreva, Kaishuo Cheng, and Jehad Hussein</i></p><p>[<a href="https://kaishuocheng.github.io/slides/AC25.pptx">Slides</a>] [<a href="https://link.springer.com/content/pdf/10.1007/978-981-95-5119-4_4.pdf?pdf=inline+link">Paper</a>]</p><h3>Why Quantum Cryptanalysis is Bollocks</h3><p><i>Peter Gutmann</i></p><p>[<a href="https://www.youtube.com/watch?v=xa4Ok7WNFHY">Video</a>] [<a href="https://www.cs.auckland.ac.nz/~pgut001/pubs/bollocks.pdf">Slides</a>]</p><h3>Unmasking Organizations' Security Postures: Insights From Phishing-Resistant Authentication</h3><p><i>Fei Liu</i></p><p>[<a href="https://i.blackhat.com/BH-EU-25/BHEU25-Liu-Unmasking-Security-Postures.pdf">Slides</a>]</p><h3>Those Who Do Not Learn from Advisories Are Doomed to Repeat Them</h3><p><i>Louis Nyffenegger</i></p><p>[<a href="https://www.youtube.com/watch?v=gL1xIK81HqY">Video</a>]</p>
]]></content:encoded>
      <enclosure length="32076037" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/84c7d22c-b3f0-4514-bc50-3026c45f1535/audio/82b153ac-f632-409d-a8fa-328e4ed14c80/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q4 - 2025</itunes:title>
      <itunes:author>haroon meer, Marco Slaviero, Jacob Torrey</itunes:author>
      <itunes:duration>00:33:24</itunes:duration>
      <itunes:summary>This is episode 18 of Thinkst&apos;s Trends &amp; Takeaways (for Q4 of 2025). A quarterly summary of information security research, talks and presentations. Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter. https://thinkst.com/ts </itunes:summary>
      <itunes:subtitle>This is episode 18 of Thinkst&apos;s Trends &amp; Takeaways (for Q4 of 2025). A quarterly summary of information security research, talks and presentations. Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter. https://thinkst.com/ts </itunes:subtitle>
      <itunes:keywords>information security, canary, security research, infosec, cybersecurity, blue-team, red-team</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a8fe1192-1dcf-499a-b100-fa4942ca053d</guid>
      <title>ThinkstScapes Research Roundup - Q3 - 2025</title>
      <description><![CDATA[<h1>Q3’25 ThinkstScapes</h1><h2>Microsoft-induced security woes</h2><h3>One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens</h3><p><i>Dirk-jan Mollema</i></p><p>[<a href="https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/">Blog post</a>]</p><h3>Turning Microsoft's Login Page into our Phishing Infrastructure</h3><p><i>Keanu Nys</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2033/DEF%20CON%2033%20presentations/Keanu%20Nys%20-%20Turning%20Microsoft%27s%20Login%20Page%20into%20our%20Phishing%20Infrastructure.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=B4pVpByWOcI&pp=0gcJCQYKAYcqIYzv">Video</a>]</p><h3>You snooze you lose: RPC-Racer winning RPC endpoints against services</h3><p><i>Ron Ben Yizhak</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2033/DEF%20CON%2033%20presentations/Ron%20Ben%20Yizhak%20-%20You%20snooze%20you%20lose%20RPC-Racer%20winning%20RPC%20endpoints%20against%20services.pdf">Slides</a>] [<a href="https://github.com/SafeBreach-Labs/RPC-Racer">Code</a>] [<a href="https://www.youtube.com/watch?v=vBz8TBVxwk4">Video</a>]</p><h3>Internal Domain Name Collision 2.0</h3><p><i>Philippe Caturegli</i></p><p>[<a href="https://romhack.io/wp-content/uploads/sites/2/2025/10/RomHack-2025-Internal-Domain-Name-Collision-Philippe-Caturegli.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=yFeYiWqQ6RE">Video</a>]</p><h2>Logs are not always as they appear</h2><h3>Source IP Spoofing in Cloud Logs: A Hands-On Look Across AWS, Azure, and GCP</h3><p><i>Eliav Livneh</i></p><p>[<a href="https://www.youtube.com/live/2UZl85Y4nRo?si=lsvqahghENXsQgHw&t=17061">Video</a>]</p><h3>I'm in Your Logs Now, Deceiving Your Analysts and Blinding Your EDR</h3><p><i>Olaf Hartong</i></p><p>[<a href="https://i.blackhat.com/BH-USA-25/Presentations/Hartong-Im-in-your-logs-now.pdf">Slides</a>] [<a href="https://github.com/olafhartong/BamboozlEDR">Code</a>]</p><h3>From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion</h3><p><i>Shu-Hao Tung</i></p><p>[<a href="http://i.blackhat.com/BH-USA-25/Presentations/USA-25-Tung-From-Spoofing-To-Tunneling-New.pdf">Slides</a>] [<a href="https://i.blackhat.com/BH-USA-25/Presentations/USA-25-Tung-From-Spoofing-To-Tunneling-New-wp.pdf">Paper</a>] [<a href="https://www.youtube.com/watch?v=aS5FszcQeIE">Video</a>]</p><h2>Autobots roll out!</h2><h3>Automating software security with LLMs</h3><p><i>Tyler Nighswander</i></p><p>[<a href="https://theori-io.github.io/aixcc-public/">Site</a>] [<a href="https://github.com/theori-io/aixcc-afc-archive">Code</a>] [<a href="https://www.youtube.com/watch?v=q2zmAXEDDkA">Video</a>]</p><h3>Agents Built From Alloys</h3><p><i>Albert Ziegler</i></p><p>[<a href="https://xbow.com/blog/alloy-agents">Blog post</a>] [<a href="https://drive.google.com/file/d/1lsQbD9_MCWcZQ8MCyWzhixh2GkHD5kCp/view?usp=sharing">Dataset</a>]</p><h3>AI Agents for Offsec with Zero False Positives</h3><p><i>Brendan Dolan-Gavitt</i></p><p>[<a href="https://i.blackhat.com/BH-USA-25/Presentations/US-25-Dolan-Gavitt-AI-Agents-for-Offsec-with-Zero-False-Positives-Thursday.pdf">Slides</a>]</p><h3>Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model</h3><p><i>Xiwen Teoh, Yun Lin, Siqi Li, Ruofan Liu, Avi Sollomoni, Yaniv Harel, and Jin Song Dong</i></p><p>[<a href="https://halligan.pages.dev/">Site</a>] [<a href="https://www.usenix.org/system/files/usenixsecurity25-teoh.pdf">Paper</a>] [<a href="https://zenodo.org/records/15709075">Code</a>]</p><h2>Good vibrations</h2><h3>Invisible Ears at Your Fingertips: Acoustic Eavesdropping via Mouse Sensors</h3><p><i>Mohamad Habib Fakih, Rahul Dharmaji, Youssef Mahmoud, Halima Bouzidi, and Mohammad Abdullah Al Faruque</i></p><p>[<a href="https://sites.google.com/view/mic-e-mouse">Site</a>] [<a href="https://arxiv.org/pdf/2509.13581">Paper</a>]</p><h3>TimeTravel: Real-time Timing Drift Attack on System Time Using Acoustic Waves</h3><p><i>Jianshuo Liu, Hong Li, Haining Wang, Mengjie Sun, Hui Wen, Jinfa Wang, and Limin Sun</i></p><p>[<a href="https://www.usenix.org/system/files/usenixsecurity25-liu-jianshuo.pdf">Paper</a>]</p><h2>Nifty sundries</h2><h3>Crescent library brings privacy to digital identity systems</h3><p><i>Christian Paquin, Guru-Vamsi Policharla, and Greg Zaverucha</i></p><p>[<a href="https://www.microsoft.com/en-us/research/blog/crescent-library-brings-privacy-to-digital-identity-systems/">Blog post</a>] [<a href="https://eprint.iacr.org/2024/2013.pdf">Paper</a>] [<a href="https://github.com/microsoft/crescent-credentials/">Code</a>]</p><h3>Journey to the center of the PSTN: How I became a phone company, and how you can too</h3><p><i>Enzo Damato</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2033/DEF%20CON%2033%20presentations/Enzo%20Damato%20-%20Journey%20to%20the%20center%20of%20the%20PSTN%20How%20I%20became%20a%20phone%20company%2C%20and%20why%20you%20should%20too..pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=cA-ZQJ8EZSs">Video</a>]</p><h3>Safe Harbor or Hostile Waters: Unveiling the Hidden Perils of the TorchScript Engine in PyTorch</h3><p><i>Ji'an Zhou and Lishuo Song</i></p><p>[<a href="https://i.blackhat.com/BH-USA-25/Presentations/US-25-Jian-Lishuo-Safe-Harbor-or-Hostile-Waters.pdf">Slides</a>]</p><h3>Ghosts in the Machine Check – Conjuring Hardware Failures for Cross-ring Privilege Escalation</h3><p><i>Christopher Domas</i></p><p>[<a href="https://i.blackhat.com/BH-USA-25/Presentations/US-25-Domas-Ghosts-in-the-Machine-Check-Wednesday.pdf">Slides</a>] [<a href="https://github.com/xoreaxeaxeax/mchammer">Code</a>] [<a href="https://www.youtube.com/watch?v=B6dC_KVLn6Q">Video</a>]</p><h3>Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents</h3><p><i>Avital Shafran, Roei Schuster, and Vitaly Shmatikov</i></p><p>[<a href="https://www.usenix.org/system/files/usenixsecurity25-shafran.pdf">Paper</a>] [<a href="https://zenodo.org/records/14730889">Code</a>]</p><h3>Inverting the Xorshift128+ random number generator</h3><p><i>Scott Contini</i></p><p>[<a href="https://littlemaninmyhead.wordpress.com/2025/08/31/inverting-the-xorshift128-random-number-generator/">Blog post</a>] [<a href="https://github.com/ScottContini/a_better_xorshift128-inverter">Code</a>]</p>
]]></description>
      <pubDate>Tue, 11 Nov 2025 17:56:25 +0000</pubDate>
      <author>jacob@thinkst.com (Marco Slaviero, Jacob Torrey, haroon meer)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<h1>Q3’25 ThinkstScapes</h1><h2>Microsoft-induced security woes</h2><h3>One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens</h3><p><i>Dirk-jan Mollema</i></p><p>[<a href="https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/">Blog post</a>]</p><h3>Turning Microsoft's Login Page into our Phishing Infrastructure</h3><p><i>Keanu Nys</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2033/DEF%20CON%2033%20presentations/Keanu%20Nys%20-%20Turning%20Microsoft%27s%20Login%20Page%20into%20our%20Phishing%20Infrastructure.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=B4pVpByWOcI&pp=0gcJCQYKAYcqIYzv">Video</a>]</p><h3>You snooze you lose: RPC-Racer winning RPC endpoints against services</h3><p><i>Ron Ben Yizhak</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2033/DEF%20CON%2033%20presentations/Ron%20Ben%20Yizhak%20-%20You%20snooze%20you%20lose%20RPC-Racer%20winning%20RPC%20endpoints%20against%20services.pdf">Slides</a>] [<a href="https://github.com/SafeBreach-Labs/RPC-Racer">Code</a>] [<a href="https://www.youtube.com/watch?v=vBz8TBVxwk4">Video</a>]</p><h3>Internal Domain Name Collision 2.0</h3><p><i>Philippe Caturegli</i></p><p>[<a href="https://romhack.io/wp-content/uploads/sites/2/2025/10/RomHack-2025-Internal-Domain-Name-Collision-Philippe-Caturegli.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=yFeYiWqQ6RE">Video</a>]</p><h2>Logs are not always as they appear</h2><h3>Source IP Spoofing in Cloud Logs: A Hands-On Look Across AWS, Azure, and GCP</h3><p><i>Eliav Livneh</i></p><p>[<a href="https://www.youtube.com/live/2UZl85Y4nRo?si=lsvqahghENXsQgHw&t=17061">Video</a>]</p><h3>I'm in Your Logs Now, Deceiving Your Analysts and Blinding Your EDR</h3><p><i>Olaf Hartong</i></p><p>[<a href="https://i.blackhat.com/BH-USA-25/Presentations/Hartong-Im-in-your-logs-now.pdf">Slides</a>] [<a href="https://github.com/olafhartong/BamboozlEDR">Code</a>]</p><h3>From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion</h3><p><i>Shu-Hao Tung</i></p><p>[<a href="http://i.blackhat.com/BH-USA-25/Presentations/USA-25-Tung-From-Spoofing-To-Tunneling-New.pdf">Slides</a>] [<a href="https://i.blackhat.com/BH-USA-25/Presentations/USA-25-Tung-From-Spoofing-To-Tunneling-New-wp.pdf">Paper</a>] [<a href="https://www.youtube.com/watch?v=aS5FszcQeIE">Video</a>]</p><h2>Autobots roll out!</h2><h3>Automating software security with LLMs</h3><p><i>Tyler Nighswander</i></p><p>[<a href="https://theori-io.github.io/aixcc-public/">Site</a>] [<a href="https://github.com/theori-io/aixcc-afc-archive">Code</a>] [<a href="https://www.youtube.com/watch?v=q2zmAXEDDkA">Video</a>]</p><h3>Agents Built From Alloys</h3><p><i>Albert Ziegler</i></p><p>[<a href="https://xbow.com/blog/alloy-agents">Blog post</a>] [<a href="https://drive.google.com/file/d/1lsQbD9_MCWcZQ8MCyWzhixh2GkHD5kCp/view?usp=sharing">Dataset</a>]</p><h3>AI Agents for Offsec with Zero False Positives</h3><p><i>Brendan Dolan-Gavitt</i></p><p>[<a href="https://i.blackhat.com/BH-USA-25/Presentations/US-25-Dolan-Gavitt-AI-Agents-for-Offsec-with-Zero-False-Positives-Thursday.pdf">Slides</a>]</p><h3>Are CAPTCHAs Still Bot-hard? Generalized Visual CAPTCHA Solving with Agentic Vision Language Model</h3><p><i>Xiwen Teoh, Yun Lin, Siqi Li, Ruofan Liu, Avi Sollomoni, Yaniv Harel, and Jin Song Dong</i></p><p>[<a href="https://halligan.pages.dev/">Site</a>] [<a href="https://www.usenix.org/system/files/usenixsecurity25-teoh.pdf">Paper</a>] [<a href="https://zenodo.org/records/15709075">Code</a>]</p><h2>Good vibrations</h2><h3>Invisible Ears at Your Fingertips: Acoustic Eavesdropping via Mouse Sensors</h3><p><i>Mohamad Habib Fakih, Rahul Dharmaji, Youssef Mahmoud, Halima Bouzidi, and Mohammad Abdullah Al Faruque</i></p><p>[<a href="https://sites.google.com/view/mic-e-mouse">Site</a>] [<a href="https://arxiv.org/pdf/2509.13581">Paper</a>]</p><h3>TimeTravel: Real-time Timing Drift Attack on System Time Using Acoustic Waves</h3><p><i>Jianshuo Liu, Hong Li, Haining Wang, Mengjie Sun, Hui Wen, Jinfa Wang, and Limin Sun</i></p><p>[<a href="https://www.usenix.org/system/files/usenixsecurity25-liu-jianshuo.pdf">Paper</a>]</p><h2>Nifty sundries</h2><h3>Crescent library brings privacy to digital identity systems</h3><p><i>Christian Paquin, Guru-Vamsi Policharla, and Greg Zaverucha</i></p><p>[<a href="https://www.microsoft.com/en-us/research/blog/crescent-library-brings-privacy-to-digital-identity-systems/">Blog post</a>] [<a href="https://eprint.iacr.org/2024/2013.pdf">Paper</a>] [<a href="https://github.com/microsoft/crescent-credentials/">Code</a>]</p><h3>Journey to the center of the PSTN: How I became a phone company, and how you can too</h3><p><i>Enzo Damato</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2033/DEF%20CON%2033%20presentations/Enzo%20Damato%20-%20Journey%20to%20the%20center%20of%20the%20PSTN%20How%20I%20became%20a%20phone%20company%2C%20and%20why%20you%20should%20too..pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=cA-ZQJ8EZSs">Video</a>]</p><h3>Safe Harbor or Hostile Waters: Unveiling the Hidden Perils of the TorchScript Engine in PyTorch</h3><p><i>Ji'an Zhou and Lishuo Song</i></p><p>[<a href="https://i.blackhat.com/BH-USA-25/Presentations/US-25-Jian-Lishuo-Safe-Harbor-or-Hostile-Waters.pdf">Slides</a>]</p><h3>Ghosts in the Machine Check – Conjuring Hardware Failures for Cross-ring Privilege Escalation</h3><p><i>Christopher Domas</i></p><p>[<a href="https://i.blackhat.com/BH-USA-25/Presentations/US-25-Domas-Ghosts-in-the-Machine-Check-Wednesday.pdf">Slides</a>] [<a href="https://github.com/xoreaxeaxeax/mchammer">Code</a>] [<a href="https://www.youtube.com/watch?v=B6dC_KVLn6Q">Video</a>]</p><h3>Machine Against the RAG: Jamming Retrieval-Augmented Generation with Blocker Documents</h3><p><i>Avital Shafran, Roei Schuster, and Vitaly Shmatikov</i></p><p>[<a href="https://www.usenix.org/system/files/usenixsecurity25-shafran.pdf">Paper</a>] [<a href="https://zenodo.org/records/14730889">Code</a>]</p><h3>Inverting the Xorshift128+ random number generator</h3><p><i>Scott Contini</i></p><p>[<a href="https://littlemaninmyhead.wordpress.com/2025/08/31/inverting-the-xorshift128-random-number-generator/">Blog post</a>] [<a href="https://github.com/ScottContini/a_better_xorshift128-inverter">Code</a>]</p>
]]></content:encoded>
      <enclosure length="36731692" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/b5bbe17f-a50b-4a18-9381-77016ebfdbf5/audio/51a691e5-c8a0-42ae-8b68-f5add812a6ff/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q3 - 2025</itunes:title>
      <itunes:author>Marco Slaviero, Jacob Torrey, haroon meer</itunes:author>
      <itunes:duration>00:38:15</itunes:duration>
      <itunes:summary>This is episode 17 of Thinkst&apos;s Trends &amp; Takeaways (for Q3 of 2025). A quarterly summary of information security research, talks and presentations. Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter. https://thinkst.com/ts </itunes:summary>
      <itunes:subtitle>This is episode 17 of Thinkst&apos;s Trends &amp; Takeaways (for Q3 of 2025). A quarterly summary of information security research, talks and presentations. Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter. https://thinkst.com/ts </itunes:subtitle>
      <itunes:keywords>thinkst, security research, thinkstscapes, cybersecurity, cyber, blue-team, red-team, research</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4091f4bd-e911-475b-96b1-20c1537db9b3</guid>
      <title>ThinkstScapes Research Roundup - Q2 - 2025</title>
      <description><![CDATA[<p>ThinkstScapes Q2’25</p><h2>Networking is always tricky</h2><h3>Beyond the Horizon: Uncovering Hosts and Services Behind Misconfigured Firewalls</h3><p><i>Qing Deng, Juefei Pu, Zhaowei Tan, Zhiyun Qian, and Srikanth V. Krishnamurthy</i></p><p>[<a href="https://www.cs.ucr.edu/~zhiyunq/pub/oakland25_firewall_misconfig.pdf">Paper</a>]</p><h3>0.0.0.0 Day: Exploiting Localhost APIs From The Browser</h3><p><i>Avi Lumelsky and Gal Elbaz</i></p><p>[<a href="https://www.oligo.security/blog/0-0-0-0-day-exploiting-localhost-apis-from-the-browser">Blog post</a>] [<a href="https://www.youtube.com/watch?v=Q9CuyEpEbVQ">Video</a>]</p><h3>Local Mess: Covert Web-to-App Tracking via Localhost on Android</h3><p><i>Aniketh Girish, Gunes Acar, Narseo Vallina-Rodriguez, Nipuna Weerasekara, and Tim Vlummens</i></p><p>[<a href="https://localmess.github.io/">Website</a>]</p><h3>Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer</h3><p><i>Niklas Niere, Felix Lange, Juraj Somorovsky, and Robert Merget</i></p><p>[<a href="https://github.com/tls-attacker/Censor-Scanner">Code</a>] [<a href="https://ris.uni-paderborn.de/download/59824/59826/TLS_Obscurity.pdf">Paper</a>]</p><h2>Language models large and small</h2><h3>The road to Top 1: How XBOW did it</h3><p><i>Nico Waisman</i></p><p>[<a href="https://xbow.com/blog/top-1-how-xbow-did-it/">Blog post</a>]</p><h3>AI and Secure Code Generation</h3><p><i>Dave Aitel and Dan Geer</i></p><p>[<a href="https://www.lawfaremedia.org/article/ai-and-secure-code-generation">Blog post</a>]</p><h3>A look at CloudFlare’s AI-coded OAuth library</h3><p><i>Neil Madden</i></p><p>[<a href="https://neilmadden.blog/2025/06/06/a-look-at-cloudflares-ai-coded-oauth-library/">Blog post</a>]</p><h3>How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation</h3><p><i>Sean Heelan</i></p><p>[<a href="https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/">Blog post</a>] [<a href="https://github.com/SeanHeelan/o3_finds_cve-2025-37899">Code</a>]</p><h3>Enhancing Secret Detection in Cybersecurity with Small LMs</h3><p><i>Danny Lazarev and Erez Harush</i></p><p>[<a href="https://www.wiz.io/blog/small-language-model-for-secrets-detection-in-code">Blog post</a>] [<a href="https://www.youtube.com/watch?v=1GIdQE1EuWM">Video</a>]</p><h3>BAIT: Large Language Model Backdoor Scanning by Inverting Attack Target</h3><p><i>Guangyu Shen, Siyuan Cheng, Zhuo Zhang, Guanhong Tao, Kaiyuan Zhang, Hanxi Guo, Lu Yan, Xiaolong Jin, Shengwei An, Shiqing Ma, and Xiangyu Zhang</i></p><p>[<a href="https://github.com/SolidShen/BAIT">Code</a>] [<a href="https://www.cs.purdue.edu/homes/shen447/files/paper/sp25_bait.pdf">Paper</a>]</p><h2>When parsing goes right, and when it goes wrong</h2><h3>3DGen: AI-Assisted Generation of Provably Correct Binary Format Parsers</h3><p><i>Sarah Fakhoury, Markus Kuppe, Shuvendu K. Lahiri, Tahina Ramananandro, and Nikhil Swamy</i></p><p>[<a href="https://langsechq.gitlab.io/spw25/papers/ramananandro-invited-talk.pdf">Slides</a>] [<a href="https://arxiv.org/pdf/2404.10362">Paper</a>]</p><h3>GDBMiner: Mining Precise Input Grammars on (Almost) Any System</h3><p><i>Max Eisele, Johannes Hägele, Christopher Huth, and Andreas Zeller</i></p><p>[<a href="https://drops.dagstuhl.de/entities/document/10.4230/LITES.10.1.1">Paper</a>] [<a href="https://github.com/boschresearch/gdbminer">Code</a>]</p><h3>Parser Differentials: When Interpretation Becomes a Vulnerability</h3><p><i>Joernchen / Joern Schneeweisz</i></p><p>[<a href="https://0day.click/parser-diff-talk-oc25/">Slides</a>] [<a href="https://www.youtube.com/watch?v=Dq_KVLXzxH8">Video</a>]</p><h3>Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors</h3><p><i>Jiahe Zhang, Jianjun Chen, Qi Wang, Hangyu Zhang, Shengqiang Li, Chuhan Wang, Jianwei Zhuge, and Haixin Duan</i></p><p>[<a href="https://i.blackhat.com/Asia-25/Asia-25-Zhang-Inbox-Invasion-Exploiting-MIME-Ambiguities.pdf">Slides</a>] [<a href="https://eki.im/publication/mimeminer-paper/mimeminer-paper.pdf">Paper</a>] [<a href="https://github.com/MIME-miner/MIMEminer">Code</a>]</p><h2>Nifty sundries</h2><h3>Impostor Syndrome: Hacking Apple MDMs Using Rogue Device Enrolments</h3><p><i>Marcell Molnár and Magdalena Oczadły</i></p><p>[<a href="https://i.blackhat.com/Asia-25/Asia-25-Molnar-Impostor-Syndrome-Hacking-Apple-MDMs.pdf">Slides</a>] </p><h3>Your Cable, My Antenna: Eavesdropping Serial Communication via Backscatter Signals</h3><p><i>Lina Pu, Yu Luo, Song Han, and Junming Diao</i></p><p>[<a href="https://www.computer.org/csdl/proceedings-article/sp/2025/223600d710/26EkH5QQ1Ko">Paper</a>]</p><h3>GoSonar: Detecting Logical Vulnerabilities in Memory Safe Language Using Inductive Constraint Reasoning</h3><p><i>Md Sakib Anwar, Carter Yagemann, and Zhiqiang Lin</i></p><p>[<a href="https://www.computer.org/csdl/proceedings-article/sp/2025/223600a043/21B7QweuVUs">Paper</a>] [<a href="https://github.com/mdsakibanwar/gosonar">Code</a>]</p><h3>Show Me Your ID(E)!: How APTs Abuse IDEs</h3><p><i>Tom Fakterman and Daniel Frank</i></p><p>[<a href="https://static.rainfocus.com/rsac/us25/sess/1727366815392001bIC6/finalwebsite/2025_USA25_HT-M01_01_Show_Me_Your_ID%28E%29_How_APTs_Abuse_IDEs_1745448278421001Kcgl.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=lkiI8VGR7Vc">Video</a>]</p><h3>Inviter Threat: Managing Security in a new Cloud Deployment Model</h3><p><i>Meg Ashby</i></p><p>[<a href="https://www.youtube.com/watch?v=ilnOvSV0QtY">Video</a>]</p><h3>Carrier Tokens—A Game-Changer Towards SMS OTP Free World!</h3><p><i>Kazi Wali Ullah</i></p><p>[<a href="https://static.rainfocus.com/rsac/us25/sess/1727347141252001LtRC/finalwebsite/2025_USA25_IDY-M06_01_Carrier-Tokens-a-Game-Changer-Towards-SMS-OTP-Free-World_1744928556459001Cibw.pdf">Slides</a>] [<a href="https://github.com/camaraproject/NumberVerification">Code</a>] [<a href="https://www.youtube.com/watch?v=cCp3O6q4oqg">Video</a>]</p>
]]></description>
      <pubDate>Mon, 4 Aug 2025 06:00:00 +0000</pubDate>
      <author>jacob@thinkst.com (Marco Slaviero, haroon meer, Jacob Torrey)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<p>ThinkstScapes Q2’25</p><h2>Networking is always tricky</h2><h3>Beyond the Horizon: Uncovering Hosts and Services Behind Misconfigured Firewalls</h3><p><i>Qing Deng, Juefei Pu, Zhaowei Tan, Zhiyun Qian, and Srikanth V. Krishnamurthy</i></p><p>[<a href="https://www.cs.ucr.edu/~zhiyunq/pub/oakland25_firewall_misconfig.pdf">Paper</a>]</p><h3>0.0.0.0 Day: Exploiting Localhost APIs From The Browser</h3><p><i>Avi Lumelsky and Gal Elbaz</i></p><p>[<a href="https://www.oligo.security/blog/0-0-0-0-day-exploiting-localhost-apis-from-the-browser">Blog post</a>] [<a href="https://www.youtube.com/watch?v=Q9CuyEpEbVQ">Video</a>]</p><h3>Local Mess: Covert Web-to-App Tracking via Localhost on Android</h3><p><i>Aniketh Girish, Gunes Acar, Narseo Vallina-Rodriguez, Nipuna Weerasekara, and Tim Vlummens</i></p><p>[<a href="https://localmess.github.io/">Website</a>]</p><h3>Transport Layer Obscurity: Circumventing SNI Censorship on the TLS-Layer</h3><p><i>Niklas Niere, Felix Lange, Juraj Somorovsky, and Robert Merget</i></p><p>[<a href="https://github.com/tls-attacker/Censor-Scanner">Code</a>] [<a href="https://ris.uni-paderborn.de/download/59824/59826/TLS_Obscurity.pdf">Paper</a>]</p><h2>Language models large and small</h2><h3>The road to Top 1: How XBOW did it</h3><p><i>Nico Waisman</i></p><p>[<a href="https://xbow.com/blog/top-1-how-xbow-did-it/">Blog post</a>]</p><h3>AI and Secure Code Generation</h3><p><i>Dave Aitel and Dan Geer</i></p><p>[<a href="https://www.lawfaremedia.org/article/ai-and-secure-code-generation">Blog post</a>]</p><h3>A look at CloudFlare’s AI-coded OAuth library</h3><p><i>Neil Madden</i></p><p>[<a href="https://neilmadden.blog/2025/06/06/a-look-at-cloudflares-ai-coded-oauth-library/">Blog post</a>]</p><h3>How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation</h3><p><i>Sean Heelan</i></p><p>[<a href="https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/">Blog post</a>] [<a href="https://github.com/SeanHeelan/o3_finds_cve-2025-37899">Code</a>]</p><h3>Enhancing Secret Detection in Cybersecurity with Small LMs</h3><p><i>Danny Lazarev and Erez Harush</i></p><p>[<a href="https://www.wiz.io/blog/small-language-model-for-secrets-detection-in-code">Blog post</a>] [<a href="https://www.youtube.com/watch?v=1GIdQE1EuWM">Video</a>]</p><h3>BAIT: Large Language Model Backdoor Scanning by Inverting Attack Target</h3><p><i>Guangyu Shen, Siyuan Cheng, Zhuo Zhang, Guanhong Tao, Kaiyuan Zhang, Hanxi Guo, Lu Yan, Xiaolong Jin, Shengwei An, Shiqing Ma, and Xiangyu Zhang</i></p><p>[<a href="https://github.com/SolidShen/BAIT">Code</a>] [<a href="https://www.cs.purdue.edu/homes/shen447/files/paper/sp25_bait.pdf">Paper</a>]</p><h2>When parsing goes right, and when it goes wrong</h2><h3>3DGen: AI-Assisted Generation of Provably Correct Binary Format Parsers</h3><p><i>Sarah Fakhoury, Markus Kuppe, Shuvendu K. Lahiri, Tahina Ramananandro, and Nikhil Swamy</i></p><p>[<a href="https://langsechq.gitlab.io/spw25/papers/ramananandro-invited-talk.pdf">Slides</a>] [<a href="https://arxiv.org/pdf/2404.10362">Paper</a>]</p><h3>GDBMiner: Mining Precise Input Grammars on (Almost) Any System</h3><p><i>Max Eisele, Johannes Hägele, Christopher Huth, and Andreas Zeller</i></p><p>[<a href="https://drops.dagstuhl.de/entities/document/10.4230/LITES.10.1.1">Paper</a>] [<a href="https://github.com/boschresearch/gdbminer">Code</a>]</p><h3>Parser Differentials: When Interpretation Becomes a Vulnerability</h3><p><i>Joernchen / Joern Schneeweisz</i></p><p>[<a href="https://0day.click/parser-diff-talk-oc25/">Slides</a>] [<a href="https://www.youtube.com/watch?v=Dq_KVLXzxH8">Video</a>]</p><h3>Inbox Invasion: Exploiting MIME Ambiguities to Evade Email Attachment Detectors</h3><p><i>Jiahe Zhang, Jianjun Chen, Qi Wang, Hangyu Zhang, Shengqiang Li, Chuhan Wang, Jianwei Zhuge, and Haixin Duan</i></p><p>[<a href="https://i.blackhat.com/Asia-25/Asia-25-Zhang-Inbox-Invasion-Exploiting-MIME-Ambiguities.pdf">Slides</a>] [<a href="https://eki.im/publication/mimeminer-paper/mimeminer-paper.pdf">Paper</a>] [<a href="https://github.com/MIME-miner/MIMEminer">Code</a>]</p><h2>Nifty sundries</h2><h3>Impostor Syndrome: Hacking Apple MDMs Using Rogue Device Enrolments</h3><p><i>Marcell Molnár and Magdalena Oczadły</i></p><p>[<a href="https://i.blackhat.com/Asia-25/Asia-25-Molnar-Impostor-Syndrome-Hacking-Apple-MDMs.pdf">Slides</a>] </p><h3>Your Cable, My Antenna: Eavesdropping Serial Communication via Backscatter Signals</h3><p><i>Lina Pu, Yu Luo, Song Han, and Junming Diao</i></p><p>[<a href="https://www.computer.org/csdl/proceedings-article/sp/2025/223600d710/26EkH5QQ1Ko">Paper</a>]</p><h3>GoSonar: Detecting Logical Vulnerabilities in Memory Safe Language Using Inductive Constraint Reasoning</h3><p><i>Md Sakib Anwar, Carter Yagemann, and Zhiqiang Lin</i></p><p>[<a href="https://www.computer.org/csdl/proceedings-article/sp/2025/223600a043/21B7QweuVUs">Paper</a>] [<a href="https://github.com/mdsakibanwar/gosonar">Code</a>]</p><h3>Show Me Your ID(E)!: How APTs Abuse IDEs</h3><p><i>Tom Fakterman and Daniel Frank</i></p><p>[<a href="https://static.rainfocus.com/rsac/us25/sess/1727366815392001bIC6/finalwebsite/2025_USA25_HT-M01_01_Show_Me_Your_ID%28E%29_How_APTs_Abuse_IDEs_1745448278421001Kcgl.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=lkiI8VGR7Vc">Video</a>]</p><h3>Inviter Threat: Managing Security in a new Cloud Deployment Model</h3><p><i>Meg Ashby</i></p><p>[<a href="https://www.youtube.com/watch?v=ilnOvSV0QtY">Video</a>]</p><h3>Carrier Tokens—A Game-Changer Towards SMS OTP Free World!</h3><p><i>Kazi Wali Ullah</i></p><p>[<a href="https://static.rainfocus.com/rsac/us25/sess/1727347141252001LtRC/finalwebsite/2025_USA25_IDY-M06_01_Carrier-Tokens-a-Game-Changer-Towards-SMS-OTP-Free-World_1744928556459001Cibw.pdf">Slides</a>] [<a href="https://github.com/camaraproject/NumberVerification">Code</a>] [<a href="https://www.youtube.com/watch?v=cCp3O6q4oqg">Video</a>]</p>
]]></content:encoded>
      <enclosure length="33401291" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/151e4d13-5ad9-4a99-8fd7-66d0cc0ee595/audio/890ab4ea-3ab4-4f5b-b4ae-f84a1973f317/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q2 - 2025</itunes:title>
      <itunes:author>Marco Slaviero, haroon meer, Jacob Torrey</itunes:author>
      <itunes:duration>00:34:47</itunes:duration>
      <itunes:summary>This is episode 16 of Thinkst&apos;s Trends &amp; Takeaways (for Q2 of 2025). A quarterly summary of information security research, talks and presentations. Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter. https://thinkst.com/ts </itunes:summary>
      <itunes:subtitle>This is episode 16 of Thinkst&apos;s Trends &amp; Takeaways (for Q2 of 2025). A quarterly summary of information security research, talks and presentations. Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter. https://thinkst.com/ts </itunes:subtitle>
      <itunes:keywords>thinkst, deception, canary, thinkstscapes, infosec, cybersecurity, blue-team, red-team, research, netsec</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">102914ff-a019-4001-96e1-25a6e75d26ae</guid>
      <title>ThinkstScapes Research Roundup - Q1 - 2025</title>
      <description><![CDATA[<h1>ThinkstScapes Q1’25</h1><h2>Putting it into practice</h2><h3>Homomorphic Encryption across Apple features</h3><p><i>Rehan Rishi, Haris Mughees, Fabian Boemer, Karl Tarbe, Nicholas Genise, Akshay Wadia, and Ruiyu Zhu</i></p><p>[<a href="https://github.com/apple/swift-homomorphic-encryption">Code</a>] [<a href="https://arxiv.org/abs/2406.06761">Paper</a>] [<a href="https://www.youtube.com/live/R1NEfuv3iMk?si=ORdgievrYHTfoGvn&t=17061">Video</a>]</p><h3>Beyond the Hook: A Technical Deep Dive into Modern Phishing Methodologies</h3><p><i>Alexandre Nesic</i></p><p>[<a href="https://blog.quarkslab.com/technical-dive-into-modern-phishing.html">Blog</a>] </p><h3>How to Backdoor Large Language Models</h3><p><i>Shrivu Shankar</i></p><p>[<a href="https://blog.sshh.io/p/how-to-backdoor-large-language-models">Blog</a>] [<a href="https://huggingface.co/sshh12/badseek-v2/tree/main">Code</a>] </p><h3>Buccaneers of the Binary: Plundering Compiler Optimizations for Decompilation Treasure</h3><p><i>Zion Leonahenahe Basque</i></p><p>[<a href="https://github.com/angr/angr-management">Code</a>] [<a href="https://www.youtube.com/watch?v=VP29biKLoSw">Video</a>]</p><h3>Software Screws Around, Reverse Engineering Finds Out: How Independent, Adversarial Research Informs Government Regulation</h3><p><i>Andy Sellars and Michael A. Specter</i></p><p>[<a href="https://youtu.be/wXbnUm88IJw?list=PLnKSfJ5rXw95HSPVl5L7dqhKpVAx3q_j0&t=11045">Video</a>] [<a href="https://ftcreverse.engineering/#">Website</a>]</p><h2>Understanding things all the way down</h2><h3>PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR</h3><p><i>Zizhi Jin, Qinhong Jiang, Xuancun Lu, Chen Yan, Xiaoyu Ji, and Wenyuan Xu</i></p><p>[<a href="https://arxiv.org/pdf/2409.17907v1">Paper</a>] [<a href="https://sites.google.com/view/phantomlidar">Demo Videos</a>]</p><h3>Full-stack Reverse Engineering of the Original Microsoft Xbox</h3><p><i>Markus Gaasedelen</i></p><p>[<a href="https://www.youtube.com/watch?v=hGlIkgmhZvc">Video</a>]</p><h3>Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China</h3><p><i>Shencha Fan, Jackson Sippe, Sakamoto San, Jade Sheffey, David Fifield, Amir Houmansadr, Elson Wedwards, and Eric Wustrow</i></p><p>[<a href="https://www.ndss-symposium.org/wp-content/uploads/2025-237-paper.pdf">Paper</a>]</p><h2>Scaling software (in)security</h2><h3>Low-Effort Denial of Service with Recursion</h3><p><i>Alexis Challande and Brad Swain</i></p><p>[<a href="https://resources.trailofbits.com/input-driven-recursion-white-paper">Paper</a>] [<a href="https://www.youtube.com/watch?v=7DKwB-jCLvU">Video</a>]</p><h3>Is this memory safety here in the room with us?</h3><p><i>Thomas Dullien (Halvar Flake)</i></p><p>[<a href="https://docs.google.com/presentation/d/1-CgBbVuFE1pJnB84wfeq_RadXQs13dCvHTFFVLPYTeg/edit?usp=sharing">Slides</a>] [<a href="https://www.youtube.com/watch?v=4pHZg8bKvmU">Video</a>]</p><h3>How to gain code execution on millions of people and hundreds of popular apps</h3><p><i>Eva</i></p><p>[<a href="https://kibty.town/blog/todesktop/">Blog</a>]</p><h3>Node is a loader</h3><p><i>Tom Steele</i></p><p>[<a href="https://www.atredis.com/blog/2025/3/7/node-is-a-loader">Blog</a>]</p><h3>Mixing up Public and Private Keys in OpenID Connect deployments</h3><p><i>Hanno Böck</i></p><p>[<a href="https://blog.hboeck.de/archives/909-Mixing-up-Public-and-Private-Keys-in-OpenID-Connect-deployments.html">Blog</a>] [<a href="https://github.com/badkeys/badkeys">Code</a>]</p><h2>Nifty sundries</h2><h3>Will It Run? Fooling EDRs With Command Lines Using Empirical Data</h3><p><i>Wietze Beukema</i></p><p>[<a href="https://argfuscator.net/">Tool site</a>] [<a href="https://www.github.com/wietze/Invoke-ArgFuscator">Code</a>] [<a href="https://www.youtube.com/watch?v=CNeUwrapJiQ">Video</a>]</p><h3>Homoglyph-Based Attacks: Circumventing LLM Detectors</h3><p><i>Aldan Creo</i></p><p>[<a href="https://arxiv.org/abs/2406.11239">Paper</a>] [<a href="https://github.com/ACMCMC/silverspeak">Code</a>] [<a href="https://www.youtube.com/watch?v=F2RGYKKoqp0">Video</a>]</p><h3>28 Months Later - The Ongoing Evolution of Russia's Cyber Operations</h3><p><i>The Grugq</i></p><p>[<a href="https://strapi.ootb.net/uploads/28_months_later_final_1357291282.pdf">Slides</a>] [<a href="https://youtu.be/3w7E4Hhtubw?t=3791">Podcast interview</a>]</p><h3>‘It's Not Paranoia If They're Really After You’: When Announcing Deception Technology Can Change Attacker Decisions</h3><p><i>Andrew Reeves and Debi Ashenden</i></p><p>[<a href="https://scholarspace.manoa.hawaii.edu/server/api/core/bitstreams/6c188375-03f6-4d66-afee-296308c9f2c0/content">Paper</a>]</p><h3>Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack</h3><p><i>Ziqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ganqiu Du, Ke Xu, and Jianping Wu</i></p><p>[<a href="https://arxiv.org/pdf/2402.12716">Paper</a>] [<a href="https://github.com/Internet-Architecture-and-Security/Packet-Size-Side-Channel-Attack">Code</a>]</p>
]]></description>
      <pubDate>Wed, 30 Apr 2025 15:37:36 +0000</pubDate>
      <author>jacob@thinkst.com (haroon meer, Jacob Torrey)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<h1>ThinkstScapes Q1’25</h1><h2>Putting it into practice</h2><h3>Homomorphic Encryption across Apple features</h3><p><i>Rehan Rishi, Haris Mughees, Fabian Boemer, Karl Tarbe, Nicholas Genise, Akshay Wadia, and Ruiyu Zhu</i></p><p>[<a href="https://github.com/apple/swift-homomorphic-encryption">Code</a>] [<a href="https://arxiv.org/abs/2406.06761">Paper</a>] [<a href="https://www.youtube.com/live/R1NEfuv3iMk?si=ORdgievrYHTfoGvn&t=17061">Video</a>]</p><h3>Beyond the Hook: A Technical Deep Dive into Modern Phishing Methodologies</h3><p><i>Alexandre Nesic</i></p><p>[<a href="https://blog.quarkslab.com/technical-dive-into-modern-phishing.html">Blog</a>] </p><h3>How to Backdoor Large Language Models</h3><p><i>Shrivu Shankar</i></p><p>[<a href="https://blog.sshh.io/p/how-to-backdoor-large-language-models">Blog</a>] [<a href="https://huggingface.co/sshh12/badseek-v2/tree/main">Code</a>] </p><h3>Buccaneers of the Binary: Plundering Compiler Optimizations for Decompilation Treasure</h3><p><i>Zion Leonahenahe Basque</i></p><p>[<a href="https://github.com/angr/angr-management">Code</a>] [<a href="https://www.youtube.com/watch?v=VP29biKLoSw">Video</a>]</p><h3>Software Screws Around, Reverse Engineering Finds Out: How Independent, Adversarial Research Informs Government Regulation</h3><p><i>Andy Sellars and Michael A. Specter</i></p><p>[<a href="https://youtu.be/wXbnUm88IJw?list=PLnKSfJ5rXw95HSPVl5L7dqhKpVAx3q_j0&t=11045">Video</a>] [<a href="https://ftcreverse.engineering/#">Website</a>]</p><h2>Understanding things all the way down</h2><h3>PhantomLiDAR: Cross-modality Signal Injection Attacks against LiDAR</h3><p><i>Zizhi Jin, Qinhong Jiang, Xuancun Lu, Chen Yan, Xiaoyu Ji, and Wenyuan Xu</i></p><p>[<a href="https://arxiv.org/pdf/2409.17907v1">Paper</a>] [<a href="https://sites.google.com/view/phantomlidar">Demo Videos</a>]</p><h3>Full-stack Reverse Engineering of the Original Microsoft Xbox</h3><p><i>Markus Gaasedelen</i></p><p>[<a href="https://www.youtube.com/watch?v=hGlIkgmhZvc">Video</a>]</p><h3>Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China</h3><p><i>Shencha Fan, Jackson Sippe, Sakamoto San, Jade Sheffey, David Fifield, Amir Houmansadr, Elson Wedwards, and Eric Wustrow</i></p><p>[<a href="https://www.ndss-symposium.org/wp-content/uploads/2025-237-paper.pdf">Paper</a>]</p><h2>Scaling software (in)security</h2><h3>Low-Effort Denial of Service with Recursion</h3><p><i>Alexis Challande and Brad Swain</i></p><p>[<a href="https://resources.trailofbits.com/input-driven-recursion-white-paper">Paper</a>] [<a href="https://www.youtube.com/watch?v=7DKwB-jCLvU">Video</a>]</p><h3>Is this memory safety here in the room with us?</h3><p><i>Thomas Dullien (Halvar Flake)</i></p><p>[<a href="https://docs.google.com/presentation/d/1-CgBbVuFE1pJnB84wfeq_RadXQs13dCvHTFFVLPYTeg/edit?usp=sharing">Slides</a>] [<a href="https://www.youtube.com/watch?v=4pHZg8bKvmU">Video</a>]</p><h3>How to gain code execution on millions of people and hundreds of popular apps</h3><p><i>Eva</i></p><p>[<a href="https://kibty.town/blog/todesktop/">Blog</a>]</p><h3>Node is a loader</h3><p><i>Tom Steele</i></p><p>[<a href="https://www.atredis.com/blog/2025/3/7/node-is-a-loader">Blog</a>]</p><h3>Mixing up Public and Private Keys in OpenID Connect deployments</h3><p><i>Hanno Böck</i></p><p>[<a href="https://blog.hboeck.de/archives/909-Mixing-up-Public-and-Private-Keys-in-OpenID-Connect-deployments.html">Blog</a>] [<a href="https://github.com/badkeys/badkeys">Code</a>]</p><h2>Nifty sundries</h2><h3>Will It Run? Fooling EDRs With Command Lines Using Empirical Data</h3><p><i>Wietze Beukema</i></p><p>[<a href="https://argfuscator.net/">Tool site</a>] [<a href="https://www.github.com/wietze/Invoke-ArgFuscator">Code</a>] [<a href="https://www.youtube.com/watch?v=CNeUwrapJiQ">Video</a>]</p><h3>Homoglyph-Based Attacks: Circumventing LLM Detectors</h3><p><i>Aldan Creo</i></p><p>[<a href="https://arxiv.org/abs/2406.11239">Paper</a>] [<a href="https://github.com/ACMCMC/silverspeak">Code</a>] [<a href="https://www.youtube.com/watch?v=F2RGYKKoqp0">Video</a>]</p><h3>28 Months Later - The Ongoing Evolution of Russia's Cyber Operations</h3><p><i>The Grugq</i></p><p>[<a href="https://strapi.ootb.net/uploads/28_months_later_final_1357291282.pdf">Slides</a>] [<a href="https://youtu.be/3w7E4Hhtubw?t=3791">Podcast interview</a>]</p><h3>‘It's Not Paranoia If They're Really After You’: When Announcing Deception Technology Can Change Attacker Decisions</h3><p><i>Andrew Reeves and Debi Ashenden</i></p><p>[<a href="https://scholarspace.manoa.hawaii.edu/server/api/core/bitstreams/6c188375-03f6-4d66-afee-296308c9f2c0/content">Paper</a>]</p><h3>Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack</h3><p><i>Ziqiang Wang, Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, Mengyuan Li, Ganqiu Du, Ke Xu, and Jianping Wu</i></p><p>[<a href="https://arxiv.org/pdf/2402.12716">Paper</a>] [<a href="https://github.com/Internet-Architecture-and-Security/Packet-Size-Side-Channel-Attack">Code</a>]</p>
]]></content:encoded>
      <enclosure length="28749082" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/98d3d667-2639-4776-a00d-b30562a98bc5/audio/6f4b6412-2285-46c8-bfaa-5848471edcbb/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q1 - 2025</itunes:title>
      <itunes:author>haroon meer, Jacob Torrey</itunes:author>
      <itunes:duration>00:29:56</itunes:duration>
      <itunes:summary>This is episode 15 of Thinkst&apos;s Trends &amp; Takeaways (for Q1 of 2025). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts   </itunes:summary>
      <itunes:subtitle>This is episode 15 of Thinkst&apos;s Trends &amp; Takeaways (for Q1 of 2025). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts   </itunes:subtitle>
      <itunes:keywords>information security, canary, security research, infosec, cybersecurity, technology, blue-team, red-team, research, netsec</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6e5ba250-dec7-44f2-aa98-66b85743c820</guid>
      <title>ThinkstScapes Research Roundup - Q4 - 2024</title>
      <description><![CDATA[<p>ThinkstScapes Q4’24</p><h2>Wins and losses in the Microsoft ecosystem</h2><h3>Pointer Problems - Why We’re Refactoring the Windows Kernel</h3><p><i>Joe Bialek</i></p><p>[<a href="https://www.youtube.com/watch?v=-3jxVIFGuQw">Video</a>]</p><h3>Defending off the land</h3><p><i>Casey Smith, Jacob Torrey, and Marco Slaviero</i></p><p>[<a href="https://github.com/thinkst/defending-off-the-land/blob/main/slides/BHEU24-TorreySlaviero.pdf">Slides</a>] [<a href="https://github.com/thinkst/defending-off-the-land">Code</a>]</p><h3>Unveiling the Power of Intune: Leveraging Intune for Breaking Into Your Cloud and On-Premise</h3><p><i>Yuya Chudo</i></p><p>[<a href="http://i.blackhat.com/EU-24/Presentations/EU-24-Chudo-Unveiling-the-Power-of-Intune-Leveraging-Intune-for-Breaking-Into-Your-Cloud-and-On-Premise.pdf">Slides</a>] [<a href="https://github.com/secureworks/pytune">Code</a>]</p><h3>From Simulation to Tenant Takeover</h3><p><i>Vaisha Bernard</i></p><p>[<a href="https://media.ccc.de/v/38c3-from-simulation-to-tenant-takeover">Video</a>]</p><h3>From Convenience to Contagion: The Libarchive Vulnerabilities Lurking in Windows 11</h3><p><i>NiNi Chen</i></p><p>[<a href="https://hitcon.org/2024/CMT/slides/From_Convenience_to_Contagion_The_Libarchive_Vulnerabilities_Lurking_in_Windows_11.pdf">Slides</a>] [<a href="https://media.ccc.de/v/38c3-from-convenience-to-contagion-the-libarchive-vulnerabilities-lurking-in-windows-11">Video</a>]</p><h2>LLM hype continues, as do the security issues</h2><h3>Things we learned about LLMs in 2024</h3><p><i>Simon Willison</i></p><p>[<a href="https://simonwillison.net/2024/Dec/31/llms-in-2024/">Blog</a>]</p><h3>AI Meets Git: Unmasking Security Flaws in Qodo Merge</h3><p><i>Nils Amiet</i></p><p>[<a href="https://fahrplan.events.ccc.de/congress/2024/fahrplan/media/38c3/submissions/XXXSWE/resources/qodo-merge-38c3-slides_b7maUtc.pdf">Slides</a>] [<a href="https://media.ccc.de/v/38c3-ai-meets-git-unmasking-security-flaws-in-qodo-merge">Video</a>] [<a href="https://research.kudelskisecurity.com/2024/08/29/careful-where-you-code-multiple-vulnerabilities-in-ai-powered-pr-agent/">Blog</a>]</p><h3>Suicide Bot: New AI Attack Causes LLM to Provide Potential “Self-Harm” Instructions</h3><p><i>Gadi Evron</i></p><p>[<a href="https://www.knostic.ai/blog/introducing-a-new-class-of-ai-attacks-flowbreaking">Blog</a>]</p><h2>Diving deep, then diving deeper</h2><h3>Breaking NATO Radio Encryption</h3><p><i>Lukas Stennes</i></p><p>[<a href="https://eprint.iacr.org/2023/1314.pdf">Paper</a>] [<a href="https://media.ccc.de/v/38c3-breaking-nato-radio-encryption">Video</a>]</p><h3>Exploiting File Writes in Hardened Environments</h3><p><i>Stefan Schiller</i></p><p>[<a href="https://www.sonarsource.com/blog/why-code-security-matters-even-in-hardened-environments/">Blog</a>] [<a href="https://www.youtube.com/watch?v=ltmZNTP2KX4">Video</a>]</p><h3>Hacking yourself a satellite - recovering BEESAT-1</h3><p><i>PistonMiner</i></p><p>[<a href="https://media.ccc.de/v/38c3-hacking-yourself-a-satellite-recovering-beesat-1">Video</a>]</p><h3>IRIS: Non-Destructive Inspection of Silicon</h3><p><i>Andrew 'bunnie' Huang</i></p><p>[<a href="https://www.bunniestudios.com/blog/2023/infra-red-in-situ-iris-inspection-of-silicon/">Blog</a>] [<a href="https://arxiv.org/pdf/2303.07406">Paper</a>] [<a href="https://media.ccc.de/v/38c3-iris-non-destructive-inspection-of-silicon">Video</a>]</p><h3>SQL Injection Isn't Dead</h3><p><i>Paul Gerste</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Paul%20Gerste%20-%20SQL%20Injection%20Isn%27t%20Dead%20Smuggling%20Queries%20at%20the%20Protocol%20Level.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=N1FAOb1krBk">Video</a>]</p><h2>Nifty sundries</h2><h3>What Developers Get for Free?</h3><p><i>Louis Nyffenegger</i></p><p>[<a href="https://www.youtube.com/watch?v=8HSXgbSbkCA">Video</a>]</p><h3>Dialing into the Past: RCE via the Fax Machine – Because Why Not?</h3><p><i>Rick de Jager and Carlo Meijer</i></p><p>[<a href="https://www.youtube.com/watch?v=ZcV3esnIDF4">Video</a>]</p><h3>Broken isolation - Draining your Credentials from Popular macOS Password Managers</h3><p><i>Wojciech Reguła</i></p><p>[<a href="https://objectivebythesea.org/v7/talks/OBTS_v7_wRegula.pdf">Slides</a>] [<a href="https://youtu.be/DqYyw2WjQPc">Video</a>]</p><h3>I'll Be There for You! Perpetual Availability in the A8 MVX System</h3><p><i>André Rösti, Stijn Volckaert, Michael Franz, and Alexios Voulimeneas</i></p><p>[<a href="https://github.com/andrej/a8">Code</a>] [<a href="https://alexios-voulimeneas.github.io/papers/a8acsac2024.pdf">Paper</a>]</p><h3>Exploring and Exploiting an Android “Smart POS” Payment Terminal</h3><p><i>Jacopo Jannone</i></p><p>[<a href="https://www.youtube.com/watch?v=a9BFGlxP71Y">Video</a>]</p>
]]></description>
      <pubDate>Thu, 20 Feb 2025 12:34:43 +0000</pubDate>
      <author>jacob@thinkst.com (Jacob Torrey, Casey Smith, haroon meer, Marco Slaviero)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<p>ThinkstScapes Q4’24</p><h2>Wins and losses in the Microsoft ecosystem</h2><h3>Pointer Problems - Why We’re Refactoring the Windows Kernel</h3><p><i>Joe Bialek</i></p><p>[<a href="https://www.youtube.com/watch?v=-3jxVIFGuQw">Video</a>]</p><h3>Defending off the land</h3><p><i>Casey Smith, Jacob Torrey, and Marco Slaviero</i></p><p>[<a href="https://github.com/thinkst/defending-off-the-land/blob/main/slides/BHEU24-TorreySlaviero.pdf">Slides</a>] [<a href="https://github.com/thinkst/defending-off-the-land">Code</a>]</p><h3>Unveiling the Power of Intune: Leveraging Intune for Breaking Into Your Cloud and On-Premise</h3><p><i>Yuya Chudo</i></p><p>[<a href="http://i.blackhat.com/EU-24/Presentations/EU-24-Chudo-Unveiling-the-Power-of-Intune-Leveraging-Intune-for-Breaking-Into-Your-Cloud-and-On-Premise.pdf">Slides</a>] [<a href="https://github.com/secureworks/pytune">Code</a>]</p><h3>From Simulation to Tenant Takeover</h3><p><i>Vaisha Bernard</i></p><p>[<a href="https://media.ccc.de/v/38c3-from-simulation-to-tenant-takeover">Video</a>]</p><h3>From Convenience to Contagion: The Libarchive Vulnerabilities Lurking in Windows 11</h3><p><i>NiNi Chen</i></p><p>[<a href="https://hitcon.org/2024/CMT/slides/From_Convenience_to_Contagion_The_Libarchive_Vulnerabilities_Lurking_in_Windows_11.pdf">Slides</a>] [<a href="https://media.ccc.de/v/38c3-from-convenience-to-contagion-the-libarchive-vulnerabilities-lurking-in-windows-11">Video</a>]</p><h2>LLM hype continues, as do the security issues</h2><h3>Things we learned about LLMs in 2024</h3><p><i>Simon Willison</i></p><p>[<a href="https://simonwillison.net/2024/Dec/31/llms-in-2024/">Blog</a>]</p><h3>AI Meets Git: Unmasking Security Flaws in Qodo Merge</h3><p><i>Nils Amiet</i></p><p>[<a href="https://fahrplan.events.ccc.de/congress/2024/fahrplan/media/38c3/submissions/XXXSWE/resources/qodo-merge-38c3-slides_b7maUtc.pdf">Slides</a>] [<a href="https://media.ccc.de/v/38c3-ai-meets-git-unmasking-security-flaws-in-qodo-merge">Video</a>] [<a href="https://research.kudelskisecurity.com/2024/08/29/careful-where-you-code-multiple-vulnerabilities-in-ai-powered-pr-agent/">Blog</a>]</p><h3>Suicide Bot: New AI Attack Causes LLM to Provide Potential “Self-Harm” Instructions</h3><p><i>Gadi Evron</i></p><p>[<a href="https://www.knostic.ai/blog/introducing-a-new-class-of-ai-attacks-flowbreaking">Blog</a>]</p><h2>Diving deep, then diving deeper</h2><h3>Breaking NATO Radio Encryption</h3><p><i>Lukas Stennes</i></p><p>[<a href="https://eprint.iacr.org/2023/1314.pdf">Paper</a>] [<a href="https://media.ccc.de/v/38c3-breaking-nato-radio-encryption">Video</a>]</p><h3>Exploiting File Writes in Hardened Environments</h3><p><i>Stefan Schiller</i></p><p>[<a href="https://www.sonarsource.com/blog/why-code-security-matters-even-in-hardened-environments/">Blog</a>] [<a href="https://www.youtube.com/watch?v=ltmZNTP2KX4">Video</a>]</p><h3>Hacking yourself a satellite - recovering BEESAT-1</h3><p><i>PistonMiner</i></p><p>[<a href="https://media.ccc.de/v/38c3-hacking-yourself-a-satellite-recovering-beesat-1">Video</a>]</p><h3>IRIS: Non-Destructive Inspection of Silicon</h3><p><i>Andrew 'bunnie' Huang</i></p><p>[<a href="https://www.bunniestudios.com/blog/2023/infra-red-in-situ-iris-inspection-of-silicon/">Blog</a>] [<a href="https://arxiv.org/pdf/2303.07406">Paper</a>] [<a href="https://media.ccc.de/v/38c3-iris-non-destructive-inspection-of-silicon">Video</a>]</p><h3>SQL Injection Isn't Dead</h3><p><i>Paul Gerste</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Paul%20Gerste%20-%20SQL%20Injection%20Isn%27t%20Dead%20Smuggling%20Queries%20at%20the%20Protocol%20Level.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=N1FAOb1krBk">Video</a>]</p><h2>Nifty sundries</h2><h3>What Developers Get for Free?</h3><p><i>Louis Nyffenegger</i></p><p>[<a href="https://www.youtube.com/watch?v=8HSXgbSbkCA">Video</a>]</p><h3>Dialing into the Past: RCE via the Fax Machine – Because Why Not?</h3><p><i>Rick de Jager and Carlo Meijer</i></p><p>[<a href="https://www.youtube.com/watch?v=ZcV3esnIDF4">Video</a>]</p><h3>Broken isolation - Draining your Credentials from Popular macOS Password Managers</h3><p><i>Wojciech Reguła</i></p><p>[<a href="https://objectivebythesea.org/v7/talks/OBTS_v7_wRegula.pdf">Slides</a>] [<a href="https://youtu.be/DqYyw2WjQPc">Video</a>]</p><h3>I'll Be There for You! Perpetual Availability in the A8 MVX System</h3><p><i>André Rösti, Stijn Volckaert, Michael Franz, and Alexios Voulimeneas</i></p><p>[<a href="https://github.com/andrej/a8">Code</a>] [<a href="https://alexios-voulimeneas.github.io/papers/a8acsac2024.pdf">Paper</a>]</p><h3>Exploring and Exploiting an Android “Smart POS” Payment Terminal</h3><p><i>Jacopo Jannone</i></p><p>[<a href="https://www.youtube.com/watch?v=a9BFGlxP71Y">Video</a>]</p>
]]></content:encoded>
      <enclosure length="36460851" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/df2b3070-bea4-4bb5-bbe7-7f1df058bf89/audio/f056c1a9-4917-4daa-8c16-65f97b085c44/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q4 - 2024</itunes:title>
      <itunes:author>Jacob Torrey, Casey Smith, haroon meer, Marco Slaviero</itunes:author>
      <itunes:duration>00:37:58</itunes:duration>
      <itunes:summary>This is episode 14 of Thinkst&apos;s Trends &amp; Takeaways (for Q4 of 2024). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts  </itunes:summary>
      <itunes:subtitle>This is episode 14 of Thinkst&apos;s Trends &amp; Takeaways (for Q4 of 2024). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts  </itunes:subtitle>
      <itunes:keywords>deception, canary, security research, cybersecurity, blue-team, red-team, netsec</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b74cceea-1616-46a7-bc0f-b8f6bf6e7c00</guid>
      <title>ThinkstScapes Research Roundup - Q3 - 2024</title>
      <description><![CDATA[<h3>Themes covered in this episode</h3><p><strong>Edge cases at scale still matter</strong></p><p>Works from this theme exploit rarely-occurring issues, but with an internet-wide aperture to end up with impressive results. Look for: mechanising bit-squatting; static code analysis for vulnerabilities across all browser extensions, or across web ecosystems; and how Let’s Encrypt worries about revoking and reissuing 400M certificates in a week.</p><p><strong>Going above and beyond</strong></p><p>Talks and papers often use state-of-the-art tooling to measure/detect an interesting phenomenon. This theme highlights four works that could have followed that path, but also built robust tooling/research data to help others push the state-of-the-art forward. Look for: large scale collection and remediation of dangling domains and static secret leaks, preventing memory-corruption vulnerabilities across the Android ecosystem, remote timing attack frameworks, and SSH testing at scale.</p><p><strong>What goes on behind the curtain can be dangerous</strong></p><p>Modern IT systems are composed of many layers. Usually the details at lower levels can be abstracted and safely put out of mind. This theme highlights work that shows that what happens in these oft-ignored places can have significant impacts. See: AWS-internal resources built on your behalf, BGP security weaknesses, stealthy hardware backdoors in access control systems spanning over 15 years, Wi-Fi management plane vulnerabilities, VPN-OS interactions, and a legacy file-system hack in Windows.</p><p><strong>Nifty sundries</strong></p><p>As always, we wanted to showcase work that didn’t fit into the major themes of this issue. We cover: bypassing voice authentication with only a picture of the victim’s face, racking up bills on locked credit cards, email parsing confusion, scanning IPv6, and a timing attack on remote web clients.</p><h2>Edge cases at scale still matter</h2><h3>Flipping Bits: Your Credentials Are Certainly Mine</h3><p><i>Joohoi and STÖK</i></p><p>[<a href="https://github.com/happycakefriends/certainly">Code</a>] [<a href="https://www.youtube.com/watch?v=R_roEB2sz9M">Video</a>]</p><h3>Universal Code Execution by Chaining Messages in Browser Extensions</h3><p><i>Eugene Lim</i></p><p>[<a href="https://spaceraccoon.dev/universal-code-execution-browser-extensions/">Blog</a>] [<a href="https://www.youtube.com/watch?v=2Amrq7ydU44">Video</a>]</p><h3>CVE Hunting Made Easy</h3><p><i>Eddie Zhang</i></p><p>[<a href="https://projectblack.io/blog/cve-hunting-at-scale/">Blog</a>] [<a href="https://github.com/prjblk/wordpress-audit-automation">Code</a>] </p><h3>How To Revoke And Replace 400 Million Certificates Without Breaking The Internet</h3><p><i>Aaron Gable</i></p><p>[<a href="https://archives.pass-the-salt.org/Pass%20the%20SALT/2024/slides/PTS2024-TALK-12-How_to_Revoke_and_Replace_400M_Certificates_in_24_Hours.pdf">Slides</a>] [<a href="https://passthesalt.ubicast.tv/videos/2024-how-to-revoke-and-replace-400-million-certificates-without-breaking-the-internet/">Video</a>]</p><h2>Going above and beyond</h2><h3>Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale</h3><p><i>Bill Demirkapi</i></p><p>[<a href="https://billdemirkapi.me/leveraging-big-data-for-vulnerability-discovery-at-scale/">Blog</a>]</p><h3>Eliminating Memory Safety Vulnerabilities at the Source</h3><p><i>Jeff Vander Stoep and Alex Rebert</i></p><p>[<a href="https://security.googleblog.com/2024/09/eliminating-memory-safety-vulnerabilities-Android.html">Blog</a>]</p><h3>Listen to the Whispers: Web Timing Attacks that Actually Work</h3><p><i>James Kettle</i></p><p>[<a href="http://i.blackhat.com/BH-US-24/Presentations/US-24-Kettle-Listen-to-the-whispers-web-timing-attacks-that-actually-work.pdf">Slides</a>] [<a href="https://i.blackhat.com/BH-US-24/Presentations/US-24-Kettle-Listen-to-the-whispers-web-timing-attacks-that-actually-work-wp.pdf">Paper</a>] [<a href="https://github.com/PortSwigger/param-miner">Code</a>]</p><h3>Secure Shells in Shambles</h3><p><i>HD Moore and Rob King</i></p><p>[<a href="https://i.blackhat.com/BH-US-24/Presentations/REVISED02-US24_Moore_Secure_Shells_in_Shambles_Wednesday.pdf">Slides</a>] [<a href="https://github.com/runZeroInc/sshamble">Code</a>] [<a href="https://www.youtube.com/watch?v=G5yRpdNbdBs">Video</a>]</p><h2>What goes on behind the curtain can be dangerous</h2><h3>Breaching AWS Accounts Through Shadow Resources</h3><p><i>Yakir Kadkoda, Michael Katchinskiy, and Ofek Itach</i></p><p>[<a href="https://i.blackhat.com/BH-US-24/Presentations/US24-Kadkoda-Breaching-AWS-Accounts-Through-Shadow-Resources-Wednesday.pdf">Slides</a>] [<a href="https://github.com/Aqua-Nautilus/TrailShark">Code</a>]</p><h3>Crashing the Party: Vulnerabilities in RPKI Validation</h3><p><i>Niklas Vogel, Donika Mirdita, Haya Schulmann, and Michael Waidner</i></p><p>[<a href="https://i.blackhat.com/BH-US-24/Presentations/US24-Mirdita-Crashing-The-Party-Vulnerabilities-in-RPKI-Validation-Thursday.pdf">Slides</a>] [<a href="http://i.blackhat.com/BH-US-24/Presentations/US24-Mirdita-Crashing-The-Party-Vulnerabilities-in-RPKI-Validation-wp.pdf">Paper</a>]</p><h3>MIFARE Classic: exposing the static encrypted nonce variant... and a few hardware backdoors</h3><p><i>Philippe Teuwen</i></p><p>[<a href="https://blog.quarkslab.com/mifare-classic-static-encrypted-nonce-and-backdoors.html">Blog</a>] [<a href="https://eprint.iacr.org/2024/1275.pdf">Paper</a>] [<a href="https://github.com/RfidResearchGroup/proxmark3">Code</a>]</p><h3>Fallen Tower of Babel: Rooting Wireless Mesh Networks by Abusing Heterogeneous Control Protocols</h3><p><i>Xin'an Zhou, Zhiyun Qian, Juefei Pu, Qing Deng, Srikanth Krishnamurthy, and Keyu Man</i></p><p>[<a href="https://i.blackhat.com/BH-US-24/Presentations/US24-Zhou-Fallen-Tower-of-Babel-Rooting-Wednesday.pdf">Slides</a>] [<a href="https://www.cs.ucr.edu/~zhiyunq/pub/ccs24_wireless_mesh.pdf">Paper</a>] [<a href="https://github.com/seclab-ucr/CCS24Mesh">Code</a>]</p><h3>Attacking Connection Tracking Frameworks as used by Virtual Private Networks</h3><p><i>Benjamin Mixon-Baca, Jeffrey Knockel, Diwen Xue, Deepak Kapur, Roya Ensafi, and Jed Crandall</i></p><p>[<a href="https://petsymposium.org/popets/2024/popets-2024-0070.pdf">Paper</a>]</p><h3>MagicDot: A Hacker's Magic Show of Disappearing Dots and Spaces</h3><p><i>Or Yair</i></p><p>[<a href="http://i.blackhat.com/Asia-24/Presentations/Asia-24-Yair-magicdot-a-hackers-magic-show-of-disappearing-dots-and-spaces.pdf">Slides</a>] [<a href="https://www.safebreach.com/blog/magicdot-a-hackers-magic-show-of-disappearing-dots-and-spaces/">Blog</a>] [<a href="https://www.youtube.com/watch?v=oyYPIkba8Yg">Video</a>] [<a href="https://github.com/SafeBreach-Labs/MagicDot">Code</a>]</p><h2>Nifty sundries</h2><h3>Can I Hear Your Face? Pervasive Attack on Voice Authentication Systems with a Single Face Image</h3><p><i>Nan Jiang, Bangjie Sun, Terence Sim, and Jun Han</i></p><p>[<a href="https://www.usenix.org/system/files/usenixsecurity24-jiang-nan.pdf">Paper</a>] [<a href="https://github.com/SeCATrity/Foice">Code</a>]</p><h3>In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free Shopping</h3><p><i>Raja Hasnain Anwar, Syed Rafiul Hussain, and Muhammad Taqi Raza</i></p><p>[<a href="https://www.usenix.org/system/files/usenixsecurity24_slides-anwar.pdf">Slides</a>] [<a href="https://www.usenix.org/system/files/usenixsecurity24-anwar.pdf">Paper</a>]</p><h3>Splitting the Email Atom: Exploiting Parsers to Bypass Access Controls</h3><p><i>Gareth Heyes</i></p><p>[<a href="http://i.blackhat.com/BH-US-24/Presentations/US24-Heyes-Splitting-the-Email-Atom-Exploiting-Parsers-to-Bypass-Access-Controls-Wednesday.pdf">Slides</a>] [<a href="http://i.blackhat.com/BH-US-24/Presentations/US24-Heyes-Splitting-the-Email-Atom-Exploiting-Parsers-to-Bypass-Access-Controls-wp.pdf">Paper</a>] [<a href="https://github.com/portswigger/splitting-the-email-atom">Code</a>]</p><h3>6Sense: Internet-Wide IPv6 Scanning and its Security Applications</h3><p><i>Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, and Paul Pearce</i></p><p>[<a href="https://www.usenix.org/system/files/usenixsecurity24_slides-williams.pdf">Slides</a>] [<a href="https://www.usenix.org/system/files/usenixsecurity24-williams.pdf">Paper</a>] [<a href="https://github.com/IPv6-Security/6Sense">Code</a>]</p><h3>SnailLoad: Anyone on the Internet Can Learn What You're Doing</h3><p><i>Daniel Gruss and Stefan Gast</i></p><p>[<a href="https://i.blackhat.com/BH-US-24/Presentations/US24-Gast-SnailLoad-Anyone-on-the-Internet-Wednesday.pdf">Slides</a>] [<a href="https://www.snailload.com/snailload.pdf">Paper</a>]</p><h2>Conclusions</h2><p>While we started off 2024 with a modest amount of high-quality works, this has scaled up significantly. As conference publications increase, we do see a slight decline in the number of blogs; there does appear to be some inverse correlation between the two tallies.</p><p>We highlighted three themes for this quarter:</p><ol><li>Rare events that happen at internet-scale have big impacts.</li><li>Going above and beyond in tooling development.</li><li>Cross-layer gotchas.</li></ol><p>We’re looking forward to seeing how the year closes out with our year in review and the final quarter of 2024. </p>
]]></description>
      <pubDate>Mon, 11 Nov 2024 13:03:46 +0000</pubDate>
      <author>jacob@thinkst.com (Casey Smith, haroon meer, Marco Slaviero, Jacob Torrey)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<h3>Themes covered in this episode</h3><p><strong>Edge cases at scale still matter</strong></p><p>Works from this theme exploit rarely-occurring issues, but with an internet-wide aperture to end up with impressive results. Look for: mechanising bit-squatting; static code analysis for vulnerabilities across all browser extensions, or across web ecosystems; and how Let’s Encrypt worries about revoking and reissuing 400M certificates in a week.</p><p><strong>Going above and beyond</strong></p><p>Talks and papers often use state-of-the-art tooling to measure/detect an interesting phenomenon. This theme highlights four works that could have followed that path, but also built robust tooling/research data to help others push the state-of-the-art forward. Look for: large scale collection and remediation of dangling domains and static secret leaks, preventing memory-corruption vulnerabilities across the Android ecosystem, remote timing attack frameworks, and SSH testing at scale.</p><p><strong>What goes on behind the curtain can be dangerous</strong></p><p>Modern IT systems are composed of many layers. Usually the details at lower levels can be abstracted and safely put out of mind. This theme highlights work that shows that what happens in these oft-ignored places can have significant impacts. See: AWS-internal resources built on your behalf, BGP security weaknesses, stealthy hardware backdoors in access control systems spanning over 15 years, Wi-Fi management plane vulnerabilities, VPN-OS interactions, and a legacy file-system hack in Windows.</p><p><strong>Nifty sundries</strong></p><p>As always, we wanted to showcase work that didn’t fit into the major themes of this issue. We cover: bypassing voice authentication with only a picture of the victim’s face, racking up bills on locked credit cards, email parsing confusion, scanning IPv6, and a timing attack on remote web clients.</p><h2>Edge cases at scale still matter</h2><h3>Flipping Bits: Your Credentials Are Certainly Mine</h3><p><i>Joohoi and STÖK</i></p><p>[<a href="https://github.com/happycakefriends/certainly">Code</a>] [<a href="https://www.youtube.com/watch?v=R_roEB2sz9M">Video</a>]</p><h3>Universal Code Execution by Chaining Messages in Browser Extensions</h3><p><i>Eugene Lim</i></p><p>[<a href="https://spaceraccoon.dev/universal-code-execution-browser-extensions/">Blog</a>] [<a href="https://www.youtube.com/watch?v=2Amrq7ydU44">Video</a>]</p><h3>CVE Hunting Made Easy</h3><p><i>Eddie Zhang</i></p><p>[<a href="https://projectblack.io/blog/cve-hunting-at-scale/">Blog</a>] [<a href="https://github.com/prjblk/wordpress-audit-automation">Code</a>] </p><h3>How To Revoke And Replace 400 Million Certificates Without Breaking The Internet</h3><p><i>Aaron Gable</i></p><p>[<a href="https://archives.pass-the-salt.org/Pass%20the%20SALT/2024/slides/PTS2024-TALK-12-How_to_Revoke_and_Replace_400M_Certificates_in_24_Hours.pdf">Slides</a>] [<a href="https://passthesalt.ubicast.tv/videos/2024-how-to-revoke-and-replace-400-million-certificates-without-breaking-the-internet/">Video</a>]</p><h2>Going above and beyond</h2><h3>Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale</h3><p><i>Bill Demirkapi</i></p><p>[<a href="https://billdemirkapi.me/leveraging-big-data-for-vulnerability-discovery-at-scale/">Blog</a>]</p><h3>Eliminating Memory Safety Vulnerabilities at the Source</h3><p><i>Jeff Vander Stoep and Alex Rebert</i></p><p>[<a href="https://security.googleblog.com/2024/09/eliminating-memory-safety-vulnerabilities-Android.html">Blog</a>]</p><h3>Listen to the Whispers: Web Timing Attacks that Actually Work</h3><p><i>James Kettle</i></p><p>[<a href="http://i.blackhat.com/BH-US-24/Presentations/US-24-Kettle-Listen-to-the-whispers-web-timing-attacks-that-actually-work.pdf">Slides</a>] [<a href="https://i.blackhat.com/BH-US-24/Presentations/US-24-Kettle-Listen-to-the-whispers-web-timing-attacks-that-actually-work-wp.pdf">Paper</a>] [<a href="https://github.com/PortSwigger/param-miner">Code</a>]</p><h3>Secure Shells in Shambles</h3><p><i>HD Moore and Rob King</i></p><p>[<a href="https://i.blackhat.com/BH-US-24/Presentations/REVISED02-US24_Moore_Secure_Shells_in_Shambles_Wednesday.pdf">Slides</a>] [<a href="https://github.com/runZeroInc/sshamble">Code</a>] [<a href="https://www.youtube.com/watch?v=G5yRpdNbdBs">Video</a>]</p><h2>What goes on behind the curtain can be dangerous</h2><h3>Breaching AWS Accounts Through Shadow Resources</h3><p><i>Yakir Kadkoda, Michael Katchinskiy, and Ofek Itach</i></p><p>[<a href="https://i.blackhat.com/BH-US-24/Presentations/US24-Kadkoda-Breaching-AWS-Accounts-Through-Shadow-Resources-Wednesday.pdf">Slides</a>] [<a href="https://github.com/Aqua-Nautilus/TrailShark">Code</a>]</p><h3>Crashing the Party: Vulnerabilities in RPKI Validation</h3><p><i>Niklas Vogel, Donika Mirdita, Haya Schulmann, and Michael Waidner</i></p><p>[<a href="https://i.blackhat.com/BH-US-24/Presentations/US24-Mirdita-Crashing-The-Party-Vulnerabilities-in-RPKI-Validation-Thursday.pdf">Slides</a>] [<a href="http://i.blackhat.com/BH-US-24/Presentations/US24-Mirdita-Crashing-The-Party-Vulnerabilities-in-RPKI-Validation-wp.pdf">Paper</a>]</p><h3>MIFARE Classic: exposing the static encrypted nonce variant... and a few hardware backdoors</h3><p><i>Philippe Teuwen</i></p><p>[<a href="https://blog.quarkslab.com/mifare-classic-static-encrypted-nonce-and-backdoors.html">Blog</a>] [<a href="https://eprint.iacr.org/2024/1275.pdf">Paper</a>] [<a href="https://github.com/RfidResearchGroup/proxmark3">Code</a>]</p><h3>Fallen Tower of Babel: Rooting Wireless Mesh Networks by Abusing Heterogeneous Control Protocols</h3><p><i>Xin'an Zhou, Zhiyun Qian, Juefei Pu, Qing Deng, Srikanth Krishnamurthy, and Keyu Man</i></p><p>[<a href="https://i.blackhat.com/BH-US-24/Presentations/US24-Zhou-Fallen-Tower-of-Babel-Rooting-Wednesday.pdf">Slides</a>] [<a href="https://www.cs.ucr.edu/~zhiyunq/pub/ccs24_wireless_mesh.pdf">Paper</a>] [<a href="https://github.com/seclab-ucr/CCS24Mesh">Code</a>]</p><h3>Attacking Connection Tracking Frameworks as used by Virtual Private Networks</h3><p><i>Benjamin Mixon-Baca, Jeffrey Knockel, Diwen Xue, Deepak Kapur, Roya Ensafi, and Jed Crandall</i></p><p>[<a href="https://petsymposium.org/popets/2024/popets-2024-0070.pdf">Paper</a>]</p><h3>MagicDot: A Hacker's Magic Show of Disappearing Dots and Spaces</h3><p><i>Or Yair</i></p><p>[<a href="http://i.blackhat.com/Asia-24/Presentations/Asia-24-Yair-magicdot-a-hackers-magic-show-of-disappearing-dots-and-spaces.pdf">Slides</a>] [<a href="https://www.safebreach.com/blog/magicdot-a-hackers-magic-show-of-disappearing-dots-and-spaces/">Blog</a>] [<a href="https://www.youtube.com/watch?v=oyYPIkba8Yg">Video</a>] [<a href="https://github.com/SafeBreach-Labs/MagicDot">Code</a>]</p><h2>Nifty sundries</h2><h3>Can I Hear Your Face? Pervasive Attack on Voice Authentication Systems with a Single Face Image</h3><p><i>Nan Jiang, Bangjie Sun, Terence Sim, and Jun Han</i></p><p>[<a href="https://www.usenix.org/system/files/usenixsecurity24-jiang-nan.pdf">Paper</a>] [<a href="https://github.com/SeCATrity/Foice">Code</a>]</p><h3>In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free Shopping</h3><p><i>Raja Hasnain Anwar, Syed Rafiul Hussain, and Muhammad Taqi Raza</i></p><p>[<a href="https://www.usenix.org/system/files/usenixsecurity24_slides-anwar.pdf">Slides</a>] [<a href="https://www.usenix.org/system/files/usenixsecurity24-anwar.pdf">Paper</a>]</p><h3>Splitting the Email Atom: Exploiting Parsers to Bypass Access Controls</h3><p><i>Gareth Heyes</i></p><p>[<a href="http://i.blackhat.com/BH-US-24/Presentations/US24-Heyes-Splitting-the-Email-Atom-Exploiting-Parsers-to-Bypass-Access-Controls-Wednesday.pdf">Slides</a>] [<a href="http://i.blackhat.com/BH-US-24/Presentations/US24-Heyes-Splitting-the-Email-Atom-Exploiting-Parsers-to-Bypass-Access-Controls-wp.pdf">Paper</a>] [<a href="https://github.com/portswigger/splitting-the-email-atom">Code</a>]</p><h3>6Sense: Internet-Wide IPv6 Scanning and its Security Applications</h3><p><i>Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, and Paul Pearce</i></p><p>[<a href="https://www.usenix.org/system/files/usenixsecurity24_slides-williams.pdf">Slides</a>] [<a href="https://www.usenix.org/system/files/usenixsecurity24-williams.pdf">Paper</a>] [<a href="https://github.com/IPv6-Security/6Sense">Code</a>]</p><h3>SnailLoad: Anyone on the Internet Can Learn What You're Doing</h3><p><i>Daniel Gruss and Stefan Gast</i></p><p>[<a href="https://i.blackhat.com/BH-US-24/Presentations/US24-Gast-SnailLoad-Anyone-on-the-Internet-Wednesday.pdf">Slides</a>] [<a href="https://www.snailload.com/snailload.pdf">Paper</a>]</p><h2>Conclusions</h2><p>While we started off 2024 with a modest amount of high-quality works, this has scaled up significantly. As conference publications increase, we do see a slight decline in the number of blogs; there does appear to be some inverse correlation between the two tallies.</p><p>We highlighted three themes for this quarter:</p><ol><li>Rare events that happen at internet-scale have big impacts.</li><li>Going above and beyond in tooling development.</li><li>Cross-layer gotchas.</li></ol><p>We’re looking forward to seeing how the year closes out with our year in review and the final quarter of 2024. </p>
]]></content:encoded>
      <enclosure length="35330685" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/612aa40d-d31f-4eee-945d-e204e84c6ed9/audio/57ad6cad-347f-4995-83d1-10a053a4d4c5/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q3 - 2024</itunes:title>
      <itunes:author>Casey Smith, haroon meer, Marco Slaviero, Jacob Torrey</itunes:author>
      <itunes:duration>00:36:48</itunes:duration>
      <itunes:summary>This is episode 13 of Thinkst&apos;s Trends &amp; Takeaways (for Q3 of 2024). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts </itunes:summary>
      <itunes:subtitle>This is episode 13 of Thinkst&apos;s Trends &amp; Takeaways (for Q3 of 2024). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts </itunes:subtitle>
      <itunes:keywords>thinkst, deception, information security, canary, thinkstscapes, cybersecurity, cyber, cyber security, blue-team, red-team, cyber-security, security, research, netsec</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ade574b4-2b63-4ab9-8872-5d7314638bb9</guid>
      <title>ThinkstScapes Research Roundup - Q2 - 2024</title>
      <description><![CDATA[<h2>AI/ML in security</h2><h3>Injecting into LLM-adjacent components</h3><p><i>Johann Rehberger</i></p><p>[<a href="https://embracethered.com/blog/posts/2024/github-copilot-chat-prompt-injection-data-exfiltration/">Blog 1</a>] [<a href="https://embracethered.com/blog/posts/2024/chatgpt-hacking-memories/">Blog 2</a>]</p><h3>Teams of LLM Agents can Exploit Zero-Day Vulnerabilities</h3><p><i>Richard Fang, Rohan Bindu, Akul Gupta, Qiusi Zhan, and Daniel Kang</i></p><p>[<a href="https://arxiv.org/pdf/2406.01637">Paper</a>] </p><h3>Project Naptime: Evaluating Offensive Security Capabilities of Large Language Models </h3><p><i>Sergei Glazunov and Mark Brand</i></p><p>[<a href="https://googleprojectzero.blogspot.com/2024/06/project-naptime.html">Blog</a>] </p><h3>LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks</h3><p><i>Saad Ullah, Mingji Han, Saurabh Pujar, Hammond Pearce, Ayse Kivilcim Coskun, and Gianluca Stringhini</i></p><p>[<a href="https://arxiv.org/pdf/2312.12575">Paper</a>] [<a href="https://github.com/ai4cloudops/SecLLMHolmes">Code</a>]</p><h3>The Impact of Backdoor Poisoning Vulnerabilities on AI-Based Threat Detectors</h3><p><i>Dmitrijs Trizna, Luca Demetrio, Battista Biggio, and Fabio Roli</i></p><p>[<a href="https://github.com/dtrizna/talks/blob/main/2024_BlueHat_India_Poisoning_AI_Threat_Detectors.pdf">Slides</a>] [<a href="https://arxiv.org/pdf/2402.18329">Paper</a>] [<a href="https://github.com/dtrizna/QuasarNix">Code</a>]</p><h2>Looking at the whole system</h2><h3>Systems Alchemy: The Transmutation of Hacking</h3><p><i>Thaddeus grugq</i></p><p>[<a href="https://www.youtube.com/watch?v=JYhIui542Xg">Video</a>]</p><h3>The Boom, the Bust, the Adjust and the Unknown</h3><p><i>Maor Shwartz</i></p><p>[<a href="https://www.slideshare.net/slideshow/zer0con-2024-final-share-short-versionpdf/267171223">Slides</a>]</p><h3>Poisoning Web-Scale Training Datasets is Practical</h3><p><i>Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum Anderson, Andreas Terzis, Kurt Thomas, and Florian Tramèr</i></p><p>[<a href="https://arxiv.org/abs/2302.10149">Paper</a>]</p><h3>Intercloud Identities: The Risks and Mitigations of Access Between Cloud Providers</h3><p><i>Noam Dahan and Ari Eitan</i></p><p>[<a href="https://www.youtube.com/watch?v=7hWepdMRckg">Video</a>]</p><h2>New modalities with which to inflict pain</h2><h3>GPU.zip: On the Side-Channel Implications of Hardware-Based Graphical Data Compression</h3><p><i>Yingchen Wang, Riccardo Paccagnella, Zhao Gang, Willy R. Vasquez, David Kohlbrenner, Hovav Shacham, and Christopher W. Fletcher</i></p><p>[<a href="https://www.hertzbleed.com/gpu.zip/GPU-zip.pdf">Paper</a>]</p><h3>AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management</h3><p><i>Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin Butler, Md Jahidul Islam, and Sara Rampazzi</i></p><p>[<a href="https://arxiv.org/pdf/2404.11815">Paper</a>] [<a href="https://cpseclab.github.io/aquasonic/">Video</a>]</p><h3>Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED Captured By Standard Video Cameras</h3><p><i>Ben Nassi, Etay Iluz, Or Cohen, Ofek Vayner, Dudi Nassi, Boris Zadov, and Yuval Elovici</i></p><p>[<a href="https://www.nassiben.com/video-based-crypta">Site</a>] [<a href="https://eprint.iacr.org/2023/923.pdf">Paper</a>] [<a href="https://www.youtube.com/watch?v=JBr51OJlZcE">Video</a>]</p><h2>Old components showing the strain</h2><h3>Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks</h3><p><i>Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, and Ke Xu</i></p><p>[<a href="https://blog.apnic.net/2024/06/18/off-path-tcp-hijacking-in-nat-enabled-wi-fi-networks/">Blog</a>] [<a href="https://www.ndss-symposium.org/wp-content/uploads/2024-419-paper.pdf">Paper</a>] </p><h3>Reliable Payload Transmission Past the Spoofed TCP Handshake</h3><p><i>Yepeng Pan and Christian Rossow</i></p><p>[<a href="https://publications.cispa.de/articles/conference_contribution/TCP_Spoofing_Reliable_Payload_Transmission_Past_the_Spoofed_TCP_Handshake/25771929">Paper</a>] [<a href="https://github.com/ypando/spoofing_feedback">Code</a>]</p><h3>Parse Me, Baby, One More Time: Bypassing HTML Sanitizer via Parsing Differentials</h3><p><i>David Klein and Martin Johns</i></p><p>[<a href="https://www.ias.cs.tu-bs.de/publications/parsing_differentials.pdf">Paper</a>] [<a href="https://github.com/ias-tubs/HTML_parsing_differentials">Code</a>]</p><h3>Practical Exploitation of Registry Vulnerabilities in the Windows Kernel</h3><p><i>Mateusz Jurczyk</i></p><p>[<a href="https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-1.html">Blog</a>] [<a href="https://www.youtube.com/watch?v=qllMa2UUPvY">Video</a>]</p><h2>Nifty sundries</h2><h3>An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape</h3><p><i>Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, and Bimal Viswanath</i></p><p>[<a href="https://github.com/secml-lab-vt/EvolvingThreat-DeepfakeImageDetect">Code</a>] [<a href="https://arxiv.org/pdf/2404.16212">Paper</a>]</p><h3>Tracking illicit phishermen in the deep blue Azure</h3><p><i>Jacob Torrey</i></p><p>[<a href="https://docs.google.com/presentation/d/12gwshNX57-5g9XxAaS4CuK_KPKUXbDyV/edit?usp=drive_link&ouid=104815586539540751141&rtpof=true&sd=true">Slides</a>] [<a href="https://github.com/thinkst/canarytokens/tree/master/aws-css-token-infra/CSSClonedSiteCFFunc">Code</a>]</p><h3>SEVeriFast: Minimizing the root of trust for fast startup of SEV microVMs</h3><p><i>Benjamin Holmes, Jason Waterman, and Dan Williams</i></p><p>[<a href="https://people.cs.vt.edu/djwillia/papers/asplos24-severifast.pdf">Paper</a>] [<a href="https://github.com/SEVeriFast/severifast">Code</a>]</p><h3>Certiception: The ADCS Honeypot We Always Wanted</h3><p><i>Balthasar Martin and Niklas van Dornick</i></p><p>[<a href="https://www.srlabs.de/blog-post/certiception-the-adcs-honeypot-we-always-wanted">Blog</a>] [<a href="https://github.com/srlabs/Certiception">Code</a>] [<a href="http://github.com/srlabs/Certiception/blob/master/documentation/The_Red_Teamers_Guide_To_Deception.pdf">Slides</a>]</p>
]]></description>
      <pubDate>Mon, 29 Jul 2024 13:11:34 +0000</pubDate>
      <author>jacob@thinkst.com (Jacob Torrey, Casey Smith, haroon meer)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<h2>AI/ML in security</h2><h3>Injecting into LLM-adjacent components</h3><p><i>Johann Rehberger</i></p><p>[<a href="https://embracethered.com/blog/posts/2024/github-copilot-chat-prompt-injection-data-exfiltration/">Blog 1</a>] [<a href="https://embracethered.com/blog/posts/2024/chatgpt-hacking-memories/">Blog 2</a>]</p><h3>Teams of LLM Agents can Exploit Zero-Day Vulnerabilities</h3><p><i>Richard Fang, Rohan Bindu, Akul Gupta, Qiusi Zhan, and Daniel Kang</i></p><p>[<a href="https://arxiv.org/pdf/2406.01637">Paper</a>] </p><h3>Project Naptime: Evaluating Offensive Security Capabilities of Large Language Models </h3><p><i>Sergei Glazunov and Mark Brand</i></p><p>[<a href="https://googleprojectzero.blogspot.com/2024/06/project-naptime.html">Blog</a>] </p><h3>LLMs Cannot Reliably Identify and Reason About Security Vulnerabilities (Yet?): A Comprehensive Evaluation, Framework, and Benchmarks</h3><p><i>Saad Ullah, Mingji Han, Saurabh Pujar, Hammond Pearce, Ayse Kivilcim Coskun, and Gianluca Stringhini</i></p><p>[<a href="https://arxiv.org/pdf/2312.12575">Paper</a>] [<a href="https://github.com/ai4cloudops/SecLLMHolmes">Code</a>]</p><h3>The Impact of Backdoor Poisoning Vulnerabilities on AI-Based Threat Detectors</h3><p><i>Dmitrijs Trizna, Luca Demetrio, Battista Biggio, and Fabio Roli</i></p><p>[<a href="https://github.com/dtrizna/talks/blob/main/2024_BlueHat_India_Poisoning_AI_Threat_Detectors.pdf">Slides</a>] [<a href="https://arxiv.org/pdf/2402.18329">Paper</a>] [<a href="https://github.com/dtrizna/QuasarNix">Code</a>]</p><h2>Looking at the whole system</h2><h3>Systems Alchemy: The Transmutation of Hacking</h3><p><i>Thaddeus grugq</i></p><p>[<a href="https://www.youtube.com/watch?v=JYhIui542Xg">Video</a>]</p><h3>The Boom, the Bust, the Adjust and the Unknown</h3><p><i>Maor Shwartz</i></p><p>[<a href="https://www.slideshare.net/slideshow/zer0con-2024-final-share-short-versionpdf/267171223">Slides</a>]</p><h3>Poisoning Web-Scale Training Datasets is Practical</h3><p><i>Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum Anderson, Andreas Terzis, Kurt Thomas, and Florian Tramèr</i></p><p>[<a href="https://arxiv.org/abs/2302.10149">Paper</a>]</p><h3>Intercloud Identities: The Risks and Mitigations of Access Between Cloud Providers</h3><p><i>Noam Dahan and Ari Eitan</i></p><p>[<a href="https://www.youtube.com/watch?v=7hWepdMRckg">Video</a>]</p><h2>New modalities with which to inflict pain</h2><h3>GPU.zip: On the Side-Channel Implications of Hardware-Based Graphical Data Compression</h3><p><i>Yingchen Wang, Riccardo Paccagnella, Zhao Gang, Willy R. Vasquez, David Kohlbrenner, Hovav Shacham, and Christopher W. Fletcher</i></p><p>[<a href="https://www.hertzbleed.com/gpu.zip/GPU-zip.pdf">Paper</a>]</p><h3>AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management</h3><p><i>Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin Butler, Md Jahidul Islam, and Sara Rampazzi</i></p><p>[<a href="https://arxiv.org/pdf/2404.11815">Paper</a>] [<a href="https://cpseclab.github.io/aquasonic/">Video</a>]</p><h3>Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device’s Power LED Captured By Standard Video Cameras</h3><p><i>Ben Nassi, Etay Iluz, Or Cohen, Ofek Vayner, Dudi Nassi, Boris Zadov, and Yuval Elovici</i></p><p>[<a href="https://www.nassiben.com/video-based-crypta">Site</a>] [<a href="https://eprint.iacr.org/2023/923.pdf">Paper</a>] [<a href="https://www.youtube.com/watch?v=JBr51OJlZcE">Video</a>]</p><h2>Old components showing the strain</h2><h3>Exploiting Sequence Number Leakage: TCP Hijacking in NAT-Enabled Wi-Fi Networks</h3><p><i>Yuxiang Yang, Xuewei Feng, Qi Li, Kun Sun, Ziqiang Wang, and Ke Xu</i></p><p>[<a href="https://blog.apnic.net/2024/06/18/off-path-tcp-hijacking-in-nat-enabled-wi-fi-networks/">Blog</a>] [<a href="https://www.ndss-symposium.org/wp-content/uploads/2024-419-paper.pdf">Paper</a>] </p><h3>Reliable Payload Transmission Past the Spoofed TCP Handshake</h3><p><i>Yepeng Pan and Christian Rossow</i></p><p>[<a href="https://publications.cispa.de/articles/conference_contribution/TCP_Spoofing_Reliable_Payload_Transmission_Past_the_Spoofed_TCP_Handshake/25771929">Paper</a>] [<a href="https://github.com/ypando/spoofing_feedback">Code</a>]</p><h3>Parse Me, Baby, One More Time: Bypassing HTML Sanitizer via Parsing Differentials</h3><p><i>David Klein and Martin Johns</i></p><p>[<a href="https://www.ias.cs.tu-bs.de/publications/parsing_differentials.pdf">Paper</a>] [<a href="https://github.com/ias-tubs/HTML_parsing_differentials">Code</a>]</p><h3>Practical Exploitation of Registry Vulnerabilities in the Windows Kernel</h3><p><i>Mateusz Jurczyk</i></p><p>[<a href="https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-1.html">Blog</a>] [<a href="https://www.youtube.com/watch?v=qllMa2UUPvY">Video</a>]</p><h2>Nifty sundries</h2><h3>An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape</h3><p><i>Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, and Bimal Viswanath</i></p><p>[<a href="https://github.com/secml-lab-vt/EvolvingThreat-DeepfakeImageDetect">Code</a>] [<a href="https://arxiv.org/pdf/2404.16212">Paper</a>]</p><h3>Tracking illicit phishermen in the deep blue Azure</h3><p><i>Jacob Torrey</i></p><p>[<a href="https://docs.google.com/presentation/d/12gwshNX57-5g9XxAaS4CuK_KPKUXbDyV/edit?usp=drive_link&ouid=104815586539540751141&rtpof=true&sd=true">Slides</a>] [<a href="https://github.com/thinkst/canarytokens/tree/master/aws-css-token-infra/CSSClonedSiteCFFunc">Code</a>]</p><h3>SEVeriFast: Minimizing the root of trust for fast startup of SEV microVMs</h3><p><i>Benjamin Holmes, Jason Waterman, and Dan Williams</i></p><p>[<a href="https://people.cs.vt.edu/djwillia/papers/asplos24-severifast.pdf">Paper</a>] [<a href="https://github.com/SEVeriFast/severifast">Code</a>]</p><h3>Certiception: The ADCS Honeypot We Always Wanted</h3><p><i>Balthasar Martin and Niklas van Dornick</i></p><p>[<a href="https://www.srlabs.de/blog-post/certiception-the-adcs-honeypot-we-always-wanted">Blog</a>] [<a href="https://github.com/srlabs/Certiception">Code</a>] [<a href="http://github.com/srlabs/Certiception/blob/master/documentation/The_Red_Teamers_Guide_To_Deception.pdf">Slides</a>]</p>
]]></content:encoded>
      <enclosure length="30337650" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/1106d219-f0ac-4ec4-9d6e-f6ad42c70c80/audio/feb0380a-91e4-4cf9-8d2b-79b4a37ae656/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q2 - 2024</itunes:title>
      <itunes:author>Jacob Torrey, Casey Smith, haroon meer</itunes:author>
      <itunes:duration>00:31:36</itunes:duration>
      <itunes:summary>This is episode 11 of Thinkst&apos;s Trends &amp; Takeaways (for Q2 of 2024). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:summary>
      <itunes:subtitle>This is episode 11 of Thinkst&apos;s Trends &amp; Takeaways (for Q2 of 2024). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:subtitle>
      <itunes:keywords>thinkst, deception, information security, canary, security research, thinkstscapes, infosec, cybersecurity, cyber, blue-team, red-team, security, research, netsec</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">89b9160e-5499-4bdf-962e-fe56f30c11bd</guid>
      <title>ThinkstScapes Research Roundup - Q1 - 2024</title>
      <description><![CDATA[<h2>Revealing more than anticipated, and preventing prying eyes</h2><h3>PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound</h3><p><i>Man Zhou, Shuao Su, Qian Wang, Qi Li, Yuting Zhou, Xiaojing Ma, and Zhengxiong Li</i></p><p>[<a href="https://www.ndss-symposium.org/wp-content/uploads/2024-618-paper.pdf">Paper</a>]</p><h3>ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks</h3><p><i>Minxue Tang, Anna Dai, Louis DiValentin, Aolin Ding, Amin Hass, Neil Zhenqiang Gong, Yiran Chen, and Hai Li</i></p><p>[<a href="https://www.usenix.org/system/files/sec24summer-prepub-409-tang.pdf">Paper</a>] [<a href="https://github.com/Yoruko-Tang/ModelGuard">Code</a>]</p><h3>RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users</h3><p><i>Eric Jedermann, Martin Strohmeier, Vincent Lenders, and Jens Schmitt</i></p><p>[<a href="https://github.com/ErJedermann/RECORD">Code</a>] [<a href="https://www.usenix.org/system/files/sec23winter-prepub-380-jedermann.pdf">Paper</a>]</p><h3>Private web search with Tiptoe</h3><p><i>Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, and Nickolai Zeldovich</i></p><p>[<a href="https://iacr.org/submit/files/slides/2024/rwc/rwc2024/43/slides.pdf">Slides</a>] [<a href="https://eprint.iacr.org/2023/1438">Paper</a>] [<a href="https://www.youtube.com/watch?v=IIs1S3nRg4w">Video</a>] [<a href="https://github.com/ahenzinger/tiptoe">Code</a>]</p><h3>Can Virtual Reality Protect Users from Keystroke Inference Attacks?</h3><p><i>Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, and Haitao Zheng</i></p><p>[<a href="https://sandlab.cs.uchicago.edu/vrkeystroke/">Website</a>] [<a href="https://arxiv.org/pdf/2310.16191">Paper</a>]</p><h3>Backtrace in Time: Revealing Attackers’ Sleep Patterns and Days Off in RDP Brute-Force Attacks with Calendar Heatmaps</h3><p><i>Andréanne Bergeron</i></p><p>[<a href="https://github.com/GoSecure/pyrdp">Code</a>] [<a href="https://gosecure.ai/blog/2024/02/07/beyond-the-script-attackers-sleep-schedule-and-strategies-behind-automated-attacks/">Blog</a>] [<a href="https://archive.org/details/shmoocon2024/Shmoocon2024-Andr%C3%A9anneBergeron-Backtrace_in_Time.mp4">Video</a>]</p><h2>Taking another look with a fresh perspective</h2><h3>Breaking HTTP Servers, Proxies, and Load Balancers Using the HTTP Garden</h3><p><i>Ben Kallus and Prashant Anantharaman</i></p><p>[<a href="https://github.com/narfindustries/http-garden">Code</a>] [<a href="https://archive.org/details/shmoocon2024/Shmoocon2024-BenKallus_%26_PrashantAnantharaman-Breaking_HTTP_Servers...Using_the_HTTP_Garden.mp4">Video</a>]</p><h3>Compiler Backdooring For Beginners</h3><p><i>Marion Marschalek</i></p><p>[<a href="https://www.youtube.com/watch?v=KgBuaHbD7GA">Video</a>]</p><h3>Revisiting 2017: AI and Security, 7 years later</h3><p><i>Thomas Dullien</i></p><p>[<a href="https://www.youtube.com/watch?v=xA-ns0zi0k0">Video</a>]</p><h3>Automated Large-Scale Analysis of Cookie Notice Compliance</h3><p><i>Ahmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, and David Basin</i></p><p>[<a href="https://www.usenix.org/system/files/sec23winter-prepub-107-bouhoula.pdf">Paper</a>] [<a href="https://ahmedbouhoula.github.io/post/automated.html">Code Access</a>]</p><h2>Turning Windows into doors</h2><h3>LSA Whisperer</h3><p><i>Evan McBroom</i></p><p>[<a href="https://github.com/SpecterOps/presentations/tree/main/SO-CON%202024/Evan%20McBroom%20-%20LSA%20Whisper">Slides</a>] [<a href="https://posts.specterops.io/lsa-whisperer-20874277ea3b">Blog</a>] [<a href="https://github.com/EvanMcBroom/lsa-whisperer">Code</a>]</p><h3>Wishing: Webhook Phishing in Teams</h3><p><i>Matthew Eidelberg</i></p><p>[<a href="https://www.blackhillsinfosec.com/wishing-webhook-phishing-in-teams/">Blog</a>] [<a href="https://github.com/dafthack/GraphRunner">Code</a>]</p><h3>Misconfiguration Manager: Overlooked and Overprivileged</h3><p><i>Duane Michael and Chris Thompson</i></p><p>[<a href="https://github.com/SpecterOps/presentations/tree/main/SO-CON%202024/Duane%20Michael%20%26%20Chris%20Thompson">Slides</a>] [<a href="https://posts.specterops.io/misconfiguration-manager-overlooked-and-overprivileged-70983b8f350d">Blog</a>] [<a href="https://github.com/subat0mik/Misconfiguration-Manager">Code</a>]</p><h3>Smoke and Mirrors: How to hide in Microsoft Azure</h3><p><i>Aled Mehta and Christian Philipov</i></p><p>[<a href="https://www.youtube.com/watch?v=uvoV75Q7cqU">Video</a>]</p><h2>Nifty sundries</h2><h3>Backdoor in XZ Utils allows RCE: everything you need to know</h3><p><i>Andres Freund, Merav Bar, Amitai Cohen, Danielle Aminov, and Russ Cox</i></p><p>[<a href="https://www.openwall.com/lists/oss-security/2024/03/29/4">Initial Disclosure</a>] [<a href="https://www.wiz.io/blog/cve-2024-3094-critical-rce-vulnerability-found-in-xz-utils">Wiz Blog</a>] [<a href="https://research.swtch.com/xz-timeline">Timeline</a>]</p><h3>More Money, Fewer FOSS Security Problems? The Data, Such As It Is</h3><p><i>John Speed Meyers, Sara Ann Brackett, and Stewart Scott</i></p><p>[<a href="https://archive.org/details/shmoocon2024/Shmoocon2024-JohnMeyers_SaraBrackett_%26_StewartScott-More_Money_Fewer_FOSS_Security_Problems.mp4">Video</a>]</p><h3>MUDding Around: Hacking for gold in text-based games</h3><p><i>Unix-ninja</i></p><p>[<a href="https://www.unix-ninja.com/p/mudding_around_hacking_for_gold_in_text-based_games">Blog</a>]</p><h3>DeGPT: Optimizing Decompiler Output with LLM</h3><p><i>Peiwei Hu, Ruigang Liang, and Kai Chen</i></p><p>[<a href="https://www.ndss-symposium.org/wp-content/uploads/2024-401-paper.pdf">Paper</a>]</p>
]]></description>
      <pubDate>Fri, 14 Jun 2024 14:00:00 +0000</pubDate>
      <author>jacob@thinkst.com (Jacob Torrey, haroon meer, Casey Smith)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<h2>Revealing more than anticipated, and preventing prying eyes</h2><h3>PrintListener: Uncovering the Vulnerability of Fingerprint Authentication via the Finger Friction Sound</h3><p><i>Man Zhou, Shuao Su, Qian Wang, Qi Li, Yuting Zhou, Xiaojing Ma, and Zhengxiong Li</i></p><p>[<a href="https://www.ndss-symposium.org/wp-content/uploads/2024-618-paper.pdf">Paper</a>]</p><h3>ModelGuard: Information-Theoretic Defense Against Model Extraction Attacks</h3><p><i>Minxue Tang, Anna Dai, Louis DiValentin, Aolin Ding, Amin Hass, Neil Zhenqiang Gong, Yiran Chen, and Hai Li</i></p><p>[<a href="https://www.usenix.org/system/files/sec24summer-prepub-409-tang.pdf">Paper</a>] [<a href="https://github.com/Yoruko-Tang/ModelGuard">Code</a>]</p><h3>RECORD: A RECeption-Only Region Determination Attack on LEO Satellite Users</h3><p><i>Eric Jedermann, Martin Strohmeier, Vincent Lenders, and Jens Schmitt</i></p><p>[<a href="https://github.com/ErJedermann/RECORD">Code</a>] [<a href="https://www.usenix.org/system/files/sec23winter-prepub-380-jedermann.pdf">Paper</a>]</p><h3>Private web search with Tiptoe</h3><p><i>Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, and Nickolai Zeldovich</i></p><p>[<a href="https://iacr.org/submit/files/slides/2024/rwc/rwc2024/43/slides.pdf">Slides</a>] [<a href="https://eprint.iacr.org/2023/1438">Paper</a>] [<a href="https://www.youtube.com/watch?v=IIs1S3nRg4w">Video</a>] [<a href="https://github.com/ahenzinger/tiptoe">Code</a>]</p><h3>Can Virtual Reality Protect Users from Keystroke Inference Attacks?</h3><p><i>Zhuolin Yang, Zain Sarwar, Iris Hwang, Ronik Bhaskar, Ben Y. Zhao, and Haitao Zheng</i></p><p>[<a href="https://sandlab.cs.uchicago.edu/vrkeystroke/">Website</a>] [<a href="https://arxiv.org/pdf/2310.16191">Paper</a>]</p><h3>Backtrace in Time: Revealing Attackers’ Sleep Patterns and Days Off in RDP Brute-Force Attacks with Calendar Heatmaps</h3><p><i>Andréanne Bergeron</i></p><p>[<a href="https://github.com/GoSecure/pyrdp">Code</a>] [<a href="https://gosecure.ai/blog/2024/02/07/beyond-the-script-attackers-sleep-schedule-and-strategies-behind-automated-attacks/">Blog</a>] [<a href="https://archive.org/details/shmoocon2024/Shmoocon2024-Andr%C3%A9anneBergeron-Backtrace_in_Time.mp4">Video</a>]</p><h2>Taking another look with a fresh perspective</h2><h3>Breaking HTTP Servers, Proxies, and Load Balancers Using the HTTP Garden</h3><p><i>Ben Kallus and Prashant Anantharaman</i></p><p>[<a href="https://github.com/narfindustries/http-garden">Code</a>] [<a href="https://archive.org/details/shmoocon2024/Shmoocon2024-BenKallus_%26_PrashantAnantharaman-Breaking_HTTP_Servers...Using_the_HTTP_Garden.mp4">Video</a>]</p><h3>Compiler Backdooring For Beginners</h3><p><i>Marion Marschalek</i></p><p>[<a href="https://www.youtube.com/watch?v=KgBuaHbD7GA">Video</a>]</p><h3>Revisiting 2017: AI and Security, 7 years later</h3><p><i>Thomas Dullien</i></p><p>[<a href="https://www.youtube.com/watch?v=xA-ns0zi0k0">Video</a>]</p><h3>Automated Large-Scale Analysis of Cookie Notice Compliance</h3><p><i>Ahmed Bouhoula, Karel Kubicek, Amit Zac, Carlos Cotrini, and David Basin</i></p><p>[<a href="https://www.usenix.org/system/files/sec23winter-prepub-107-bouhoula.pdf">Paper</a>] [<a href="https://ahmedbouhoula.github.io/post/automated.html">Code Access</a>]</p><h2>Turning Windows into doors</h2><h3>LSA Whisperer</h3><p><i>Evan McBroom</i></p><p>[<a href="https://github.com/SpecterOps/presentations/tree/main/SO-CON%202024/Evan%20McBroom%20-%20LSA%20Whisper">Slides</a>] [<a href="https://posts.specterops.io/lsa-whisperer-20874277ea3b">Blog</a>] [<a href="https://github.com/EvanMcBroom/lsa-whisperer">Code</a>]</p><h3>Wishing: Webhook Phishing in Teams</h3><p><i>Matthew Eidelberg</i></p><p>[<a href="https://www.blackhillsinfosec.com/wishing-webhook-phishing-in-teams/">Blog</a>] [<a href="https://github.com/dafthack/GraphRunner">Code</a>]</p><h3>Misconfiguration Manager: Overlooked and Overprivileged</h3><p><i>Duane Michael and Chris Thompson</i></p><p>[<a href="https://github.com/SpecterOps/presentations/tree/main/SO-CON%202024/Duane%20Michael%20%26%20Chris%20Thompson">Slides</a>] [<a href="https://posts.specterops.io/misconfiguration-manager-overlooked-and-overprivileged-70983b8f350d">Blog</a>] [<a href="https://github.com/subat0mik/Misconfiguration-Manager">Code</a>]</p><h3>Smoke and Mirrors: How to hide in Microsoft Azure</h3><p><i>Aled Mehta and Christian Philipov</i></p><p>[<a href="https://www.youtube.com/watch?v=uvoV75Q7cqU">Video</a>]</p><h2>Nifty sundries</h2><h3>Backdoor in XZ Utils allows RCE: everything you need to know</h3><p><i>Andres Freund, Merav Bar, Amitai Cohen, Danielle Aminov, and Russ Cox</i></p><p>[<a href="https://www.openwall.com/lists/oss-security/2024/03/29/4">Initial Disclosure</a>] [<a href="https://www.wiz.io/blog/cve-2024-3094-critical-rce-vulnerability-found-in-xz-utils">Wiz Blog</a>] [<a href="https://research.swtch.com/xz-timeline">Timeline</a>]</p><h3>More Money, Fewer FOSS Security Problems? The Data, Such As It Is</h3><p><i>John Speed Meyers, Sara Ann Brackett, and Stewart Scott</i></p><p>[<a href="https://archive.org/details/shmoocon2024/Shmoocon2024-JohnMeyers_SaraBrackett_%26_StewartScott-More_Money_Fewer_FOSS_Security_Problems.mp4">Video</a>]</p><h3>MUDding Around: Hacking for gold in text-based games</h3><p><i>Unix-ninja</i></p><p>[<a href="https://www.unix-ninja.com/p/mudding_around_hacking_for_gold_in_text-based_games">Blog</a>]</p><h3>DeGPT: Optimizing Decompiler Output with LLM</h3><p><i>Peiwei Hu, Ruigang Liang, and Kai Chen</i></p><p>[<a href="https://www.ndss-symposium.org/wp-content/uploads/2024-401-paper.pdf">Paper</a>]</p>
]]></content:encoded>
      <enclosure length="24157296" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/469f132c-d0a0-4cc5-84be-ff48a3ddaf98/audio/5bf41338-6338-44d2-8f5d-bc72db1dd4fb/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q1 - 2024</itunes:title>
      <itunes:author>Jacob Torrey, haroon meer, Casey Smith</itunes:author>
      <itunes:duration>00:25:09</itunes:duration>
      <itunes:summary>This is episode 11 of Thinkst&apos;s Trends &amp; Takeaways (for Q1 of 2024). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:summary>
      <itunes:subtitle>This is episode 11 of Thinkst&apos;s Trends &amp; Takeaways (for Q1 of 2024). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:subtitle>
      <itunes:keywords>thinkst, deception, information security, canary, security research, infosec, cybersecurity, cyber, blue-team, red-team, security, research, netsec</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ac6d89ce-8f59-4632-b5a3-ad9dc16b3040</guid>
      <title>ThinkstScapes Research Roundup - Q4 - 2023</title>
      <description><![CDATA[<h2>LLMs ain't making life any easier</h2><h3>Abusing Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs</h3><p><i>Tsung-Yin Hsieh, Ben Nassi, Vitaly Shmatikov, and Eugene Bagdasaryan</i></p><p>[<a href="https://i.blackhat.com/EU-23/Presentations/EU-23-Nassi-IndirectPromptInjection.pdf">Slides</a>] [<a href="https://arxiv.org/abs/2307.10490">Paper</a>] [<a href="https://github.com/ebagdasa/multimodal_injection">Code</a>]</p><h3>Tree of Attacks: Jailbreaking Black-Box LLMs Automatically</h3><p><i>Anay Mehrotra, Manolis Zampetakis, Paul Kassianik, Blaine Nelson, Hyrum Anderson, Yaron Singer, and Amin Karbasi</i></p><p>[<a href="https://arxiv.org/pdf/2312.02119.pdf">Paper</a>] [<a href="https://github.com/RICommunity/TAP">Code</a>]</p><h3>Avoiding the basilisk's fangs: State-of-the-art in AI LLM detection</h3><p><i>Jacob Torrey</i></p><p>[<a href="https://docs.google.com/presentation/d/1gXkxJlUoPDMXLmJIjkpiHHUbtqU595hgK48eI5ocNZs/edit?usp=sharing">Slides</a>] [<a href="https://github.com/thinkst/zippy">Code</a>] [<a href="https://www.youtube.com/watch?v=CIdVix6k5Jw">Video</a>]</p><h3>Dystopian much: The Rise of the Influence Machines</h3><p><i>Nea Paw</i></p><p>[<a href="https://countercloud.io/?page_id=307">Blog</a>] [<a href="https://www.youtube.com/watch?v=cwGdkrc9i2Y">Video</a>]</p><h2>Problems in well-trodden areas</h2><h3>SMTP Smuggling – Spoofing E-mails Worldwide</h3><p><i>Timo Longin</i></p><p>[<a href="https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/">Blog</a>] [<a href="https://www.youtube.com/watch?v=V8KPV96g1To">Video</a>]</p><h3>Blind CSS Exfiltration: Exfiltrate unknown web pages</h3><p><i>Gareth Heyes</i></p><p>[<a href="https://portswigger.net/kb/papers/blind-css-exfiltration-exfiltrate-unknown-web-pages-slides.pdf">Slides</a>] [<a href="https://portswigger.net/research/blind-css-exfiltration">Blog</a>] [<a href="https://github.com/hackvertor/blind-css-exfiltration">Code</a>]</p><h3>OLE object are still dangerous today – Exploiting Microsoft Office</h3><p><i>wh1tc and Zhiniang Peng</i></p><p>[<a href="https://github.com/edwardzpeng/presentations/blob/main/POC%202023/OLE%20object%20are%20still%20dangerous%20today%20%E2%80%94%20Exploiting%20Microsoft%20Office.pdf">Slides</a>] [<a href="https://github.com/edwardzpeng/presentations/tree/main/POC%202023">Demo Videos</a>]</p><h3>The Nightmare of Apple’s OTA Update</h3><p><i>Mickey Jin</i></p><p>[<a href="https://objectivebythesea.org/v6/talks/OBTS_v6_mJin.pdf">Slides</a>] [<a href="https://jhftss.github.io/The-Nightmare-of-Apple-OTA-Update/">Blog</a>] [<a href="https://www.youtube.com/watch?v=vvTuoDa-OBM">Video</a>]</p><h2>Reflecting on our efforts</h2><h3>Evaluating the Security Posture of Real-World FIDO2 Deployments</h3><p><i>Dhruv Kuchhal, Muhammad Saad, Adam Oest, and Frank Li</i></p><p>[<a href="https://dhruvkuchhal.com/papers/kuchhal2023evaluating.pdf">Paper</a>]</p><h3>Talking about Pros and Cons</h3><p><i>Jacob Torrey</i></p><p>[<a href="https://docs.google.com/presentation/d/1HqwsajQLMI3Evk2XBHRcuynP8hYIvbwzk8MuPuQhm2Y/edit?usp=sharing">Slides</a>] [<a href="https://www.youtube.com/watch?v=OzWwL8at9XI">Video</a>]</p><h3>NCC Group’s 2022 & 2023 Research Report</h3><p><i>NCC Group</i></p><p>[<a href="https://www.nccgroup.com/media/4waauopn/ncc-annual-report-2023-final.pdf">Paper</a>] [<a href="https://research.nccgroup.com/2023/12/11/ncc-groups-2022-2023-research-report/">Blog</a>]</p><h3>A 3-Year Tale of Hacking a Pwn2Own Target: The Attacks, Vendor Evolution, and Lessons Learned</h3><p><i>Orange Tsai</i></p><p>[<a href="https://romhack.io/wp-content/uploads/sites/3/2023/09/RomHack-2023-Orange-Tsai-A-3-years-tale-of-hacking-a-Pwn2Own-target.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=uGofhlB1vZU">Video</a>]</p><h2>Nifty sundries</h2><h3>Breaking "DRM" in Polish trains</h3><p><i>MrTick, Redford, and q3k</i></p><p>[<a href="https://www.youtube.com/watch?v=XrlrbfGZo2k">Video</a>]</p><h3>Detection and Blocking with BPF via YAML</h3><p><i>Kevin Sheldrake</i></p><p>[<a href="https://troopers.de/downloads/troopers23/TR23_DetectionAndBlockingWithBPFViaYAML.pdf">Slides</a>] [<a href="https://github.com/cilium/tetragon">Code</a>]</p><h3>AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis</h3><p><i>Zhiyuan Yu, Shixuan Zhai, and Ning Zhang</i></p><p>[<a href="https://cybersecurity.seas.wustl.edu/paper/AntiFakeCCS23.pdf">Paper</a>] [<a href="https://github.com/WUSTL-CSPL/AntiFake">Code</a>]</p><h3>A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier</h3><p><i>Changqing Miao, Jianan Feng, Wei You, Wenchang Shi, Jianjun Huang, and Bin Liang</i></p><p>[<a href="https://rucsesec.github.io/papers/CCS23.pdf">Paper</a>] [<a href="https://github.com/GoodPhishman/A-Good-Fishman-Knows-All-the-Angles">Code</a>]</p><h3>Spoofing DNS Records by Abusing DHCP DNS Dynamic Updates</h3><p><i>Ori David</i></p><p>[<a href="https://www.akamai.com/blog/security-research/spoofing-dns-by-abusing-dhcp">Blog</a>] [<a href="https://github.com/akamai/Invoke-DHCPCheckup">Code</a>] </p><h3>Operation Triangulation: What You Get When Attack iPhones of Researchers</h3><p><i>Boris Larin, Leonid Bezvershenko, and Georgy Kucherin</i></p><p>[<a href="https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/">Blog</a>] [<a href="https://www.youtube.com/watch?v=1f6YyH62jFE">Video</a>]</p><h3>Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping</h3><p>Jingyang Hu, Hongbo Wang, Tianyue Zheng, Jingzhi Hu, Zhe Chen, Hongbo Jiang, and Jun Luo</p><p>[<a href="https://arxiv.org/pdf/2309.03492.pdf">Paper</a>] [<a href="https://github.com/Nest-Fi/WiKI-Eve">Code</a>]</p>
]]></description>
      <pubDate>Wed, 28 Feb 2024 13:40:38 +0000</pubDate>
      <author>jacob@thinkst.com (Casey Smith, haroon meer, Jacob Torrey)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<h2>LLMs ain't making life any easier</h2><h3>Abusing Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs</h3><p><i>Tsung-Yin Hsieh, Ben Nassi, Vitaly Shmatikov, and Eugene Bagdasaryan</i></p><p>[<a href="https://i.blackhat.com/EU-23/Presentations/EU-23-Nassi-IndirectPromptInjection.pdf">Slides</a>] [<a href="https://arxiv.org/abs/2307.10490">Paper</a>] [<a href="https://github.com/ebagdasa/multimodal_injection">Code</a>]</p><h3>Tree of Attacks: Jailbreaking Black-Box LLMs Automatically</h3><p><i>Anay Mehrotra, Manolis Zampetakis, Paul Kassianik, Blaine Nelson, Hyrum Anderson, Yaron Singer, and Amin Karbasi</i></p><p>[<a href="https://arxiv.org/pdf/2312.02119.pdf">Paper</a>] [<a href="https://github.com/RICommunity/TAP">Code</a>]</p><h3>Avoiding the basilisk's fangs: State-of-the-art in AI LLM detection</h3><p><i>Jacob Torrey</i></p><p>[<a href="https://docs.google.com/presentation/d/1gXkxJlUoPDMXLmJIjkpiHHUbtqU595hgK48eI5ocNZs/edit?usp=sharing">Slides</a>] [<a href="https://github.com/thinkst/zippy">Code</a>] [<a href="https://www.youtube.com/watch?v=CIdVix6k5Jw">Video</a>]</p><h3>Dystopian much: The Rise of the Influence Machines</h3><p><i>Nea Paw</i></p><p>[<a href="https://countercloud.io/?page_id=307">Blog</a>] [<a href="https://www.youtube.com/watch?v=cwGdkrc9i2Y">Video</a>]</p><h2>Problems in well-trodden areas</h2><h3>SMTP Smuggling – Spoofing E-mails Worldwide</h3><p><i>Timo Longin</i></p><p>[<a href="https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/">Blog</a>] [<a href="https://www.youtube.com/watch?v=V8KPV96g1To">Video</a>]</p><h3>Blind CSS Exfiltration: Exfiltrate unknown web pages</h3><p><i>Gareth Heyes</i></p><p>[<a href="https://portswigger.net/kb/papers/blind-css-exfiltration-exfiltrate-unknown-web-pages-slides.pdf">Slides</a>] [<a href="https://portswigger.net/research/blind-css-exfiltration">Blog</a>] [<a href="https://github.com/hackvertor/blind-css-exfiltration">Code</a>]</p><h3>OLE object are still dangerous today – Exploiting Microsoft Office</h3><p><i>wh1tc and Zhiniang Peng</i></p><p>[<a href="https://github.com/edwardzpeng/presentations/blob/main/POC%202023/OLE%20object%20are%20still%20dangerous%20today%20%E2%80%94%20Exploiting%20Microsoft%20Office.pdf">Slides</a>] [<a href="https://github.com/edwardzpeng/presentations/tree/main/POC%202023">Demo Videos</a>]</p><h3>The Nightmare of Apple’s OTA Update</h3><p><i>Mickey Jin</i></p><p>[<a href="https://objectivebythesea.org/v6/talks/OBTS_v6_mJin.pdf">Slides</a>] [<a href="https://jhftss.github.io/The-Nightmare-of-Apple-OTA-Update/">Blog</a>] [<a href="https://www.youtube.com/watch?v=vvTuoDa-OBM">Video</a>]</p><h2>Reflecting on our efforts</h2><h3>Evaluating the Security Posture of Real-World FIDO2 Deployments</h3><p><i>Dhruv Kuchhal, Muhammad Saad, Adam Oest, and Frank Li</i></p><p>[<a href="https://dhruvkuchhal.com/papers/kuchhal2023evaluating.pdf">Paper</a>]</p><h3>Talking about Pros and Cons</h3><p><i>Jacob Torrey</i></p><p>[<a href="https://docs.google.com/presentation/d/1HqwsajQLMI3Evk2XBHRcuynP8hYIvbwzk8MuPuQhm2Y/edit?usp=sharing">Slides</a>] [<a href="https://www.youtube.com/watch?v=OzWwL8at9XI">Video</a>]</p><h3>NCC Group’s 2022 & 2023 Research Report</h3><p><i>NCC Group</i></p><p>[<a href="https://www.nccgroup.com/media/4waauopn/ncc-annual-report-2023-final.pdf">Paper</a>] [<a href="https://research.nccgroup.com/2023/12/11/ncc-groups-2022-2023-research-report/">Blog</a>]</p><h3>A 3-Year Tale of Hacking a Pwn2Own Target: The Attacks, Vendor Evolution, and Lessons Learned</h3><p><i>Orange Tsai</i></p><p>[<a href="https://romhack.io/wp-content/uploads/sites/3/2023/09/RomHack-2023-Orange-Tsai-A-3-years-tale-of-hacking-a-Pwn2Own-target.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=uGofhlB1vZU">Video</a>]</p><h2>Nifty sundries</h2><h3>Breaking "DRM" in Polish trains</h3><p><i>MrTick, Redford, and q3k</i></p><p>[<a href="https://www.youtube.com/watch?v=XrlrbfGZo2k">Video</a>]</p><h3>Detection and Blocking with BPF via YAML</h3><p><i>Kevin Sheldrake</i></p><p>[<a href="https://troopers.de/downloads/troopers23/TR23_DetectionAndBlockingWithBPFViaYAML.pdf">Slides</a>] [<a href="https://github.com/cilium/tetragon">Code</a>]</p><h3>AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis</h3><p><i>Zhiyuan Yu, Shixuan Zhai, and Ning Zhang</i></p><p>[<a href="https://cybersecurity.seas.wustl.edu/paper/AntiFakeCCS23.pdf">Paper</a>] [<a href="https://github.com/WUSTL-CSPL/AntiFake">Code</a>]</p><h3>A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier</h3><p><i>Changqing Miao, Jianan Feng, Wei You, Wenchang Shi, Jianjun Huang, and Bin Liang</i></p><p>[<a href="https://rucsesec.github.io/papers/CCS23.pdf">Paper</a>] [<a href="https://github.com/GoodPhishman/A-Good-Fishman-Knows-All-the-Angles">Code</a>]</p><h3>Spoofing DNS Records by Abusing DHCP DNS Dynamic Updates</h3><p><i>Ori David</i></p><p>[<a href="https://www.akamai.com/blog/security-research/spoofing-dns-by-abusing-dhcp">Blog</a>] [<a href="https://github.com/akamai/Invoke-DHCPCheckup">Code</a>] </p><h3>Operation Triangulation: What You Get When Attack iPhones of Researchers</h3><p><i>Boris Larin, Leonid Bezvershenko, and Georgy Kucherin</i></p><p>[<a href="https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/">Blog</a>] [<a href="https://www.youtube.com/watch?v=1f6YyH62jFE">Video</a>]</p><h3>Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping</h3><p>Jingyang Hu, Hongbo Wang, Tianyue Zheng, Jingzhi Hu, Zhe Chen, Hongbo Jiang, and Jun Luo</p><p>[<a href="https://arxiv.org/pdf/2309.03492.pdf">Paper</a>] [<a href="https://github.com/Nest-Fi/WiKI-Eve">Code</a>]</p>
]]></content:encoded>
      <enclosure length="28771139" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/779094cf-18b6-4d2f-a0e5-827fd9549440/audio/5a1429c7-e2cd-4aae-9610-3dc7a79ad252/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q4 - 2023</itunes:title>
      <itunes:author>Casey Smith, haroon meer, Jacob Torrey</itunes:author>
      <itunes:duration>00:29:58</itunes:duration>
      <itunes:summary>This is episode 10 of Thinkst&apos;s Trends &amp; Takeaways (for Q4 of 2023). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:summary>
      <itunes:subtitle>This is episode 10 of Thinkst&apos;s Trends &amp; Takeaways (for Q4 of 2023). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:subtitle>
      <itunes:keywords>thinkst, deception, information security, canary, thinkstscapes, infosec, cybersecurity, cyber, blue-team, red-team, research</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d736c6f0-5ed0-4f78-a538-1233c248ebf3</guid>
      <title>ThinkstScapes Research Roundup - Q3 - 2023</title>
      <description><![CDATA[<h2>Cryptography still isn’t easy</h2><h3>certmitm: automatic exploitation of TLS certificate validation vulnerabilities</h3><p><i>Aapo Oksman</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Aapo%20Oksman%20-%20certmitm%20automatic%20exploitation%20of%20TLS%20certificate%20validation%20vulnerabilities.pdf">Slides</a>] [<a href="https://github.com/AapoOksman/certmitm">Code</a>] [<a href="https://www.youtube.com/watch?v=w_l2q_Gyqfo">Video</a>]</p><h3>Escaping Phishermen Nets: Cryptographic Methods Unveiled in the Fight Against Reverse Proxy Attacks</h3><p><i>Ksandros Apostoli</i></p><p>[<a href="https://sec-consult.com/blog/detail/escaping-phishermen-nets-cryptographic-methods-unveiled-in-the-fight-against-reverse-proxy-attacks/">Blog</a>]</p><h3>mTLS: When certificate authentication is done wrong</h3><p><i>Michael Stepankin</i></p><p>[<a href="https://i.blackhat.com/BH-US-23/Presentations/US-23-Stepankin-mTLS-certificate-authentication-done-wrong.pdf">Slides</a>] [<a href="https://github.blog/2023-08-17-mtls-when-certificate-authentication-is-done-wrong/">Blog</a>]</p><h3>Ultrablue: User-friendly Lightweight TPM Remote Attestation over Bluetooth</h3><p><i>Nicolas Bouchinet, Loïc Buckwell, and Gabriel Kerneis</i></p><p>[<a href="https://archives.pass-the-salt.org/Pass%20the%20SALT/2023/slides/PTS2023-Talk-02-Ultrablue.pdf">Slides</a>] [<a href="https://github.com/ANSSI-FR/ultrablue">Code</a>] [<a href="https://passthesalt.ubicast.tv/videos/2023-ultrablue-user-friendly-lightweight-tpm-remote-attestation-over-bluetooth-orig/">Video</a>]</p><h3>HECO: Fully Homomorphic Encryption Compiler</h3><p><i>Alexander Viand, Patrick Jattke, Miro Haller, and Anwar Hithnawi</i></p><p>[<a href="https://www.usenix.org/system/files/sec23_slides_viand.pdf">Slides</a>] [<a href="https://www.usenix.org/system/files/usenixsecurity23-viand.pdf">Paper</a>] [<a href="https://github.com/MarbleHE/HECO">Code</a>]</p><h2>[Continued] attack of the side-channels</h2><h3>Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings</h3><p><i>Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, and Aanjhan Ranganathan</i></p><p>[<a href="https://arxiv.org/pdf/2306.07695v2.pdf">Paper</a>] [<a href="https://github.com/vaggelis-sudo/SMS-Location-Identification-Attack">Code</a>]</p><h3>Downfall: Exploiting Speculative Data Gathering</h3><p><i>Daniel Moghimi</i></p><p>[<a href="https://github.com/flowyroll/downfall/tree/main">Code</a>] [<a href="https://www.usenix.org/system/files/usenixsecurity23-moghimi.pdf">Paper</a>] </p><h3>Your Clocks Have Ears – Timing-Based Browser-Based Local Network Port Scanner</h3><p><i>Dongsung Kim</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Dongsung%20Donny%20Kim%20-%20Your%20Clocks%20Have%20Ears%20-%20Timing-Based%20Browser-Based%20Local%20Network%20Port%20Scanner.pdf">Slides</a>] [<a href="http://lan.kidi.ng/">Demo</a>] [<a href="https://www.youtube.com/watch?v=98hacQ1zpgQ">Video</a>]</p><h2>Composition is hard in the cloud</h2><h3>Using Cloudflare to bypass Cloudflare</h3><p><i>Florian Schweitzer and Stefan Proksch</i></p><p>[<a href="https://certitude.consulting/blog/en/using-cloudflare-to-bypass-cloudflare/">Blog</a>] </p><h3>The GitHub Actions Worm: Compromising GitHub repositories through the Actions dependency tree</h3><p><i>Asaf Greenholts</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Asi%20Greenholts%20-%20The%20GitHub%20Actions%20Worm%20Compromising%20GitHub%20repositories%20through%20the%20Actions%20dependency%20tree.pdf">Slides</a>] [<a href="https://www.paloaltonetworks.com/blog/prisma-cloud/github-actions-worm-dependencies/">Blog</a>] [<a href="https://www.youtube.com/watch?v=j8ZiIOd53JU">Video</a>]</p><h3>All You Need is Guest</h3><p><i>Michael Bargury</i></p><p>[<a href="https://i.blackhat.com/BH-US-23/Presentations/US-23-Bargury-All-You-Need-Is-Guest.pdf">Slides</a>] [<a href="https://github.com/mbrg/power-pwn">Code</a>]</p><h2>Nifty sundries</h2><h3>Contactless Overflow: Critical contactless vulnerabilities in NFC readers used in point of sales and ATMs</h3><p><i>Josep Pi Rodriguez</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Josep%20Pi%20Rodriguez%20-%20Contactless%20Overflow%20Code%20execution%20in%20payment%20terminals%20and%20ATM%E2%80%99s%20over%20NFC.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=eV76vObO2IM">Video</a>]</p><h3>Defender-Pretender: When Windows Defender Updates Become a Security Risk</h3><p><i>Omer Attias and Tomer Bar</i></p><p>[<a href="https://i.blackhat.com/BH-US-23/Presentations/US-23-Tomer-Defender-Pretender-final.pdf">Slides</a>] [<a href="https://github.com/SafeBreach-Labs/wd-pretender">Code</a>] </p><h3>Fuzz target generation using LLMs</h3><p><i>Dongge Liu, Jonathan Metzman, and Oliver Chang</i></p><p>[<a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html">Results</a>] [<a href="https://google.github.io/oss-fuzz/research/llms/target_generation/">Report</a>] [<a href="https://security.googleblog.com/2023/08/ai-powered-fuzzing-breaking-bug-hunting.html">Blog</a>]</p><h3>Route to Bugs: Analyzing the Security of BGP Message Parsing</h3><p><i>Daniel dos Santos, Simon Guiot, Stanislav Dashevskyi, Amine Amri, and Oussama Kerro</i></p><p>[<a href="https://i.blackhat.com/BH-US-23/Presentations/US-23-dosSantos-Route-to-Bugs-Analyzing-the-Security-of-BGP.pdf">Slides</a>] [<a href="https://github.com/Forescout/bgp_boofuzzer">Code</a>]</p><h3>It was harder to sniff Bluetooth through my mask during the pandemic…</h3><p><i>Xeno Kovah</i></p><p>[<a href="https://conference.hitb.org/hitbsecconf2023hkt/materials/D1T1%20-%20It%20Was%20Harder%20to%20Sniff%20Bluetooth%20Through%20My%20Mask%20During%20The%20Pandemic%20-%20Xeno%20Kovah.pdf">Slides</a>] [<a href="https://github.com/darkmentorllc/survey">Data</a>]</p>
]]></description>
      <pubDate>Tue, 14 Nov 2023 15:05:05 +0000</pubDate>
      <author>jacob@thinkst.com (Casey Smith, Jacob Torrey)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<h2>Cryptography still isn’t easy</h2><h3>certmitm: automatic exploitation of TLS certificate validation vulnerabilities</h3><p><i>Aapo Oksman</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Aapo%20Oksman%20-%20certmitm%20automatic%20exploitation%20of%20TLS%20certificate%20validation%20vulnerabilities.pdf">Slides</a>] [<a href="https://github.com/AapoOksman/certmitm">Code</a>] [<a href="https://www.youtube.com/watch?v=w_l2q_Gyqfo">Video</a>]</p><h3>Escaping Phishermen Nets: Cryptographic Methods Unveiled in the Fight Against Reverse Proxy Attacks</h3><p><i>Ksandros Apostoli</i></p><p>[<a href="https://sec-consult.com/blog/detail/escaping-phishermen-nets-cryptographic-methods-unveiled-in-the-fight-against-reverse-proxy-attacks/">Blog</a>]</p><h3>mTLS: When certificate authentication is done wrong</h3><p><i>Michael Stepankin</i></p><p>[<a href="https://i.blackhat.com/BH-US-23/Presentations/US-23-Stepankin-mTLS-certificate-authentication-done-wrong.pdf">Slides</a>] [<a href="https://github.blog/2023-08-17-mtls-when-certificate-authentication-is-done-wrong/">Blog</a>]</p><h3>Ultrablue: User-friendly Lightweight TPM Remote Attestation over Bluetooth</h3><p><i>Nicolas Bouchinet, Loïc Buckwell, and Gabriel Kerneis</i></p><p>[<a href="https://archives.pass-the-salt.org/Pass%20the%20SALT/2023/slides/PTS2023-Talk-02-Ultrablue.pdf">Slides</a>] [<a href="https://github.com/ANSSI-FR/ultrablue">Code</a>] [<a href="https://passthesalt.ubicast.tv/videos/2023-ultrablue-user-friendly-lightweight-tpm-remote-attestation-over-bluetooth-orig/">Video</a>]</p><h3>HECO: Fully Homomorphic Encryption Compiler</h3><p><i>Alexander Viand, Patrick Jattke, Miro Haller, and Anwar Hithnawi</i></p><p>[<a href="https://www.usenix.org/system/files/sec23_slides_viand.pdf">Slides</a>] [<a href="https://www.usenix.org/system/files/usenixsecurity23-viand.pdf">Paper</a>] [<a href="https://github.com/MarbleHE/HECO">Code</a>]</p><h2>[Continued] attack of the side-channels</h2><h3>Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings</h3><p><i>Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, and Aanjhan Ranganathan</i></p><p>[<a href="https://arxiv.org/pdf/2306.07695v2.pdf">Paper</a>] [<a href="https://github.com/vaggelis-sudo/SMS-Location-Identification-Attack">Code</a>]</p><h3>Downfall: Exploiting Speculative Data Gathering</h3><p><i>Daniel Moghimi</i></p><p>[<a href="https://github.com/flowyroll/downfall/tree/main">Code</a>] [<a href="https://www.usenix.org/system/files/usenixsecurity23-moghimi.pdf">Paper</a>] </p><h3>Your Clocks Have Ears – Timing-Based Browser-Based Local Network Port Scanner</h3><p><i>Dongsung Kim</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Dongsung%20Donny%20Kim%20-%20Your%20Clocks%20Have%20Ears%20-%20Timing-Based%20Browser-Based%20Local%20Network%20Port%20Scanner.pdf">Slides</a>] [<a href="http://lan.kidi.ng/">Demo</a>] [<a href="https://www.youtube.com/watch?v=98hacQ1zpgQ">Video</a>]</p><h2>Composition is hard in the cloud</h2><h3>Using Cloudflare to bypass Cloudflare</h3><p><i>Florian Schweitzer and Stefan Proksch</i></p><p>[<a href="https://certitude.consulting/blog/en/using-cloudflare-to-bypass-cloudflare/">Blog</a>] </p><h3>The GitHub Actions Worm: Compromising GitHub repositories through the Actions dependency tree</h3><p><i>Asaf Greenholts</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Asi%20Greenholts%20-%20The%20GitHub%20Actions%20Worm%20Compromising%20GitHub%20repositories%20through%20the%20Actions%20dependency%20tree.pdf">Slides</a>] [<a href="https://www.paloaltonetworks.com/blog/prisma-cloud/github-actions-worm-dependencies/">Blog</a>] [<a href="https://www.youtube.com/watch?v=j8ZiIOd53JU">Video</a>]</p><h3>All You Need is Guest</h3><p><i>Michael Bargury</i></p><p>[<a href="https://i.blackhat.com/BH-US-23/Presentations/US-23-Bargury-All-You-Need-Is-Guest.pdf">Slides</a>] [<a href="https://github.com/mbrg/power-pwn">Code</a>]</p><h2>Nifty sundries</h2><h3>Contactless Overflow: Critical contactless vulnerabilities in NFC readers used in point of sales and ATMs</h3><p><i>Josep Pi Rodriguez</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2031/DEF%20CON%2031%20presentations/Josep%20Pi%20Rodriguez%20-%20Contactless%20Overflow%20Code%20execution%20in%20payment%20terminals%20and%20ATM%E2%80%99s%20over%20NFC.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=eV76vObO2IM">Video</a>]</p><h3>Defender-Pretender: When Windows Defender Updates Become a Security Risk</h3><p><i>Omer Attias and Tomer Bar</i></p><p>[<a href="https://i.blackhat.com/BH-US-23/Presentations/US-23-Tomer-Defender-Pretender-final.pdf">Slides</a>] [<a href="https://github.com/SafeBreach-Labs/wd-pretender">Code</a>] </p><h3>Fuzz target generation using LLMs</h3><p><i>Dongge Liu, Jonathan Metzman, and Oliver Chang</i></p><p>[<a href="https://storage.googleapis.com/oss-fuzz-llm-targets-public/index.html">Results</a>] [<a href="https://google.github.io/oss-fuzz/research/llms/target_generation/">Report</a>] [<a href="https://security.googleblog.com/2023/08/ai-powered-fuzzing-breaking-bug-hunting.html">Blog</a>]</p><h3>Route to Bugs: Analyzing the Security of BGP Message Parsing</h3><p><i>Daniel dos Santos, Simon Guiot, Stanislav Dashevskyi, Amine Amri, and Oussama Kerro</i></p><p>[<a href="https://i.blackhat.com/BH-US-23/Presentations/US-23-dosSantos-Route-to-Bugs-Analyzing-the-Security-of-BGP.pdf">Slides</a>] [<a href="https://github.com/Forescout/bgp_boofuzzer">Code</a>]</p><h3>It was harder to sniff Bluetooth through my mask during the pandemic…</h3><p><i>Xeno Kovah</i></p><p>[<a href="https://conference.hitb.org/hitbsecconf2023hkt/materials/D1T1%20-%20It%20Was%20Harder%20to%20Sniff%20Bluetooth%20Through%20My%20Mask%20During%20The%20Pandemic%20-%20Xeno%20Kovah.pdf">Slides</a>] [<a href="https://github.com/darkmentorllc/survey">Data</a>]</p>
]]></content:encoded>
      <enclosure length="23993030" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/572a1937-5aa5-4e8b-95b2-541c3dfb9618/audio/e8da3bd8-a957-4ed5-946d-7ba0e3db8f67/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q3 - 2023</itunes:title>
      <itunes:author>Casey Smith, Jacob Torrey</itunes:author>
      <itunes:duration>00:24:59</itunes:duration>
      <itunes:summary>This is episode 9 of Thinkst&apos;s Trends &amp; Takeaways (for Q3 of 2023). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:summary>
      <itunes:subtitle>This is episode 9 of Thinkst&apos;s Trends &amp; Takeaways (for Q3 of 2023). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:subtitle>
      <itunes:keywords>thinkst, deception, canary, thinkstscapes, infosec, cyber, blue-team, red-team, security, research</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">10cbc613-a78b-41da-94aa-9f0274a89f7f</guid>
      <title>ThinkstScapes Research Roundup - Q2 - 2023</title>
      <description><![CDATA[<h2>Privacy in the modern era</h2><h3>IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation</h3><p><i>Erik Rye and Robert Beverly</i></p><p>[<a href="https://i.blackhat.com/USA21/Wednesday-Handouts/US-21-Rye-IPvSeeYou.pdf">Slides</a>] [<a href="https://arxiv.org/pdf/2208.06767.pdf">Paper</a>] [<a href="https://github.com/6int/IPvSeeYou">Code</a>]</p><h3>Device Tracking via Linux’s New TCP Source Port Selection Algorithm</h3><p><i>Moshe Kol, Amit Klein, and Yossi Gilad</i></p><p>[<a href="https://github.com/0xkol/rfc6056-device-tracker">Code</a>] [<a href="https://www.usenix.org/system/files/sec23summer_172-kol-prepub.pdf">Paper</a>]</p><h3>zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure</h3><p><i>Michael Rosenberg, Jacob White, Christina Garman, and Ian Miers</i></p><p>[<a href="https://obj.umiacs.umd.edu/ieeesp23/zk-creds.pdf">Paper</a>] [<a href="https://github.com/rozbb/zkcreds-rs">Code</a>]</p><h3>3 Years in China: A Tale of Building a REAL Full Speed Anti-Censorship Router</h3><p><i>KaiJern Lau</i></p><p>[<a href="https://conference.hitb.org/hitbsecconf2023ams/materials/D1T2%20-%203%20Years%20in%20China%20-%20A%20Tale%20of%20Building%20a%20REAL%20Full-Speed%20Anti-Censorship%20Router%20-%20Kaijern%20Lau.pdf">Slides</a>] [<a href="https://github.com/xwings/xwingswrt">Code</a>] [<a href="https://www.youtube.com/watch?v=NY7kBh3XVzE">Video</a>]</p><h2>Embedded [in]security</h2><h3>Embedded Threats: A Deep Dive into the Attack Surface and Security Implications of eSIM Technology</h3><p><i>Markus Vevier</i></p><p>[<a href="https://github.com/persistent-security/SMShell">Code</a>] [<a href="https://www.youtube.com/watch?v=5oecn43xsDg">Video</a>]</p><h3>RPMB, a secret place inside the eMMC</h3><p><i>Sergio Prado</i></p><p>[<a href="https://sergioprado.blog/rpmb-a-secret-place-inside-the-emmc/">Blog</a>]</p><h3>Compromising Garmin’s Sport Watches: A Deep Dive into GarminOS and its MonkeyC Virtual Machine</h3><p><i>Tao Sauvage</i></p><p>[<a href="https://www.anvilsecure.com/blog/compromising-garmins-sport-watches-a-deep-dive-into-garminos-and-its-monkeyc-virtual-machine.html">Blog</a>] [<a href="https://www.youtube.com/watch?v=KsqLb-l-TjA&t=1s">Video</a>] [<a href="https://conference.hitb.org/hitbsecconf2023ams/materials/D2T1%20-%20A%20Deep%20Dive%20into%20GarminOS%20and%20its%20MonkeyC%20Virtual%20Machine%20-%20Tao%20Sauvage.pdf">Slides</a>]</p><h3>The Impostor Among US(B): Off-Path Injection Attacks on USB Communications</h3><p><i>Robert Dumitru, Daniel Genkin, Andrew Wabnitz, and Yuval Yarom</i></p><p>[<a href="https://github.com/0xADE1A1DE/USB-Injection">Code</a>] [<a href="https://www.usenix.org/system/files/sec23summer_9-dumitru-prepub.pdf">Paper</a>]</p><h3>MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks</h3><p><i>Tiantian Liu, Feng Lin, Zhangsen Wang, Chao Wang, Zhongjie Ba, Li Lu, Wenyao Xu, and Kui Ren</i></p><p>[<a href="https://github.com/TitaniumLiu/MagBackdoor">Code</a>] [<a href="https://github.com/TitaniumLiu/MagBackdoor/blob/main/v3_cameraready_MagBackdoor_S_P2023_.pdf">Paper</a>]</p><h2>Issues at the operating system level</h2><h3>(Windows) Hello from the Other Side</h3><p><i>Dirk-jan Mollema</i></p><p>[<a href="https://dirkjanm.io/assets/raw/Windows%20Hello%20from%20the%20other%20side_x33fcon.pdf">Slides</a>] [<a href="https://github.com/dirkjanm/ROADtools_hybrid/">Code</a>]</p><h3>Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures</h3><p><i>Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, and Jörg Schwenk</i></p><p>[<a href="https://www.usenix.org/conference/usenixsecurity23/presentation/rohlmann">Paper</a>] [<a href="https://github.com/RUB-NDS/OOXML_Signature_Security">Code</a>]</p><h3>Dirty Bin Cache: A New Code Injection Poisoning Binary Translation Cache</h3><p><i>Koh Nakagawa</i></p><p>[<a href="https://i.blackhat.com/Asia-23/AS-23-Koh-Dirty-Bin-Cache-A-New-Code-Injection-Poisoning-Binary-Translation-Cache.pdf">Slides</a>] [<a href="https://github.com/FFRI/AotPoisoning">Code</a>]</p><h3>The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders</h3><p><i>Willy R. Vasquez, Stephen Checkoway, and Hovav Shacham</i></p><p>[<a href="https://cfp.recon.cx/media/2023/submissions/9XJF7P/resources/The_Most_Dangerous_Codec_in_the_World_REcon_2023_w_ani_xwQiIBi.pdf">Slides</a>] [<a href="https://wrv.github.io/h26forge.pdf">Paper</a>] [<a href="https://github.com/h26forge/h26forge">Code</a>]</p><h2>Nifty sundries</h2><h3>EverParse: Secure Binary Data Parsers for Everyone</h3><p><i>Tahina Ramananandro</i></p><p>[<a href="https://github.com/gangtan/LangSec-papers-and-slides/blob/main/langsec23/slides/Ramananandro.pdf">Slides</a>] [<a href="https://github.com/project-everest/everparse/">Code</a>]</p><h3>InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force Attack</h3><p><i>Yu Chen, Yang Yu, and Lidong Zhai</i></p><p>[<a href="https://www.usenix.org/system/files/sec23fall-prepub-15-chen-yu.pdf">Paper</a>]</p><h3>It’s (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses</h3><p><i>Soheil Khodayari and Giancarlo Pellegrino</i></p><p>[<a href="https://github.com/SoheilKhodayari/TheThing">Code</a>] [<a href="https://publications.cispa.saarland/3756/1/sp23_domclob.pdf">Paper</a>] [<a href="https://domclob.xyz/">Site</a>]</p><h3>Can you trust ChatGPT’s package recommendations?</h3><p><i>Bar Lanyado, Ortal Keizman, and Yair Divinsky</i></p><p>[<a href="https://vulcan.io/blog/ai-hallucinations-package-risk">Blog</a>]</p><h3>Phoenix Domain Attack: Vulnerable Links in Domain Name Delegation and Revocation</h3><p><i>Xiang Li, Baojun Liu, Xuesong Bai, Mingming Zhang, Qifan Zhang, Zhou Li, Haixin Duan, and Qi Li</i></p><p>[<a href="https://i.blackhat.com/Asia-23/AS-23-Li-Phoenix-Domain-Attack.pdf">Slides</a>] [<a href="https://i.blackhat.com/Asia-23/AS-23-Li-Phoenix-Domain-Attack-wp.pdf">Paper</a>]</p><h3>Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects</h3><p><i>Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, and Ke Xu</i></p><p>[<a href="https://wifi-interception.github.io/">Website</a>] [<a href="https://csis.gmu.edu/ksun/publications/WiFi_Interception_SP23.pdf">Paper</a>]</p>
]]></description>
      <pubDate>Sat, 5 Aug 2023 21:36:22 +0000</pubDate>
      <author>jacob@thinkst.com (haroon meer, Jacob Torrey, Casey Smith)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<h2>Privacy in the modern era</h2><h3>IPvSeeYou: Exploiting Leaked Identifiers in IPv6 for Street-Level Geolocation</h3><p><i>Erik Rye and Robert Beverly</i></p><p>[<a href="https://i.blackhat.com/USA21/Wednesday-Handouts/US-21-Rye-IPvSeeYou.pdf">Slides</a>] [<a href="https://arxiv.org/pdf/2208.06767.pdf">Paper</a>] [<a href="https://github.com/6int/IPvSeeYou">Code</a>]</p><h3>Device Tracking via Linux’s New TCP Source Port Selection Algorithm</h3><p><i>Moshe Kol, Amit Klein, and Yossi Gilad</i></p><p>[<a href="https://github.com/0xkol/rfc6056-device-tracker">Code</a>] [<a href="https://www.usenix.org/system/files/sec23summer_172-kol-prepub.pdf">Paper</a>]</p><h3>zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure</h3><p><i>Michael Rosenberg, Jacob White, Christina Garman, and Ian Miers</i></p><p>[<a href="https://obj.umiacs.umd.edu/ieeesp23/zk-creds.pdf">Paper</a>] [<a href="https://github.com/rozbb/zkcreds-rs">Code</a>]</p><h3>3 Years in China: A Tale of Building a REAL Full Speed Anti-Censorship Router</h3><p><i>KaiJern Lau</i></p><p>[<a href="https://conference.hitb.org/hitbsecconf2023ams/materials/D1T2%20-%203%20Years%20in%20China%20-%20A%20Tale%20of%20Building%20a%20REAL%20Full-Speed%20Anti-Censorship%20Router%20-%20Kaijern%20Lau.pdf">Slides</a>] [<a href="https://github.com/xwings/xwingswrt">Code</a>] [<a href="https://www.youtube.com/watch?v=NY7kBh3XVzE">Video</a>]</p><h2>Embedded [in]security</h2><h3>Embedded Threats: A Deep Dive into the Attack Surface and Security Implications of eSIM Technology</h3><p><i>Markus Vevier</i></p><p>[<a href="https://github.com/persistent-security/SMShell">Code</a>] [<a href="https://www.youtube.com/watch?v=5oecn43xsDg">Video</a>]</p><h3>RPMB, a secret place inside the eMMC</h3><p><i>Sergio Prado</i></p><p>[<a href="https://sergioprado.blog/rpmb-a-secret-place-inside-the-emmc/">Blog</a>]</p><h3>Compromising Garmin’s Sport Watches: A Deep Dive into GarminOS and its MonkeyC Virtual Machine</h3><p><i>Tao Sauvage</i></p><p>[<a href="https://www.anvilsecure.com/blog/compromising-garmins-sport-watches-a-deep-dive-into-garminos-and-its-monkeyc-virtual-machine.html">Blog</a>] [<a href="https://www.youtube.com/watch?v=KsqLb-l-TjA&t=1s">Video</a>] [<a href="https://conference.hitb.org/hitbsecconf2023ams/materials/D2T1%20-%20A%20Deep%20Dive%20into%20GarminOS%20and%20its%20MonkeyC%20Virtual%20Machine%20-%20Tao%20Sauvage.pdf">Slides</a>]</p><h3>The Impostor Among US(B): Off-Path Injection Attacks on USB Communications</h3><p><i>Robert Dumitru, Daniel Genkin, Andrew Wabnitz, and Yuval Yarom</i></p><p>[<a href="https://github.com/0xADE1A1DE/USB-Injection">Code</a>] [<a href="https://www.usenix.org/system/files/sec23summer_9-dumitru-prepub.pdf">Paper</a>]</p><h3>MagBackdoor: Beware of Your Loudspeaker as A Backdoor For Magnetic Injection Attacks</h3><p><i>Tiantian Liu, Feng Lin, Zhangsen Wang, Chao Wang, Zhongjie Ba, Li Lu, Wenyao Xu, and Kui Ren</i></p><p>[<a href="https://github.com/TitaniumLiu/MagBackdoor">Code</a>] [<a href="https://github.com/TitaniumLiu/MagBackdoor/blob/main/v3_cameraready_MagBackdoor_S_P2023_.pdf">Paper</a>]</p><h2>Issues at the operating system level</h2><h3>(Windows) Hello from the Other Side</h3><p><i>Dirk-jan Mollema</i></p><p>[<a href="https://dirkjanm.io/assets/raw/Windows%20Hello%20from%20the%20other%20side_x33fcon.pdf">Slides</a>] [<a href="https://github.com/dirkjanm/ROADtools_hybrid/">Code</a>]</p><h3>Every Signature is Broken: On the Insecurity of Microsoft Office’s OOXML Signatures</h3><p><i>Simon Rohlmann, Vladislav Mladenov, Christian Mainka, Daniel Hirschberger, and Jörg Schwenk</i></p><p>[<a href="https://www.usenix.org/conference/usenixsecurity23/presentation/rohlmann">Paper</a>] [<a href="https://github.com/RUB-NDS/OOXML_Signature_Security">Code</a>]</p><h3>Dirty Bin Cache: A New Code Injection Poisoning Binary Translation Cache</h3><p><i>Koh Nakagawa</i></p><p>[<a href="https://i.blackhat.com/Asia-23/AS-23-Koh-Dirty-Bin-Cache-A-New-Code-Injection-Poisoning-Binary-Translation-Cache.pdf">Slides</a>] [<a href="https://github.com/FFRI/AotPoisoning">Code</a>]</p><h3>The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders</h3><p><i>Willy R. Vasquez, Stephen Checkoway, and Hovav Shacham</i></p><p>[<a href="https://cfp.recon.cx/media/2023/submissions/9XJF7P/resources/The_Most_Dangerous_Codec_in_the_World_REcon_2023_w_ani_xwQiIBi.pdf">Slides</a>] [<a href="https://wrv.github.io/h26forge.pdf">Paper</a>] [<a href="https://github.com/h26forge/h26forge">Code</a>]</p><h2>Nifty sundries</h2><h3>EverParse: Secure Binary Data Parsers for Everyone</h3><p><i>Tahina Ramananandro</i></p><p>[<a href="https://github.com/gangtan/LangSec-papers-and-slides/blob/main/langsec23/slides/Ramananandro.pdf">Slides</a>] [<a href="https://github.com/project-everest/everparse/">Code</a>]</p><h3>InfinityGauntlet: Expose Smartphone Fingerprint Authentication to Brute-force Attack</h3><p><i>Yu Chen, Yang Yu, and Lidong Zhai</i></p><p>[<a href="https://www.usenix.org/system/files/sec23fall-prepub-15-chen-yu.pdf">Paper</a>]</p><h3>It’s (DOM) Clobbering Time: Attack Techniques, Prevalence, and Defenses</h3><p><i>Soheil Khodayari and Giancarlo Pellegrino</i></p><p>[<a href="https://github.com/SoheilKhodayari/TheThing">Code</a>] [<a href="https://publications.cispa.saarland/3756/1/sp23_domclob.pdf">Paper</a>] [<a href="https://domclob.xyz/">Site</a>]</p><h3>Can you trust ChatGPT’s package recommendations?</h3><p><i>Bar Lanyado, Ortal Keizman, and Yair Divinsky</i></p><p>[<a href="https://vulcan.io/blog/ai-hallucinations-package-risk">Blog</a>]</p><h3>Phoenix Domain Attack: Vulnerable Links in Domain Name Delegation and Revocation</h3><p><i>Xiang Li, Baojun Liu, Xuesong Bai, Mingming Zhang, Qifan Zhang, Zhou Li, Haixin Duan, and Qi Li</i></p><p>[<a href="https://i.blackhat.com/Asia-23/AS-23-Li-Phoenix-Domain-Attack.pdf">Slides</a>] [<a href="https://i.blackhat.com/Asia-23/AS-23-Li-Phoenix-Domain-Attack-wp.pdf">Paper</a>]</p><h3>Man-in-the-Middle Attacks without Rogue AP: When WPAs Meet ICMP Redirects</h3><p><i>Xuewei Feng, Qi Li, Kun Sun, Yuxiang Yang, and Ke Xu</i></p><p>[<a href="https://wifi-interception.github.io/">Website</a>] [<a href="https://csis.gmu.edu/ksun/publications/WiFi_Interception_SP23.pdf">Paper</a>]</p>
]]></content:encoded>
      <enclosure length="29857941" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/2ed562d1-68a9-43da-998b-d499d7508b07/audio/9d457993-d0b3-483b-8b83-15ec84e9ce1a/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q2 - 2023</itunes:title>
      <itunes:author>haroon meer, Jacob Torrey, Casey Smith</itunes:author>
      <itunes:duration>00:31:06</itunes:duration>
      <itunes:summary>This is episode 8 of Thinkst&apos;s Trends &amp; Takeaways (for Q2 of 2023). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:summary>
      <itunes:subtitle>This is episode 8 of Thinkst&apos;s Trends &amp; Takeaways (for Q2 of 2023). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:subtitle>
      <itunes:keywords>thinkst, deception, canary, security research, infosec, cyber, blue-team, red-team, security, research</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">406a967a-d356-4e04-893f-a973052c848b</guid>
      <title>ThinkstScapes Research Roundup - Q1 - 2023</title>
      <description><![CDATA[<h3>Smashing Web3 transaction simulations for fun and profit</h3><p><i>Tal Be'ery and Roi Vazan</i></p><p>[<a href="https://zengo.com/zengo-uncovers-security-vulnerabilities-in-popular-web3-transaction-simulation-solutions-the-red-pill-attack/">Blog</a>] [<a href="https://www.youtube.com/watch?v=zKqr9CHCLe0">Video</a>]</p><h3>Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection</h3><p><i>Kai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, and Mario Fritz</i></p><p>[<a href="https://arxiv.org/pdf/2302.12173.pdf">Paper</a>] [<a href="https://github.com/greshake/llm-security">Code</a>] [<a href="https://greshake.github.io/">Demo Website</a>]</p><h3>Using ZK Proofs to Fight Disinformation</h3><p><i>Trisha Datta and Dan Boneh</i></p><p>[<a href="https://iacr.org/submit/files/slides/2023/rwc/rwc2023/13/slides.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?t=2953&v=MwTK6ZQhOQg&feature=youtu.be">Video</a>] [<a href="https://github.com/TrishaDatta/circom-circuits">Code</a>] [<a href="https://medium.com/@boneh/using-zk-proofs-to-fight-disinformation-17e7d57fe52f">Blog</a>]</p><h3>Crypto Agility and Post-Quantum Cryptography @ Google</h3><p><i>Stefan Kölbl, Anvita Pandit, Rafael Misoczki, and Sophie Schmieg</i></p><p>[<a href="https://github.com/google/tink">Code</a>] [<a href="https://www.youtube.com/watch?v=IAOWRO9Qn10&t=107s">Video</a>]</p><h3>Server-side prototype pollution: Black-box detection without the DoS</h3><p><i>Gareth Heyes</i></p><p>[<a href="https://portswigger.net/research/server-side-prototype-pollution">Blog</a>] [<a href="https://portswigger.net/kb/papers/firuaml/server-side-prototype-pollution.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=LD-KcuKM_0M">Video</a>]</p><h3>Phantom of the Pipeline – Abusing Self-Hosted CI/CD Runners</h3><p><i>Adnan Khan, Mason Davis, and Matt Jackoski</i></p><p>[<a href="https://github.com/praetorian-inc/gato/blob/main/ShmooCon2023Slides.pdf">Slides</a>] [<a href="https://github.com/praetorian-inc/gato">Code</a>] [<a href="https://www.praetorian.com/blog/introducing-gato-for-ci-cd-exploitation/">Blog</a>]</p><h3>Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues</h3><p><i>Domien Schepers, Aanjhan Ranganathan, and Mathy Vanhoef</i></p><p>[<a href="https://iacr.org/submit/files/slides/2023/rwc/rwc2023/106/slides.pptx">Slides</a>] [<a href="https://www.usenix.org/system/files/sec23summer_355-schepers-prepub.pdf">Paper</a>] [<a href="https://youtu.be/IAOWRO9Qn10?t=3102">Video</a>]</p><h3>Let Me Unwind That For You: Exceptions to Backward-Edge Protection</h3><p><i>Victor Duta, Fabian Freyer, Fabio Pagani, Marius Muench, and Cristiano Giuffrida</i></p><p>[<a href="https://i.blackhat.com/EU-22/Wednesday-Briefings/EU-22-Duta-Unwinding-the-Stack-for-fun-and-profit.pdf">Slides</a>] [<a href="https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_s295_paper.pdf">Paper</a>] [<a href="https://github.com/chop-project/chop">Code</a>]</p><h3>Protect the System Call, Protect (Most of) the World with BASTION</h3><p><i>Christopher Jelesnianski, Mohannad Ismail, Yeongjin Jang, Dan Williams, and Changwoo Min</i></p><p>[<a href="https://dl.acm.org/doi/pdf/10.1145/3582016.3582066">Paper</a>]</p><h3>Interoperability in End-to-End Encrypted Messaging</h3><p><i>Esha Ghosh, Paul Grubbs, Julia Len, and Paul Rösler</i></p><p>[<a href="https://iacr.org/submit/files/slides/2023/rwc/rwc2023/94/slides.pdf">Slides</a>] [<a href="https://eprint.iacr.org/2023/386.pdf">Paper</a>] [<a href="https://youtu.be/sthXs4zJ5XU?t=3309">Video</a>]</p><h3>High Risk Users and Where to Find Them</h3><p><i>Masha Sedova</i></p><p>[<a href="https://drive.google.com/file/d/1LmFx2qz7Ucq-vODwWjaGoKqFKKjieP3d/view?usp=sharing">Paper</a>] [<a href="https://www.youtube.com/watch?v=9XGkJoakcAE">Video</a>]</p><h3>Why I write my own security tooling</h3><p><i>James Forshaw</i></p><p>[<a href="https://github.com/tyranid">Code</a>] [<a href="https://www.youtube.com/watch?v=At-SWQyp-DY">Video</a>]</p><h3>Polynonce: A tale of a novel ECDSA attack and Bitcoin tears</h3><p><i>Marco Macchetti and Nils Amiet</i></p><p>[<a href="https://research.kudelskisecurity.com/2023/03/06/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears/">Blog</a>] [<a href="https://eprint.iacr.org/2023/305">Paper</a>] [<a href="https://github.com/kudelskisecurity/ecdsa-polynomial-nonce-recurrence-attack">Code</a>]</p><h3>Finding 10x+ Performance Improvements in C++ with CodeQL</h3><p><i>Sean Heelan</i></p><p>[<a href="https://sean.heelan.io/2023/03/01/finding-10x-performance-improvements-in-c-with-codeql-part-2-2-on-combining-dynamic-and-static-analysis-for-performance-optimisation/">Blog</a>] [<a href="https://github.com/SeanHeelan/AliasExamples">Code</a>]</p><h3>Bridging the gap in the static and dynamic analysis of binaries through decompiler tomfoolery!</h3><p><i>Zion Basque</i></p><p>[<a href="https://github.com/mahaloz/decomp2dbg">Code</a>] [<a href="https://youtu.be/-J8fGMt6UmE?t=22442">Video</a>]</p>
]]></description>
      <pubDate>Fri, 26 May 2023 15:40:19 +0000</pubDate>
      <author>jacob@thinkst.com (Jacob Torrey, Casey Smith)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<h3>Smashing Web3 transaction simulations for fun and profit</h3><p><i>Tal Be'ery and Roi Vazan</i></p><p>[<a href="https://zengo.com/zengo-uncovers-security-vulnerabilities-in-popular-web3-transaction-simulation-solutions-the-red-pill-attack/">Blog</a>] [<a href="https://www.youtube.com/watch?v=zKqr9CHCLe0">Video</a>]</p><h3>Not what you've signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection</h3><p><i>Kai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, and Mario Fritz</i></p><p>[<a href="https://arxiv.org/pdf/2302.12173.pdf">Paper</a>] [<a href="https://github.com/greshake/llm-security">Code</a>] [<a href="https://greshake.github.io/">Demo Website</a>]</p><h3>Using ZK Proofs to Fight Disinformation</h3><p><i>Trisha Datta and Dan Boneh</i></p><p>[<a href="https://iacr.org/submit/files/slides/2023/rwc/rwc2023/13/slides.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?t=2953&v=MwTK6ZQhOQg&feature=youtu.be">Video</a>] [<a href="https://github.com/TrishaDatta/circom-circuits">Code</a>] [<a href="https://medium.com/@boneh/using-zk-proofs-to-fight-disinformation-17e7d57fe52f">Blog</a>]</p><h3>Crypto Agility and Post-Quantum Cryptography @ Google</h3><p><i>Stefan Kölbl, Anvita Pandit, Rafael Misoczki, and Sophie Schmieg</i></p><p>[<a href="https://github.com/google/tink">Code</a>] [<a href="https://www.youtube.com/watch?v=IAOWRO9Qn10&t=107s">Video</a>]</p><h3>Server-side prototype pollution: Black-box detection without the DoS</h3><p><i>Gareth Heyes</i></p><p>[<a href="https://portswigger.net/research/server-side-prototype-pollution">Blog</a>] [<a href="https://portswigger.net/kb/papers/firuaml/server-side-prototype-pollution.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=LD-KcuKM_0M">Video</a>]</p><h3>Phantom of the Pipeline – Abusing Self-Hosted CI/CD Runners</h3><p><i>Adnan Khan, Mason Davis, and Matt Jackoski</i></p><p>[<a href="https://github.com/praetorian-inc/gato/blob/main/ShmooCon2023Slides.pdf">Slides</a>] [<a href="https://github.com/praetorian-inc/gato">Code</a>] [<a href="https://www.praetorian.com/blog/introducing-gato-for-ci-cd-exploitation/">Blog</a>]</p><h3>Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues</h3><p><i>Domien Schepers, Aanjhan Ranganathan, and Mathy Vanhoef</i></p><p>[<a href="https://iacr.org/submit/files/slides/2023/rwc/rwc2023/106/slides.pptx">Slides</a>] [<a href="https://www.usenix.org/system/files/sec23summer_355-schepers-prepub.pdf">Paper</a>] [<a href="https://youtu.be/IAOWRO9Qn10?t=3102">Video</a>]</p><h3>Let Me Unwind That For You: Exceptions to Backward-Edge Protection</h3><p><i>Victor Duta, Fabian Freyer, Fabio Pagani, Marius Muench, and Cristiano Giuffrida</i></p><p>[<a href="https://i.blackhat.com/EU-22/Wednesday-Briefings/EU-22-Duta-Unwinding-the-Stack-for-fun-and-profit.pdf">Slides</a>] [<a href="https://www.ndss-symposium.org/wp-content/uploads/2023/02/ndss2023_s295_paper.pdf">Paper</a>] [<a href="https://github.com/chop-project/chop">Code</a>]</p><h3>Protect the System Call, Protect (Most of) the World with BASTION</h3><p><i>Christopher Jelesnianski, Mohannad Ismail, Yeongjin Jang, Dan Williams, and Changwoo Min</i></p><p>[<a href="https://dl.acm.org/doi/pdf/10.1145/3582016.3582066">Paper</a>]</p><h3>Interoperability in End-to-End Encrypted Messaging</h3><p><i>Esha Ghosh, Paul Grubbs, Julia Len, and Paul Rösler</i></p><p>[<a href="https://iacr.org/submit/files/slides/2023/rwc/rwc2023/94/slides.pdf">Slides</a>] [<a href="https://eprint.iacr.org/2023/386.pdf">Paper</a>] [<a href="https://youtu.be/sthXs4zJ5XU?t=3309">Video</a>]</p><h3>High Risk Users and Where to Find Them</h3><p><i>Masha Sedova</i></p><p>[<a href="https://drive.google.com/file/d/1LmFx2qz7Ucq-vODwWjaGoKqFKKjieP3d/view?usp=sharing">Paper</a>] [<a href="https://www.youtube.com/watch?v=9XGkJoakcAE">Video</a>]</p><h3>Why I write my own security tooling</h3><p><i>James Forshaw</i></p><p>[<a href="https://github.com/tyranid">Code</a>] [<a href="https://www.youtube.com/watch?v=At-SWQyp-DY">Video</a>]</p><h3>Polynonce: A tale of a novel ECDSA attack and Bitcoin tears</h3><p><i>Marco Macchetti and Nils Amiet</i></p><p>[<a href="https://research.kudelskisecurity.com/2023/03/06/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears/">Blog</a>] [<a href="https://eprint.iacr.org/2023/305">Paper</a>] [<a href="https://github.com/kudelskisecurity/ecdsa-polynomial-nonce-recurrence-attack">Code</a>]</p><h3>Finding 10x+ Performance Improvements in C++ with CodeQL</h3><p><i>Sean Heelan</i></p><p>[<a href="https://sean.heelan.io/2023/03/01/finding-10x-performance-improvements-in-c-with-codeql-part-2-2-on-combining-dynamic-and-static-analysis-for-performance-optimisation/">Blog</a>] [<a href="https://github.com/SeanHeelan/AliasExamples">Code</a>]</p><h3>Bridging the gap in the static and dynamic analysis of binaries through decompiler tomfoolery!</h3><p><i>Zion Basque</i></p><p>[<a href="https://github.com/mahaloz/decomp2dbg">Code</a>] [<a href="https://youtu.be/-J8fGMt6UmE?t=22442">Video</a>]</p>
]]></content:encoded>
      <enclosure length="21208200" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/6eb2c1c0-38ef-429f-a512-4cf3e0e7af69/audio/82c9999a-08bc-4805-935c-fb643d046bfa/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q1 - 2023</itunes:title>
      <itunes:author>Jacob Torrey, Casey Smith</itunes:author>
      <itunes:duration>00:22:05</itunes:duration>
      <itunes:summary>This is episode 7 of Thinkst&apos;s Trends &amp; Takeaways (for Q1 of 2023). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:summary>
      <itunes:subtitle>This is episode 7 of Thinkst&apos;s Trends &amp; Takeaways (for Q1 of 2023). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:subtitle>
      <itunes:keywords>thinkst, deception, canary, infosec, cyber, blue-team, red-team, security, research</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4240b327-b86f-4d99-a9cc-52ee6983e241</guid>
      <title>ThinkstScapes Research Roundup - Q4 - 2022</title>
      <description><![CDATA[<h3>Hacking the Cloud with SAML</h3><p><i>Felix Wilhelm</i></p><p>[<a href="http://v">Slides</a>] [<a href="https://www.youtube.com/watch?v=WHn-6xHL7mI">Video</a>]</p><h3>Announcing GUAC, a great pairing with SLSA (and SBOM)!</h3><p><i>Brandon Lum, Mihai Maruseac, Isaac Hepworth, Google Open Source Security Team</i></p><p>[<a href="https://security.googleblog.com/2022/10/announcing-guac-great-pairing-with-slsa.html">Blog</a>] [<a href="https://github.com/guacsec/guac">Code</a>] [<a href="https://www.youtube.com/watch?v=xFRNgIEzbkA">Presentation</a>]</p><h3>We sign code now</h3><p><i>William Woodruff</i></p><p>[<a href="https://blog.trailofbits.com/2022/11/08/sigstore-code-signing-verification-software-supply-chain/">Blog</a>] [<a href="https://github.com/sigstore/sigstore-python">Code</a>] [<a href="https://www.youtube.com/watch?v=Qa6EB2-rMJo">Video</a>]</p><h3>Knockout Win Against TCC - 20+ NEW Ways to Bypass Your MacOS Privacy Mechanisms</h3><p><i>Csaba Fitzl and Wojciech Regula</i></p><p>[<a href="https://i.blackhat.com/EU-22/Thursday-Briefings/EU-22-Fitzl-Knockout-Win-Against-TCC.pdf">Slides</a>] </p><h3>Farming The Apple Orchards: Living Off The Land Techniques</h3><p><i>Cedric Owens and Chris Ross</i></p><p>[<a href="https://objectivebythesea.org/v5/talks/OBTS_v5_cOwens_cRoss.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=Snwh4mMe-Cg">Video</a>]</p><h3>LOLBINed — Using Kaspersky Endpoint Security “KES” Installer to Execute Arbitrary Commands</h3><p><i>Nasreddine Bencherchali</i></p><p>[<a href="https://nasbench.medium.com/lolbined-using-kaspersky-endpoint-security-kes-installer-to-execute-arbitrary-commands-1c999f1b7fea">Blog</a>] </p><h3>POPKORN: Popping Windows Kernel Drivers At Scale</h3><p><i>Rajat Gupta, Lukas Patrick Dresel, Noah Spahn, Giovanni Vigna, Christopher Kruegel, and Taesoo Kim</i></p><p>[<a href="https://dl.acm.org/doi/pdf/10.1145/3564625.3564631">Paper</a>] [<a href="https://github.com/ucsb-seclab/popkorn-artifact">Code</a>]</p><h3>RC4 Is Still Considered Harmful</h3><p><i>James Forshaw</i></p><p>[<a href="https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html">Blog</a>]</p><h3>Kerberos’ RC4-HMAC broken in practice: spoofing PACs with MD5 collisions</h3><p><i>Tom Tervoort</i></p><p>[<a href="https://i.blackhat.com/EU-22/Thursday-Briefings/EU-22-Tervoort-Breaking-Kerberos-RC4-Cipher-and-Spoofing-Windows-PACs-wp.pdf">Paper</a>] [<a href="https://i.blackhat.com/EU-22/Thursday-Briefings/EU-22-Tervoort-Breaking-Kerberos-RC4-Cipher-and-Spoofing-Windows-PACs.pdf">Slides</a>]</p><h3>Exploring Ancient Ruins to Find Modern Bugs: Discovering a 0-Day in MS-RPC service</h3><p><i>Ophir Harpaz and Stiv Kupchik</i></p><p>[<a href="https://www.hexacon.fr/slides/Exploring-Ancient-Ruins-to-Find-New-Bugs_Hexacon2022.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=rrfI6dXMJQQ">Video</a>]</p><h3>Decentralized Identity Attack Surface</h3><p><i>Shaked Reiner</i></p><p>[<a href="https://www.cyberark.com/resources/threat-research-blog/decentralized-identity-attack-surface-part-1">Blog part 1</a>] [<a href="https://www.cyberark.com/resources/threat-research-blog/decentralized-identity-attack-surface-part-2">Blog part 2</a>]</p><h3>Drone Authentication via Acoustic Fingerprint</h3><p><i>Yufeng Diao, Yichi Zhang, Guodong Zhao, and Mohamed Khamis</i></p><p>[<a href="https://www.acsac.org/2022/program/papers/28-Diao-Machine_learning_II.pdf">Slides</a>] [<a href="https://dl.acm.org/doi/pdf/10.1145/3564625.3564653">Paper</a>]</p><h3>On the Implications of Spoofing and Jamming Aviation Datalink Applications</h3><p><i>Harshad Sathaye, Guevara Noubir, and Aanjhan Ranganathan</i></p><p>[<a href="https://www.acsac.org/2022/program/papers/71-Sathaye-Mobile_and_Wireless_Security.pdf">Slides</a>] [<a href="https://dl.acm.org/doi/pdf/10.1145/3564625.3564651">Paper</a>]</p><h3>{JS-ON: Security-OFF}: Abusing JSON-Based SQL Queries</h3><p><i>Noam Moshe</i></p><p>[<a href="https://i.blackhat.com/EU-22/Thursday-Briefings/EU-22-Noam-Moshe-JS-ON-Security-off.pdf">Slides</a>] [<a href="https://github.com/sqlmapproject/sqlmap/commit/12e3ed14ae310608293aadeeff53760366bc3556">SQLMap patch</a>] [<a href="https://claroty.com/team82/research/js-on-security-off-abusing-json-based-sql-to-bypass-waf">Blog</a>]</p><h3>Are There Wireless Hidden Cameras Spying on Me?</h3><p><i>Jeongyoon Heo, Sangwon Gil, Youngman Jung, Jinmok Kim, Donguk Kim,</i></p><p><i>Woojin Park, Yongdae Kim, Kang G. Shin, and Choong-Hoon Lee</i></p><p>[<a href="https://www.acsac.org/2022/program/papers/7-Heo-Network_Security.pdf">Slides</a>] [<a href="https://dl.acm.org/doi/pdf/10.1145/3564625.3564632">Paper</a>]</p>
]]></description>
      <pubDate>Fri, 17 Feb 2023 16:00:57 +0000</pubDate>
      <author>jacob@thinkst.com (Casey Smith, Jacob Torrey)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<h3>Hacking the Cloud with SAML</h3><p><i>Felix Wilhelm</i></p><p>[<a href="http://v">Slides</a>] [<a href="https://www.youtube.com/watch?v=WHn-6xHL7mI">Video</a>]</p><h3>Announcing GUAC, a great pairing with SLSA (and SBOM)!</h3><p><i>Brandon Lum, Mihai Maruseac, Isaac Hepworth, Google Open Source Security Team</i></p><p>[<a href="https://security.googleblog.com/2022/10/announcing-guac-great-pairing-with-slsa.html">Blog</a>] [<a href="https://github.com/guacsec/guac">Code</a>] [<a href="https://www.youtube.com/watch?v=xFRNgIEzbkA">Presentation</a>]</p><h3>We sign code now</h3><p><i>William Woodruff</i></p><p>[<a href="https://blog.trailofbits.com/2022/11/08/sigstore-code-signing-verification-software-supply-chain/">Blog</a>] [<a href="https://github.com/sigstore/sigstore-python">Code</a>] [<a href="https://www.youtube.com/watch?v=Qa6EB2-rMJo">Video</a>]</p><h3>Knockout Win Against TCC - 20+ NEW Ways to Bypass Your MacOS Privacy Mechanisms</h3><p><i>Csaba Fitzl and Wojciech Regula</i></p><p>[<a href="https://i.blackhat.com/EU-22/Thursday-Briefings/EU-22-Fitzl-Knockout-Win-Against-TCC.pdf">Slides</a>] </p><h3>Farming The Apple Orchards: Living Off The Land Techniques</h3><p><i>Cedric Owens and Chris Ross</i></p><p>[<a href="https://objectivebythesea.org/v5/talks/OBTS_v5_cOwens_cRoss.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=Snwh4mMe-Cg">Video</a>]</p><h3>LOLBINed — Using Kaspersky Endpoint Security “KES” Installer to Execute Arbitrary Commands</h3><p><i>Nasreddine Bencherchali</i></p><p>[<a href="https://nasbench.medium.com/lolbined-using-kaspersky-endpoint-security-kes-installer-to-execute-arbitrary-commands-1c999f1b7fea">Blog</a>] </p><h3>POPKORN: Popping Windows Kernel Drivers At Scale</h3><p><i>Rajat Gupta, Lukas Patrick Dresel, Noah Spahn, Giovanni Vigna, Christopher Kruegel, and Taesoo Kim</i></p><p>[<a href="https://dl.acm.org/doi/pdf/10.1145/3564625.3564631">Paper</a>] [<a href="https://github.com/ucsb-seclab/popkorn-artifact">Code</a>]</p><h3>RC4 Is Still Considered Harmful</h3><p><i>James Forshaw</i></p><p>[<a href="https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html">Blog</a>]</p><h3>Kerberos’ RC4-HMAC broken in practice: spoofing PACs with MD5 collisions</h3><p><i>Tom Tervoort</i></p><p>[<a href="https://i.blackhat.com/EU-22/Thursday-Briefings/EU-22-Tervoort-Breaking-Kerberos-RC4-Cipher-and-Spoofing-Windows-PACs-wp.pdf">Paper</a>] [<a href="https://i.blackhat.com/EU-22/Thursday-Briefings/EU-22-Tervoort-Breaking-Kerberos-RC4-Cipher-and-Spoofing-Windows-PACs.pdf">Slides</a>]</p><h3>Exploring Ancient Ruins to Find Modern Bugs: Discovering a 0-Day in MS-RPC service</h3><p><i>Ophir Harpaz and Stiv Kupchik</i></p><p>[<a href="https://www.hexacon.fr/slides/Exploring-Ancient-Ruins-to-Find-New-Bugs_Hexacon2022.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=rrfI6dXMJQQ">Video</a>]</p><h3>Decentralized Identity Attack Surface</h3><p><i>Shaked Reiner</i></p><p>[<a href="https://www.cyberark.com/resources/threat-research-blog/decentralized-identity-attack-surface-part-1">Blog part 1</a>] [<a href="https://www.cyberark.com/resources/threat-research-blog/decentralized-identity-attack-surface-part-2">Blog part 2</a>]</p><h3>Drone Authentication via Acoustic Fingerprint</h3><p><i>Yufeng Diao, Yichi Zhang, Guodong Zhao, and Mohamed Khamis</i></p><p>[<a href="https://www.acsac.org/2022/program/papers/28-Diao-Machine_learning_II.pdf">Slides</a>] [<a href="https://dl.acm.org/doi/pdf/10.1145/3564625.3564653">Paper</a>]</p><h3>On the Implications of Spoofing and Jamming Aviation Datalink Applications</h3><p><i>Harshad Sathaye, Guevara Noubir, and Aanjhan Ranganathan</i></p><p>[<a href="https://www.acsac.org/2022/program/papers/71-Sathaye-Mobile_and_Wireless_Security.pdf">Slides</a>] [<a href="https://dl.acm.org/doi/pdf/10.1145/3564625.3564651">Paper</a>]</p><h3>{JS-ON: Security-OFF}: Abusing JSON-Based SQL Queries</h3><p><i>Noam Moshe</i></p><p>[<a href="https://i.blackhat.com/EU-22/Thursday-Briefings/EU-22-Noam-Moshe-JS-ON-Security-off.pdf">Slides</a>] [<a href="https://github.com/sqlmapproject/sqlmap/commit/12e3ed14ae310608293aadeeff53760366bc3556">SQLMap patch</a>] [<a href="https://claroty.com/team82/research/js-on-security-off-abusing-json-based-sql-to-bypass-waf">Blog</a>]</p><h3>Are There Wireless Hidden Cameras Spying on Me?</h3><p><i>Jeongyoon Heo, Sangwon Gil, Youngman Jung, Jinmok Kim, Donguk Kim,</i></p><p><i>Woojin Park, Yongdae Kim, Kang G. Shin, and Choong-Hoon Lee</i></p><p>[<a href="https://www.acsac.org/2022/program/papers/7-Heo-Network_Security.pdf">Slides</a>] [<a href="https://dl.acm.org/doi/pdf/10.1145/3564625.3564632">Paper</a>]</p>
]]></content:encoded>
      <enclosure length="19077053" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/6cb7520d-d560-42aa-a243-a666dbaa03b5/audio/27d6cfd0-7d8e-4244-b639-861a21d29399/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q4 - 2022</itunes:title>
      <itunes:author>Casey Smith, Jacob Torrey</itunes:author>
      <itunes:duration>00:19:52</itunes:duration>
      <itunes:summary>This is episode 6 of Thinkst Trends &amp; Takeaways (for Q4 of 2022). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:summary>
      <itunes:subtitle>This is episode 6 of Thinkst Trends &amp; Takeaways (for Q4 of 2022). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:subtitle>
      <itunes:keywords>thinkst, canary, infosec, cyber, blue-team, red-team, security, research</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">62d08cf6-6141-4739-9198-bc29fe5d6965</guid>
      <title>ThinkstScapes Research Roundup - Q3 - 2022</title>
      <description><![CDATA[<h3>Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices</h3><p><i>Dilawer Ahmed, Anupam Das, and Fareed Zaffar</i></p><p>[<a href="https://github.com/dilawer11/iot-device-fingerprinting">Code</a>] [<a href="https://petsymposium.org/popets/2022/popets-2022-0057.pdf">Paper</a>]</p><h3>Watching the Watchers: Practical Video Identification Attack in LTE Networks</h3><p><i>Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, and Yongdae Kim</i></p><p>[<a href="https://sites.google.com/view/sec21-wtw/watching-the-watchers">Website</a>] [<a href="https://www.usenix.org/system/files/sec22-bae.pdf">Paper</a>] [<a href="https://www.youtube.com/watch?v=eLZKboRpgug">Video</a>]</p><h3>Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel</h3><p><i>Henrique Teles Maia, Chang Xiao, Dingzeyu Li, Eitan Grinspun, and Changxi Zheng</i></p><p>[<a href="https://www.usenix.org/system/files/sec22_slides-maia.pdf">Slides</a>] [<a href="https://www.usenix.org/system/files/sec22-maia.pdf">Paper</a>]</p><h3>LTrack: Stealthy Tracking of Mobile Phones in LTE</h3><p><i>Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, and Srdjan Čapkun</i></p><p>[<a href="https://www.usenix.org/system/files/sec22_slides-kotuliak.pdf">Slides</a>] [<a href="https://www.usenix.org/system/files/sec22-kotuliak.pdf">Paper</a>]</p><h3>IRMA's Idemix core: Understanding the crypto behind selective, unlinkable attribute disclosure</h3><p><i>Maja Reissner and Sietse Ringers</i></p><p>[<a href="https://irma.app/">Site</a>] [<a href="https://github.com/privacybydesign">Code</a>] [<a href="https://www.youtube.com/watch?v=wyHH8FIIomA">Video</a>]</p><h3>CryptPad: a zero knowledge collaboration platform</h3><p><i>Ludovic Dubost</i></p><p>[<a href="https://github.com/xwiki-labs/cryptpad">Code</a>] [<a href="https://passthesalt.ubicast.tv/videos/cryptpad-a-zero-knowledge-collaboration-platform">Video</a>] [<a href="https://cryptpad.org/">Site</a>]</p><h3>drand: publicly verifiable randomness explained</h3><p><i>Yolan Romailler</i></p><p>[<a href="https://www.youtube.com/watch?v=nlhbqgeGFo8">Video</a>] [<a href="https://github.com/drand/drand">Code</a>]</p><h3>A dead man’s full-yet-responsible-disclosure system</h3><p><i>Yolan Romailler</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2030/DEF%20CON%2030%20presentations/Yolan%20Romailler%20-%20A%20dead%20mans%20full-yet-responsible-disclosure%20system.pdf">Slides</a>] [<a href="https://github.com/drand/timevault">Code</a>]</p><h3>Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures</h3><p><i>Simon Rohlmann, Christian Mainka, Vladislav Mladenov, and Jörg Schwenk</i></p><p>[<a href="https://www.usenix.org/system/files/sec22_slides-rohlmann.pdf">Slides</a>] [<a href="https://www.usenix.org/system/files/sec22-rohlmann.pdf">Paper</a>]</p><h3>My data in your signed code</h3><p><i>Alex Ivkin</i></p><p>[<a href="https://github.com/alexivkin/signwriter-cs">Code</a>] [<a href="https://youtu.be/Uxf6kDyoMx8?t=6546">Video</a>]</p><h3>Can You Trust a File’s Digital Signature? New Zloader Campaign exploits Microsoft’s Signature Verification</h3><p><i>Golan Cohen</i></p><p>[<a href="https://www.youtube.com/watch?v=cD8ZlPVlcic">Video</a>] [<a href="https://research.checkpoint.com/2022/can-you-trust-a-files-digital-signature-new-zloader-campaign-exploits-microsofts-signature-verification-putting-users-at-risk/">Blog</a>]</p><h3>TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries</h3><p><i>Marcel Maehren, Philipp Nieting, Sven Hebrok, Robert Merget, Juraj Somorovsky, Jörg Schwenk</i></p><p>[<a href="https://tls-anvil.com/assets/files/TLS-Anvil-Paper-c3dbb77c9b27783fe7998d09765061c4.pdf">Slides</a>] [<a href="https://tls-anvil.com/">Website</a>] [<a href="https://github.com/tls-attacker/TLS-Anvil">Code</a>]</p><h3>Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs</h3><p><i>Jayakrishna Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doupé, Tiffany Bao, Ruoyu Wang, Christophe Hauser, and Yan Shoshitaishvili</i></p><p>[<a href="https://www.usenix.org/system/files/sec22-vadayath.pdf">Paper</a>] [<a href="https://github.com/jkrshnmenon/arbiter">Code</a>]</p><h3>In Need of 'Pair' Review: Vulnerable Code Contributions by GitHub Copilot</h3><p><i>Hammond Pearce, Benjamin Tan, Brendan Dolan-Gavitt, and Baleegh Ahmad</i></p><p>[<a href="http://i.blackhat.com/USA-22/Wednesday/US-22-Pearce-In-Need-Of-Pair-Review.pdf">Slides</a>] [<a href="http://i.blackhat.com/USA-22/Wednesday/US-22-Pearce-In-Need-Of-Pair-Review-wp.pdf">Paper</a>]</p><h3>Catch Me If You Can: Deterministic Discovery of Race Conditions with Fuzzing</h3><p><i>Ned Williamson</i></p><p>[<a href="https://i.blackhat.com/USA-22/Thursday/US-22-williamson-Catch-Me-If-You-Can.pdf">Slides</a>] [<a href="https://github.com/googleprojectzero/SockFuzzer">Code</a>]</p><h3>Someone’s Been Messing With My Subnormals!</h3><p><i>Brendan Dolan-Gavitt</i></p><p>[<a href="https://moyix.blogspot.com/2022/09/someones-been-messing-with-my-subnormals.html">Blog</a>]</p><h3>Attacking AAD by abusing the Sync API: The story behind $40K in bounties</h3><p><i>Nestori Syynimaa</i></p><p>[<a href="https://o365blog.com/talks/Attacking%20Azure%20AD%20by%20abusing%20Synchronisation%20API.pdf">Slides</a>] [<a href="https://github.com/Gerenios/AADInternals">Code</a>] [<a href="https://www.youtube.com/watch?v=HWVplPyfCDg">Video</a>]</p><h3>Towards a Tectonic Traffic Shift? Investigating Apple’s New Relay Network</h3><p><i>Patrick Sattler , Juliane Aulbach , Johannes Zirngibl , Georg Carle</i></p><p> [<a href="https://arxiv.org/pdf/2207.02112.pdf">Paper</a>] </p><h3>Hiding malware in Docker Desktop's secret virtual machine</h3><p><i>Alex Hope</i></p><p>[<a href="https://community.atlassian.com/t5/Trust-Security-articles/Hiding-malware-in-Docker-Desktop-s-virtual-machine/ba-p/1924743">Blog</a>] [<a href="https://youtu.be/4hBLf2vQc8k?t=32450">Video</a>]</p><h3>Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS</h3><p><i>Orange Tsai</i></p><p>[<a href="https://i.blackhat.com/USA-22/Wednesday/US-22-Tsai-Lets-Dance-in-the-Cache-Destabilizing-Hash-Table-on-Microsoft-IIS.pdf">Slides</a>] [<a href="https://devco.re/blog/2022/08/18/lets-dance-in-the-cache-destabilizing-hash-table-on-microsoft-iis/">Blog</a>]</p><h3>Using Trātṛ to tame Adversarial Synchronization</h3><p><i>Yuvraj Patel, Chenhao Ye, Akshat Sinha, Abigail Matthews, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, and Michael M. Swift</i></p><p>[<a href="https://www.usenix.org/system/files/sec22_slides-patel.pdf">Slides</a>] [<a href="https://www.usenix.org/system/files/sec22-patel.pdf">Paper</a>]</p>
]]></description>
      <pubDate>Fri, 4 Nov 2022 19:57:38 +0000</pubDate>
      <author>jacob@thinkst.com (Casey Smith, Jacob Torrey)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<h3>Analyzing the Feasibility and Generalizability of Fingerprinting Internet of Things Devices</h3><p><i>Dilawer Ahmed, Anupam Das, and Fareed Zaffar</i></p><p>[<a href="https://github.com/dilawer11/iot-device-fingerprinting">Code</a>] [<a href="https://petsymposium.org/popets/2022/popets-2022-0057.pdf">Paper</a>]</p><h3>Watching the Watchers: Practical Video Identification Attack in LTE Networks</h3><p><i>Sangwook Bae, Mincheol Son, Dongkwan Kim, CheolJun Park, Jiho Lee, Sooel Son, and Yongdae Kim</i></p><p>[<a href="https://sites.google.com/view/sec21-wtw/watching-the-watchers">Website</a>] [<a href="https://www.usenix.org/system/files/sec22-bae.pdf">Paper</a>] [<a href="https://www.youtube.com/watch?v=eLZKboRpgug">Video</a>]</p><h3>Can one hear the shape of a neural network?: Snooping the GPU via Magnetic Side Channel</h3><p><i>Henrique Teles Maia, Chang Xiao, Dingzeyu Li, Eitan Grinspun, and Changxi Zheng</i></p><p>[<a href="https://www.usenix.org/system/files/sec22_slides-maia.pdf">Slides</a>] [<a href="https://www.usenix.org/system/files/sec22-maia.pdf">Paper</a>]</p><h3>LTrack: Stealthy Tracking of Mobile Phones in LTE</h3><p><i>Martin Kotuliak, Simon Erni, Patrick Leu, Marc Röschlin, and Srdjan Čapkun</i></p><p>[<a href="https://www.usenix.org/system/files/sec22_slides-kotuliak.pdf">Slides</a>] [<a href="https://www.usenix.org/system/files/sec22-kotuliak.pdf">Paper</a>]</p><h3>IRMA's Idemix core: Understanding the crypto behind selective, unlinkable attribute disclosure</h3><p><i>Maja Reissner and Sietse Ringers</i></p><p>[<a href="https://irma.app/">Site</a>] [<a href="https://github.com/privacybydesign">Code</a>] [<a href="https://www.youtube.com/watch?v=wyHH8FIIomA">Video</a>]</p><h3>CryptPad: a zero knowledge collaboration platform</h3><p><i>Ludovic Dubost</i></p><p>[<a href="https://github.com/xwiki-labs/cryptpad">Code</a>] [<a href="https://passthesalt.ubicast.tv/videos/cryptpad-a-zero-knowledge-collaboration-platform">Video</a>] [<a href="https://cryptpad.org/">Site</a>]</p><h3>drand: publicly verifiable randomness explained</h3><p><i>Yolan Romailler</i></p><p>[<a href="https://www.youtube.com/watch?v=nlhbqgeGFo8">Video</a>] [<a href="https://github.com/drand/drand">Code</a>]</p><h3>A dead man’s full-yet-responsible-disclosure system</h3><p><i>Yolan Romailler</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2030/DEF%20CON%2030%20presentations/Yolan%20Romailler%20-%20A%20dead%20mans%20full-yet-responsible-disclosure%20system.pdf">Slides</a>] [<a href="https://github.com/drand/timevault">Code</a>]</p><h3>Oops... Code Execution and Content Spoofing: The First Comprehensive Analysis of OpenDocument Signatures</h3><p><i>Simon Rohlmann, Christian Mainka, Vladislav Mladenov, and Jörg Schwenk</i></p><p>[<a href="https://www.usenix.org/system/files/sec22_slides-rohlmann.pdf">Slides</a>] [<a href="https://www.usenix.org/system/files/sec22-rohlmann.pdf">Paper</a>]</p><h3>My data in your signed code</h3><p><i>Alex Ivkin</i></p><p>[<a href="https://github.com/alexivkin/signwriter-cs">Code</a>] [<a href="https://youtu.be/Uxf6kDyoMx8?t=6546">Video</a>]</p><h3>Can You Trust a File’s Digital Signature? New Zloader Campaign exploits Microsoft’s Signature Verification</h3><p><i>Golan Cohen</i></p><p>[<a href="https://www.youtube.com/watch?v=cD8ZlPVlcic">Video</a>] [<a href="https://research.checkpoint.com/2022/can-you-trust-a-files-digital-signature-new-zloader-campaign-exploits-microsofts-signature-verification-putting-users-at-risk/">Blog</a>]</p><h3>TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries</h3><p><i>Marcel Maehren, Philipp Nieting, Sven Hebrok, Robert Merget, Juraj Somorovsky, Jörg Schwenk</i></p><p>[<a href="https://tls-anvil.com/assets/files/TLS-Anvil-Paper-c3dbb77c9b27783fe7998d09765061c4.pdf">Slides</a>] [<a href="https://tls-anvil.com/">Website</a>] [<a href="https://github.com/tls-attacker/TLS-Anvil">Code</a>]</p><h3>Arbiter: Bridging the Static and Dynamic Divide in Vulnerability Discovery on Binary Programs</h3><p><i>Jayakrishna Vadayath, Moritz Eckert, Kyle Zeng, Nicolaas Weideman, Gokulkrishna Praveen Menon, Yanick Fratantonio, Davide Balzarotti, Adam Doupé, Tiffany Bao, Ruoyu Wang, Christophe Hauser, and Yan Shoshitaishvili</i></p><p>[<a href="https://www.usenix.org/system/files/sec22-vadayath.pdf">Paper</a>] [<a href="https://github.com/jkrshnmenon/arbiter">Code</a>]</p><h3>In Need of 'Pair' Review: Vulnerable Code Contributions by GitHub Copilot</h3><p><i>Hammond Pearce, Benjamin Tan, Brendan Dolan-Gavitt, and Baleegh Ahmad</i></p><p>[<a href="http://i.blackhat.com/USA-22/Wednesday/US-22-Pearce-In-Need-Of-Pair-Review.pdf">Slides</a>] [<a href="http://i.blackhat.com/USA-22/Wednesday/US-22-Pearce-In-Need-Of-Pair-Review-wp.pdf">Paper</a>]</p><h3>Catch Me If You Can: Deterministic Discovery of Race Conditions with Fuzzing</h3><p><i>Ned Williamson</i></p><p>[<a href="https://i.blackhat.com/USA-22/Thursday/US-22-williamson-Catch-Me-If-You-Can.pdf">Slides</a>] [<a href="https://github.com/googleprojectzero/SockFuzzer">Code</a>]</p><h3>Someone’s Been Messing With My Subnormals!</h3><p><i>Brendan Dolan-Gavitt</i></p><p>[<a href="https://moyix.blogspot.com/2022/09/someones-been-messing-with-my-subnormals.html">Blog</a>]</p><h3>Attacking AAD by abusing the Sync API: The story behind $40K in bounties</h3><p><i>Nestori Syynimaa</i></p><p>[<a href="https://o365blog.com/talks/Attacking%20Azure%20AD%20by%20abusing%20Synchronisation%20API.pdf">Slides</a>] [<a href="https://github.com/Gerenios/AADInternals">Code</a>] [<a href="https://www.youtube.com/watch?v=HWVplPyfCDg">Video</a>]</p><h3>Towards a Tectonic Traffic Shift? Investigating Apple’s New Relay Network</h3><p><i>Patrick Sattler , Juliane Aulbach , Johannes Zirngibl , Georg Carle</i></p><p> [<a href="https://arxiv.org/pdf/2207.02112.pdf">Paper</a>] </p><h3>Hiding malware in Docker Desktop's secret virtual machine</h3><p><i>Alex Hope</i></p><p>[<a href="https://community.atlassian.com/t5/Trust-Security-articles/Hiding-malware-in-Docker-Desktop-s-virtual-machine/ba-p/1924743">Blog</a>] [<a href="https://youtu.be/4hBLf2vQc8k?t=32450">Video</a>]</p><h3>Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS</h3><p><i>Orange Tsai</i></p><p>[<a href="https://i.blackhat.com/USA-22/Wednesday/US-22-Tsai-Lets-Dance-in-the-Cache-Destabilizing-Hash-Table-on-Microsoft-IIS.pdf">Slides</a>] [<a href="https://devco.re/blog/2022/08/18/lets-dance-in-the-cache-destabilizing-hash-table-on-microsoft-iis/">Blog</a>]</p><h3>Using Trātṛ to tame Adversarial Synchronization</h3><p><i>Yuvraj Patel, Chenhao Ye, Akshat Sinha, Abigail Matthews, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, and Michael M. Swift</i></p><p>[<a href="https://www.usenix.org/system/files/sec22_slides-patel.pdf">Slides</a>] [<a href="https://www.usenix.org/system/files/sec22-patel.pdf">Paper</a>]</p>
]]></content:encoded>
      <enclosure length="30582240" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/8119fa01-9c50-4d66-b48c-a4bd134f3a63/audio/da7e01ba-50d1-42a1-88ef-71dbb59330f0/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q3 - 2022</itunes:title>
      <itunes:author>Casey Smith, Jacob Torrey</itunes:author>
      <itunes:duration>00:31:51</itunes:duration>
      <itunes:summary>This is episode 5 of Thinkst Trends &amp; Takeaways (for Q3 of 2022). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:summary>
      <itunes:subtitle>This is episode 5 of Thinkst Trends &amp; Takeaways (for Q3 of 2022). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:subtitle>
      <itunes:keywords>thinkst, canary, infosec, cyber, blue-team, red-team, security, research</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ad7d508a-b71e-4904-8d30-2da996a9bffd</guid>
      <title>ThinkstScapes Research Roundup - Q2 - 2022</title>
      <description><![CDATA[<h3>I am become loadbalancer, owner of your network</h3><p><i>Nate Warfield</i></p><p>[<a href="https://github.com/n0x08/ConferenceTalks/blob/master/BecomeLoadbalancer_TR22.pdf">Slides</a>]</p><h3>Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones</h3><p><i>Jiska Classen, Alexander Heinrich, Robert Reith, and Matthias Hollick</i></p><p>[<a href="https://cfp.recon.cx/media/2022/submissions/CWVB8J/resources/2022-06-05_lpm_hbukXAo.pdf">Slides</a>] [<a href="https://arxiv.org/pdf/2205.06114.pdf">Paper</a>]</p><h3>AirTag of the Clones: Shenanigans with Liberated Item Finders</h3><p><i>Thomas Roth, Fabian Freyer, Matthias Hollick, and Jiska Classen</i></p><p>[<a href="https://github.com/seemoo-lab/airtag/blob/main/woot22-paper.pdf">Paper</a>] [<a href="https://github.com/seemoo-lab/airtag/">Code</a>]</p><h3>Are Blockchains Decentralised?</h3><p><i>Evan Sultanik, Alexander Remie, Felipe Manzano, Trent Brunson, Sam Moelius, Eric Kilmer, Mike Myers, Talley Amir, and Sonya Schriner</i></p><p>[<a href="https://blog.trailofbits.com/2022/06/21/are-blockchains-decentralized/">Blog</a>] [<a href="https://www.trailofbits.com/reports/Unintended_Centralities_in_Distributed_Ledgers.pdf">Paper</a>] [<a href="https://trailofbits.audio/episodes/immutable">Audio</a>]</p><h3>What Log4j teaches us about the Software Supply Chain</h3><p><i>Stephen Magill</i></p><p>[<a href="https://cps-vo.org/file/83859/download/246502">Slides</a>] [<a href="https://www.youtube.com/watch?v=NqGcxqNLm5E">Video</a>]</p><h3>Kani Rust Verifier</h3><p><i>Daniel Schwartz-Narbonne and Zyad Hassan</i></p><p>[<a href="https://cps-vo.org/file/83874/download/242266">Slides</a>] [<a href="https://www.youtube.com/watch?v=5zg9We2n9Hs">Video</a>] [<a href="https://github.com/model-checking/kani">Code</a>]</p><h3>Cross-Language Attacks</h3><p><i>Samuel Mergendahl, Nathan Burow, and Hamed Okhravi</i></p><p>[<a href="https://www.ndss-symposium.org/wp-content/uploads/2022-78-paper.pdf">Paper</a>]</p><h3>Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats</h3><p><i>Giorgio Di Tizio, Michele Armellini, and Fabio Massacci</i></p><p>[<a href="https://arxiv.org/pdf/2205.07759.pdf">Paper</a>] [<a href="https://github.com/giorgioditizio/APTs-database/tree/v1.0.0">Data</a>]</p><h3>AMD Secure Processor for Confidential Computing Security Review</h3><p><i>Cfir Cohen, James Forshaw, Jann Horn, and Mark Brand</i></p><p>[<a href="https://cloud.google.com/blog/products/identity-security/google-amd-partner-to-build-a-more-secure-future-with-confidential-computing">Blog</a>] [<a href="https://storage.googleapis.com/gweb-uniblog-publish-prod/documents/AMD_GPZ-Technical_Report_FINAL_05_2022.pdf">Paper</a>]</p><h3>Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware Ecosystem</h3><p><i>Matt Graebar</i></p><p>[<a href="https://cfp.recon.cx/media/2022/submissions/MNTFHS/resources/Living-Off-the-Walled-Garden_Abusing-the-Features-of-t_dpLG8LN.pdf">Slides</a>]</p><h3>A Kernel Hacker Meets Fuchsia OS</h3><p><i>Alexander Popov</i></p><p>[<a href="https://a13xp0p0v.github.io/2022/05/24/pwn-fuchsia.html">Blog</a>] [<a href="https://www.youtube.com/watch?v=JPg-VHuKQIQ">Video</a>]</p><h3>Adaptive Multi-objective Optimization in Gray-box Fuzzing</h3><p><i>Gen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang, Xu Zhou, and Kai Lu</i></p><p>[<a href="https://www.ndss-symposium.org/wp-content/uploads/2022-314-paper.pdf">Paper</a>]</p><h3>Cooper Knows the Shortest Stave: Finding 134 Bugs in the Binding Code of Scripting Languages with Cooperative Mutation</h3><p><i>Xu Peng, Yanhao Wang, Hong Hu, and Purui Su</i></p><p>[<a href="https://i.blackhat.com/Asia-22/Friday-Materials/AS-22-PengXu-Cooper-Knows-the-Shortest-Stave-Finding-134-Bugs-in-the-Binding-Code.pdf">Slides</a>] [<a href="https://www.ndss-symposium.org/wp-content/uploads/2022-353-paper.pdf">Paper</a>] [<a href="https://github.com/TCA-ISCAS/Cooper">Code</a>]</p><h3>Bypassing CSP with dangling iframes</h3><p><i>Gareth Heyes</i></p><p>[<a href="https://portswigger.net/research/bypassing-csp-with-dangling-iframes">Blog</a>] </p><h3>Bypassing Dangling Markup Injection Mitigation Bypass in Chrome</h3><p><i>SeungJu Oh</i></p><p> [<a href="https://bugs.chromium.org/p/chromium/issues/detail?id=1297138">Bug report</a>] [<a href="https://portswigger.net/daily-swig/chromium-browsers-vulnerable-to-dangling-markup-injection">Blog</a>]</p><h3>Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web</h3><p><i>Avinash Sudhodanan and Andrew Paverd</i></p><p>[<a href="https://msrc-blog.microsoft.com/2022/05/23/pre-hijacking-attacks/">Blog</a>] [<a href="https://arxiv.org/abs/2205.10174">Paper</a>]</p>
]]></description>
      <pubDate>Fri, 29 Jul 2022 13:47:09 +0000</pubDate>
      <author>jacob@thinkst.com (Casey Smith, Jacob Torrey)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<h3>I am become loadbalancer, owner of your network</h3><p><i>Nate Warfield</i></p><p>[<a href="https://github.com/n0x08/ConferenceTalks/blob/master/BecomeLoadbalancer_TR22.pdf">Slides</a>]</p><h3>Evil Never Sleeps: When Wireless Malware Stays On After Turning Off iPhones</h3><p><i>Jiska Classen, Alexander Heinrich, Robert Reith, and Matthias Hollick</i></p><p>[<a href="https://cfp.recon.cx/media/2022/submissions/CWVB8J/resources/2022-06-05_lpm_hbukXAo.pdf">Slides</a>] [<a href="https://arxiv.org/pdf/2205.06114.pdf">Paper</a>]</p><h3>AirTag of the Clones: Shenanigans with Liberated Item Finders</h3><p><i>Thomas Roth, Fabian Freyer, Matthias Hollick, and Jiska Classen</i></p><p>[<a href="https://github.com/seemoo-lab/airtag/blob/main/woot22-paper.pdf">Paper</a>] [<a href="https://github.com/seemoo-lab/airtag/">Code</a>]</p><h3>Are Blockchains Decentralised?</h3><p><i>Evan Sultanik, Alexander Remie, Felipe Manzano, Trent Brunson, Sam Moelius, Eric Kilmer, Mike Myers, Talley Amir, and Sonya Schriner</i></p><p>[<a href="https://blog.trailofbits.com/2022/06/21/are-blockchains-decentralized/">Blog</a>] [<a href="https://www.trailofbits.com/reports/Unintended_Centralities_in_Distributed_Ledgers.pdf">Paper</a>] [<a href="https://trailofbits.audio/episodes/immutable">Audio</a>]</p><h3>What Log4j teaches us about the Software Supply Chain</h3><p><i>Stephen Magill</i></p><p>[<a href="https://cps-vo.org/file/83859/download/246502">Slides</a>] [<a href="https://www.youtube.com/watch?v=NqGcxqNLm5E">Video</a>]</p><h3>Kani Rust Verifier</h3><p><i>Daniel Schwartz-Narbonne and Zyad Hassan</i></p><p>[<a href="https://cps-vo.org/file/83874/download/242266">Slides</a>] [<a href="https://www.youtube.com/watch?v=5zg9We2n9Hs">Video</a>] [<a href="https://github.com/model-checking/kani">Code</a>]</p><h3>Cross-Language Attacks</h3><p><i>Samuel Mergendahl, Nathan Burow, and Hamed Okhravi</i></p><p>[<a href="https://www.ndss-symposium.org/wp-content/uploads/2022-78-paper.pdf">Paper</a>]</p><h3>Software Updates Strategies: A Quantitative Evaluation Against Advanced Persistent Threats</h3><p><i>Giorgio Di Tizio, Michele Armellini, and Fabio Massacci</i></p><p>[<a href="https://arxiv.org/pdf/2205.07759.pdf">Paper</a>] [<a href="https://github.com/giorgioditizio/APTs-database/tree/v1.0.0">Data</a>]</p><h3>AMD Secure Processor for Confidential Computing Security Review</h3><p><i>Cfir Cohen, James Forshaw, Jann Horn, and Mark Brand</i></p><p>[<a href="https://cloud.google.com/blog/products/identity-security/google-amd-partner-to-build-a-more-secure-future-with-confidential-computing">Blog</a>] [<a href="https://storage.googleapis.com/gweb-uniblog-publish-prod/documents/AMD_GPZ-Technical_Report_FINAL_05_2022.pdf">Paper</a>]</p><h3>Living Off the Walled Garden: Abusing the Features of the Early Launch Antimalware Ecosystem</h3><p><i>Matt Graebar</i></p><p>[<a href="https://cfp.recon.cx/media/2022/submissions/MNTFHS/resources/Living-Off-the-Walled-Garden_Abusing-the-Features-of-t_dpLG8LN.pdf">Slides</a>]</p><h3>A Kernel Hacker Meets Fuchsia OS</h3><p><i>Alexander Popov</i></p><p>[<a href="https://a13xp0p0v.github.io/2022/05/24/pwn-fuchsia.html">Blog</a>] [<a href="https://www.youtube.com/watch?v=JPg-VHuKQIQ">Video</a>]</p><h3>Adaptive Multi-objective Optimization in Gray-box Fuzzing</h3><p><i>Gen Zhang, Pengfei Wang, Tai Yue, Xiangdong Kong, Shan Huang, Xu Zhou, and Kai Lu</i></p><p>[<a href="https://www.ndss-symposium.org/wp-content/uploads/2022-314-paper.pdf">Paper</a>]</p><h3>Cooper Knows the Shortest Stave: Finding 134 Bugs in the Binding Code of Scripting Languages with Cooperative Mutation</h3><p><i>Xu Peng, Yanhao Wang, Hong Hu, and Purui Su</i></p><p>[<a href="https://i.blackhat.com/Asia-22/Friday-Materials/AS-22-PengXu-Cooper-Knows-the-Shortest-Stave-Finding-134-Bugs-in-the-Binding-Code.pdf">Slides</a>] [<a href="https://www.ndss-symposium.org/wp-content/uploads/2022-353-paper.pdf">Paper</a>] [<a href="https://github.com/TCA-ISCAS/Cooper">Code</a>]</p><h3>Bypassing CSP with dangling iframes</h3><p><i>Gareth Heyes</i></p><p>[<a href="https://portswigger.net/research/bypassing-csp-with-dangling-iframes">Blog</a>] </p><h3>Bypassing Dangling Markup Injection Mitigation Bypass in Chrome</h3><p><i>SeungJu Oh</i></p><p> [<a href="https://bugs.chromium.org/p/chromium/issues/detail?id=1297138">Bug report</a>] [<a href="https://portswigger.net/daily-swig/chromium-browsers-vulnerable-to-dangling-markup-injection">Blog</a>]</p><h3>Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web</h3><p><i>Avinash Sudhodanan and Andrew Paverd</i></p><p>[<a href="https://msrc-blog.microsoft.com/2022/05/23/pre-hijacking-attacks/">Blog</a>] [<a href="https://arxiv.org/abs/2205.10174">Paper</a>]</p>
]]></content:encoded>
      <enclosure length="28761261" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/edacbb81-8ad9-4d36-96de-f4511acc5867/audio/68113cde-022d-41ae-8ff0-d5cbedf7d853/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q2 - 2022</itunes:title>
      <itunes:author>Casey Smith, Jacob Torrey</itunes:author>
      <itunes:duration>00:29:57</itunes:duration>
      <itunes:summary>This is episode 4 of Thinkst Trends &amp; Takeaways (for Q2 of 2022). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:summary>
      <itunes:subtitle>This is episode 4 of Thinkst Trends &amp; Takeaways (for Q2 of 2022). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:subtitle>
      <itunes:keywords>thinkst, canary, infosec, cyber, blue-team, red-team, security, research</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e127ad40-821c-4f34-b946-4dd83f496de1</guid>
      <title>ThinkstScapes Research Roundup - Q1 - 2022</title>
      <description><![CDATA[<h3>Hyntrospect: a fuzzer for Hyper-V devices</h3><p><i>Diane Dubois</i></p><p>[<a href="https://github.com/0xdidu/Presentations/blob/main/BHIL2022_Hyntrospect.pdf">Slides</a>] [<a href="https://www.sstic.org/media/SSTIC2021/SSTIC-actes/hyntrospect_a_fuzzer_for_hyper-v_devices/SSTIC2021-Article-hyntrospect_a_fuzzer_for_hyper-v_devices-dubois.pdf">Paper</a>] [<a href="https://github.com/googleprojectzero/Hyntrospect">Code</a>] [<a href="https://www.youtube.com/watch?v=kRG-W-HPQPI&list=PLnWGkkkDVeqiTAdYxmGJnAGpjSNRSKwKm&index=10">Video</a>]</p><h3>Put an io_uring on it: Exploiting the Linux Kernel</h3><p><i>Valentina Palmiotti</i></p><p>[<a href="https://www.graplsecurity.com/post/iou-ring-exploiting-the-linux-kernel">Blog</a>]</p><h3>The AMD Branch (Mis)predictor: Where No CPU has Gone Before</h3><p><i>Pawel Wieczorkiewicz</i></p><p>[<a href="https://grsecurity.net/amd_branch_mispredictor_just_set_it_and_forget_it">Blog part 1</a>] [<a href="https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before">Blog part 2</a>]</p><h3>Dynamic Process Isolation</h3><p><i>Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, and Michael Schwarz</i></p><p>[<a href="https://arxiv.org/pdf/2110.04751.pdf">Paper</a>]</p><h3>Another Brick in the Wall: Uncovering SMM Vulnerabilities in HP Firmware</h3><p><i>Itai Liba, and Assaf Carlsbad</i></p><p>[<a href="https://www.sentinelone.com/labs/another-brick-in-the-wall-uncovering-smm-vulnerabilities-in-hp-firmware/">Blog</a>] [<a href="https://github.com/Sentinel-One/brick">Code</a>]</p><h3>Confidential Containers: Bringing Confidential Computing to the Kubernetes Workload Masses</h3><p><i>Samuel Ortiz</i></p><p>[<a href="https://www.youtube.com/watch?v=WvhV7L_3phY">Video</a>]</p><h3>Kubernetes Meets Confidential Computing - The Different Ways of Scaling Sensitive Workloads</h3><p><i>Moritz Eckert</i></p><p>[<a href="https://www.youtube.com/watch?v=OUrv2CUvfrY">Video</a>]</p><h3>Implementing Post-quantum Cryptography for Developers</h3><p><i>Julius Hekkala, Kimmo Halunen, and Visa Vallivaara</i></p><p>[<a href="https://www.scitepress.org/Papers/2022/107862/107862.pdf">Paper</a>]</p><h3>CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes</h3><p><i>Hao Huang, Yongtao Wang, Zhaoyu Chen, Yu Ze Zhang, Yuheng Li, Zhi Tang, Wei Chu, Jingdong Chen, Weisi Lin, and Kai-Kuang Ma</i></p><p>[<a href="https://www.aaai.org/AAAI22Papers/AAAI-1867.HuangH.pdf">Paper</a>] [<a href="https://github.com/VDIGPKU/CMUA-Watermark">Code</a>]</p><h3>Leashing the Inner Demons: Self-Detoxification for Language Models</h3><p><i>Canwen Xu, Zexue He, Zhankui He, and Julian McAuley</i></p><p>[<a href="https://www.aaai.org/AAAI22Papers/AAAI-4620.XuC.pdf">Paper</a>] [<a href="https://github.com/JetRunner/leash-demon">Code</a>]</p><h3>Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems</h3><p><i>Wei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, and Gang Qu</i></p><p>[<a href="https://arxiv.org/pdf/2201.06192.pdf">Paper</a>]</p><h3>Synthetic Disinformation Attacks on Automated Fact Verification Systems</h3><p><i>Yibing Du, Antoine Bosselut, Christopher D. Manning</i></p><p>[<a href="https://www.aaai.org/AAAI22Papers/AAAI-11986.DuY.pdf">Paper</a>]</p><h3>Why No One Pwned Synology at Pwn2Own and Tianfu Cup in 2021</h3><p><i>Eugene Lim, and Loke Hui Yi</i></p><p>[<a href="https://drive.google.com/file/d/1MYCNVKkNETkqS-cLJsqHE43Sfm4LZbCO/view">Slides</a>]</p><h3>DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting</h3><p><i>Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, and Yuval Yarom</i></p><p>[<a href="https://arxiv.org/pdf/2201.09956.pdf">Paper</a>] [<a href="https://github.com/drawnapart/drawnapart">Code</a>]</p><h3>Attacking JavaScript Engines in 2022</h3><p><i>Samuel Groß, and Amanda Burnett</i></p><p>[<a href="https://saelo.github.io/presentations/offensivecon_22_attacking_javascript_engines.pdf">Slides</a>]</p><h3>Security Analysis of MTE Through Examples</h3><p><i>Saar Amar</i></p><p>[<a href="https://msrndcdn360.blob.core.windows.net/bluehat/bluehatil/2022/assets/doc/Security%20Analysis%20of%20MTE%20Through%20Examples__Saar%20Amar.pdf">Slides</a>] [<a href="https://youtu.be/LV8BK1ns1Ow">Video</a>]</p><h3>An Armful of CHERIs</h3><p><i>Saar Amar, Nicholas Joly, David Chisnall, Manuel Costa, Sylvan Clebsch, Wes Filardo, Boris Köpf, Robert Norton-Wright, and Matthew Parkison</i></p><p>[<a href="https://msrc-blog.microsoft.com/2022/01/20/an_armful_of_cheris/">Blog</a>]</p>
]]></description>
      <pubDate>Mon, 25 Apr 2022 13:30:10 +0000</pubDate>
      <author>jacob@thinkst.com (Jacob Torrey, Marco Slaviero)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<h3>Hyntrospect: a fuzzer for Hyper-V devices</h3><p><i>Diane Dubois</i></p><p>[<a href="https://github.com/0xdidu/Presentations/blob/main/BHIL2022_Hyntrospect.pdf">Slides</a>] [<a href="https://www.sstic.org/media/SSTIC2021/SSTIC-actes/hyntrospect_a_fuzzer_for_hyper-v_devices/SSTIC2021-Article-hyntrospect_a_fuzzer_for_hyper-v_devices-dubois.pdf">Paper</a>] [<a href="https://github.com/googleprojectzero/Hyntrospect">Code</a>] [<a href="https://www.youtube.com/watch?v=kRG-W-HPQPI&list=PLnWGkkkDVeqiTAdYxmGJnAGpjSNRSKwKm&index=10">Video</a>]</p><h3>Put an io_uring on it: Exploiting the Linux Kernel</h3><p><i>Valentina Palmiotti</i></p><p>[<a href="https://www.graplsecurity.com/post/iou-ring-exploiting-the-linux-kernel">Blog</a>]</p><h3>The AMD Branch (Mis)predictor: Where No CPU has Gone Before</h3><p><i>Pawel Wieczorkiewicz</i></p><p>[<a href="https://grsecurity.net/amd_branch_mispredictor_just_set_it_and_forget_it">Blog part 1</a>] [<a href="https://grsecurity.net/amd_branch_mispredictor_part_2_where_no_cpu_has_gone_before">Blog part 2</a>]</p><h3>Dynamic Process Isolation</h3><p><i>Martin Schwarzl, Pietro Borrello, Andreas Kogler, Kenton Varda, Thomas Schuster, Daniel Gruss, and Michael Schwarz</i></p><p>[<a href="https://arxiv.org/pdf/2110.04751.pdf">Paper</a>]</p><h3>Another Brick in the Wall: Uncovering SMM Vulnerabilities in HP Firmware</h3><p><i>Itai Liba, and Assaf Carlsbad</i></p><p>[<a href="https://www.sentinelone.com/labs/another-brick-in-the-wall-uncovering-smm-vulnerabilities-in-hp-firmware/">Blog</a>] [<a href="https://github.com/Sentinel-One/brick">Code</a>]</p><h3>Confidential Containers: Bringing Confidential Computing to the Kubernetes Workload Masses</h3><p><i>Samuel Ortiz</i></p><p>[<a href="https://www.youtube.com/watch?v=WvhV7L_3phY">Video</a>]</p><h3>Kubernetes Meets Confidential Computing - The Different Ways of Scaling Sensitive Workloads</h3><p><i>Moritz Eckert</i></p><p>[<a href="https://www.youtube.com/watch?v=OUrv2CUvfrY">Video</a>]</p><h3>Implementing Post-quantum Cryptography for Developers</h3><p><i>Julius Hekkala, Kimmo Halunen, and Visa Vallivaara</i></p><p>[<a href="https://www.scitepress.org/Papers/2022/107862/107862.pdf">Paper</a>]</p><h3>CMUA-Watermark: A Cross-Model Universal Adversarial Watermark for Combating Deepfakes</h3><p><i>Hao Huang, Yongtao Wang, Zhaoyu Chen, Yu Ze Zhang, Yuheng Li, Zhi Tang, Wei Chu, Jingdong Chen, Weisi Lin, and Kai-Kuang Ma</i></p><p>[<a href="https://www.aaai.org/AAAI22Papers/AAAI-1867.HuangH.pdf">Paper</a>] [<a href="https://github.com/VDIGPKU/CMUA-Watermark">Code</a>]</p><h3>Leashing the Inner Demons: Self-Detoxification for Language Models</h3><p><i>Canwen Xu, Zexue He, Zhankui He, and Julian McAuley</i></p><p>[<a href="https://www.aaai.org/AAAI22Papers/AAAI-4620.XuC.pdf">Paper</a>] [<a href="https://github.com/JetRunner/leash-demon">Code</a>]</p><h3>Fooling the Eyes of Autonomous Vehicles: Robust Physical Adversarial Examples Against Traffic Sign Recognition Systems</h3><p><i>Wei Jia, Zhaojun Lu, Haichun Zhang, Zhenglin Liu, Jie Wang, and Gang Qu</i></p><p>[<a href="https://arxiv.org/pdf/2201.06192.pdf">Paper</a>]</p><h3>Synthetic Disinformation Attacks on Automated Fact Verification Systems</h3><p><i>Yibing Du, Antoine Bosselut, Christopher D. Manning</i></p><p>[<a href="https://www.aaai.org/AAAI22Papers/AAAI-11986.DuY.pdf">Paper</a>]</p><h3>Why No One Pwned Synology at Pwn2Own and Tianfu Cup in 2021</h3><p><i>Eugene Lim, and Loke Hui Yi</i></p><p>[<a href="https://drive.google.com/file/d/1MYCNVKkNETkqS-cLJsqHE43Sfm4LZbCO/view">Slides</a>]</p><h3>DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting</h3><p><i>Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, and Yuval Yarom</i></p><p>[<a href="https://arxiv.org/pdf/2201.09956.pdf">Paper</a>] [<a href="https://github.com/drawnapart/drawnapart">Code</a>]</p><h3>Attacking JavaScript Engines in 2022</h3><p><i>Samuel Groß, and Amanda Burnett</i></p><p>[<a href="https://saelo.github.io/presentations/offensivecon_22_attacking_javascript_engines.pdf">Slides</a>]</p><h3>Security Analysis of MTE Through Examples</h3><p><i>Saar Amar</i></p><p>[<a href="https://msrndcdn360.blob.core.windows.net/bluehat/bluehatil/2022/assets/doc/Security%20Analysis%20of%20MTE%20Through%20Examples__Saar%20Amar.pdf">Slides</a>] [<a href="https://youtu.be/LV8BK1ns1Ow">Video</a>]</p><h3>An Armful of CHERIs</h3><p><i>Saar Amar, Nicholas Joly, David Chisnall, Manuel Costa, Sylvan Clebsch, Wes Filardo, Boris Köpf, Robert Norton-Wright, and Matthew Parkison</i></p><p>[<a href="https://msrc-blog.microsoft.com/2022/01/20/an_armful_of_cheris/">Blog</a>]</p>
]]></content:encoded>
      <enclosure length="33198728" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/3b7d7df2-ea47-4c65-a723-9721bf999803/audio/8d9b52aa-cb3d-4e54-86e6-e67b444e279b/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q1 - 2022</itunes:title>
      <itunes:author>Jacob Torrey, Marco Slaviero</itunes:author>
      <itunes:duration>00:34:35</itunes:duration>
      <itunes:summary>This is episode 3 of Thinkst Trends &amp; Takeaways (for Q1 of 2022). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:summary>
      <itunes:subtitle>This is episode 3 of Thinkst Trends &amp; Takeaways (for Q1 of 2022). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7cfdfef1-397f-471a-a471-8033de8ea953</guid>
      <title>ThinkstScapes Research Roundup - Q4 - 2021</title>
      <description><![CDATA[<h3>Sponge Examples: Energy-Latency Attacks on Neural Networks</h3><p><i>Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, and Ross Anderson</i></p><p>[<a href="https://www.ieee-security.org/TC/EuroSP2021/slides/ilia%20shumailov%20-%20ilia%20shumailov-sponge%20examples.pdf">Slides</a>] [<a href="https://arxiv.org/pdf/2006.03463.pdf">Paper</a>] [<a href="https://www.youtube.com/watch?v=6M_T_-im7PY">Video</a>]</p><h3>How to Use Cheated Cryptography to Overload a Server</h3><p><i>Szilárd Pfeiffer</i></p><p>[<a href="https://drive.google.com/file/d/1tubmwKh-4Oq7XOl6RjwP-YXZrO9qftao/view">Slides</a>]</p><h3>Bestie: Very Practical Searchable Encryption with Forward and Backward Security</h3><p><i>Tuanyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, and Hai Jin</i></p><p>[<a href="https://link.springer.com/chapter/10.1007%2F978-3-030-88428-4_1">Paper</a>]</p><h3>Symgrate: A Symbol Recovery Service for ARM Firmware</h3><p><i>Travis Goodspeed & EVM</i></p><p>[<a href="https://symgrate.com/">Site</a>] </p><h3>From Graph Queries to Vulnerabilities in Binary Code</h3><p><i>claudiu, fabs, and niko</i></p><p>[<a href="https://drive.google.com/file/d/17ynkuHgpz56RAr7HRAoyHgvdLI223nGU/view">Slides</a>]</p><h3>Fast verified post-quantum software</h3><p><i>Daniel J. Bernstein</i></p><p>[<a href="https://cr.yp.to/talks/2021.09.03/slides-djb-20210903-saferewrite-4x3.pdf">Slides</a>]</p><h3>AIModel-Mutator: Finding Vulnerabilities in TensorFlow</h3><p><i>Qian Feng, Zhaofeng Chen, Zhenyu Zhong, Yakun Zhang, Ying Wang, Zheng Huang, Kang Li, Jie Hu and Heng Yin</i></p><p>[<a href="https://i.blackhat.com/EU-21/Wednesday/EU-21-Feng-AIModel-Mutator-Finding-Vulnerabilities-in-TensorFlow.pdf">Slides</a>]</p><h3>DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification</h3><p><i>Camille Le Bon, Erven Rohou, Frederic Tronel, and Guillaume Hiet</i></p><p>[<a href="https://silm-workshop-2021.inria.fr//wp-content/uploads/2021/09/DAMAS.pdf">Paper</a>]</p><h3>Trojan Source: Invisible Vulnerabilities</h3><p><i>Nicholas Boucher and Ross Anderson</i></p><p>[<a href="https://arxiv.org/pdf/2111.00169.pdf">Paper</a>] [<a href="https://github.com/nickboucher/trojan-source">Code</a>]</p><h3>Who owns your hybrid Active Directory? Hunting for adversary techniques!</h3><p><i>Thirumalai Natarajan Muthiah & Anurag Khanna</i></p><p>[<a href="https://vblocalhost.com/uploads/VB2021-Thirumalai-Khanna.pdf">Paper</a>]</p><h3>Breaking Azure AD joined endpoints in zero-trust environments</h3><p><i>Dirk-jan Mollema</i></p><p>[<a href="https://dirkjanm.io/assets/raw/romhack_dirkjan.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=OigKnI68Sfo">Video</a>]</p><h3>Going Deeper into Schneider Modicon PAC Security</h3><p><i>Gao Jian</i></p><p>[<a href="https://conference.hitb.org/hitbsecconf2021sin/materials/D1T2%20-%20Going%20Deeper%20into%20Schneider%20Modicon%20PAC%20Security%20-%20Gao%20Jian.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=s184S7LDtEg">Video</a>]</p><h3>New Ways of IPv6 Scanning</h3><p><i>Shupeng Gao, Xingru Wu, and Jie Gao</i></p><p>[<a href="https://i.blackhat.com/EU-21/Wednesday/EU-21-Shupeng-New-Ways-of-IPV6-Scanning.pdf">Slides</a>]</p><h3>DIY cheap gigabit data diode</h3><p><i>Magnus</i></p><p>[<a href="https://github.com/klockcykel/godiode">Code</a>]</p><h3>Bridge your service mesh and AWS</h3><p><i>Santosh Ananthakrishnan & Harihara K Narayanan</i></p><p>[<a href="https://fwdcloudsec.org/presentations/2021/Bridge_Your_Service_Mesh_and_AWS.pdf">Slides</a>]</p><h3>GALILEO: In GPS We Trust?</h3><p><i>Áron Szabó, Levente Kovács, and Péter Ligeti</i></p><p>[<a href="http://www.kormanyablak.org/it_security/2021-07-04/GALILEO_GNSS_Hacktivity_Aron_Szabo_2021-10-08.pdf">Slides</a>]</p><h3>“We wait, because we know you.” Inside the ransomware negotiation economics.</h3><p><i>Pepijn Hack & Harihara K Narayanan</i></p><p>[<a href="https://fwdcloudsec.org/presentations/2021/Bridge_Your_Service_Mesh_and_AWS.pdf">Paper</a>]</p><h3>Privacy of DNS-over-HTTPS: Requiem for a dream?</h3><p><i>Levente Csikor, Himanshu Singh, Min Suk Kang, and Dinil Mon Divakaran</i></p><p>[<a href="https://www.ieee-security.org/TC/EuroSP2021/slides/Levente%20Csikor%20-%20Levente%20Csikor-Privacy%20of%20DNS-over-HTTPS_Requiem%20for%20a%20dream.pdf">Slides</a>] </p><h3>Sleight of ARM: Demystifying Intel Houdini</h3><p><i>Brian Hong</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2029/DEF%20CON%2029%20presentations/Brian%20Hong%20-%20Sleight%20of%20ARM%20-%20%20Demystifying%20Intel%20Houdini.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=9oQ5XjA1aq0">Video</a>]</p>
]]></description>
      <pubDate>Thu, 16 Dec 2021 12:46:23 +0000</pubDate>
      <author>jacob@thinkst.com (Jacob Torrey, marco slaviero, haroon meer)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<h3>Sponge Examples: Energy-Latency Attacks on Neural Networks</h3><p><i>Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, and Ross Anderson</i></p><p>[<a href="https://www.ieee-security.org/TC/EuroSP2021/slides/ilia%20shumailov%20-%20ilia%20shumailov-sponge%20examples.pdf">Slides</a>] [<a href="https://arxiv.org/pdf/2006.03463.pdf">Paper</a>] [<a href="https://www.youtube.com/watch?v=6M_T_-im7PY">Video</a>]</p><h3>How to Use Cheated Cryptography to Overload a Server</h3><p><i>Szilárd Pfeiffer</i></p><p>[<a href="https://drive.google.com/file/d/1tubmwKh-4Oq7XOl6RjwP-YXZrO9qftao/view">Slides</a>]</p><h3>Bestie: Very Practical Searchable Encryption with Forward and Backward Security</h3><p><i>Tuanyang Chen, Peng Xu, Wei Wang, Yubo Zheng, Willy Susilo, and Hai Jin</i></p><p>[<a href="https://link.springer.com/chapter/10.1007%2F978-3-030-88428-4_1">Paper</a>]</p><h3>Symgrate: A Symbol Recovery Service for ARM Firmware</h3><p><i>Travis Goodspeed & EVM</i></p><p>[<a href="https://symgrate.com/">Site</a>] </p><h3>From Graph Queries to Vulnerabilities in Binary Code</h3><p><i>claudiu, fabs, and niko</i></p><p>[<a href="https://drive.google.com/file/d/17ynkuHgpz56RAr7HRAoyHgvdLI223nGU/view">Slides</a>]</p><h3>Fast verified post-quantum software</h3><p><i>Daniel J. Bernstein</i></p><p>[<a href="https://cr.yp.to/talks/2021.09.03/slides-djb-20210903-saferewrite-4x3.pdf">Slides</a>]</p><h3>AIModel-Mutator: Finding Vulnerabilities in TensorFlow</h3><p><i>Qian Feng, Zhaofeng Chen, Zhenyu Zhong, Yakun Zhang, Ying Wang, Zheng Huang, Kang Li, Jie Hu and Heng Yin</i></p><p>[<a href="https://i.blackhat.com/EU-21/Wednesday/EU-21-Feng-AIModel-Mutator-Finding-Vulnerabilities-in-TensorFlow.pdf">Slides</a>]</p><h3>DAMAS: Control-Data Isolation at Runtime through Dynamic Binary Modification</h3><p><i>Camille Le Bon, Erven Rohou, Frederic Tronel, and Guillaume Hiet</i></p><p>[<a href="https://silm-workshop-2021.inria.fr//wp-content/uploads/2021/09/DAMAS.pdf">Paper</a>]</p><h3>Trojan Source: Invisible Vulnerabilities</h3><p><i>Nicholas Boucher and Ross Anderson</i></p><p>[<a href="https://arxiv.org/pdf/2111.00169.pdf">Paper</a>] [<a href="https://github.com/nickboucher/trojan-source">Code</a>]</p><h3>Who owns your hybrid Active Directory? Hunting for adversary techniques!</h3><p><i>Thirumalai Natarajan Muthiah & Anurag Khanna</i></p><p>[<a href="https://vblocalhost.com/uploads/VB2021-Thirumalai-Khanna.pdf">Paper</a>]</p><h3>Breaking Azure AD joined endpoints in zero-trust environments</h3><p><i>Dirk-jan Mollema</i></p><p>[<a href="https://dirkjanm.io/assets/raw/romhack_dirkjan.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=OigKnI68Sfo">Video</a>]</p><h3>Going Deeper into Schneider Modicon PAC Security</h3><p><i>Gao Jian</i></p><p>[<a href="https://conference.hitb.org/hitbsecconf2021sin/materials/D1T2%20-%20Going%20Deeper%20into%20Schneider%20Modicon%20PAC%20Security%20-%20Gao%20Jian.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=s184S7LDtEg">Video</a>]</p><h3>New Ways of IPv6 Scanning</h3><p><i>Shupeng Gao, Xingru Wu, and Jie Gao</i></p><p>[<a href="https://i.blackhat.com/EU-21/Wednesday/EU-21-Shupeng-New-Ways-of-IPV6-Scanning.pdf">Slides</a>]</p><h3>DIY cheap gigabit data diode</h3><p><i>Magnus</i></p><p>[<a href="https://github.com/klockcykel/godiode">Code</a>]</p><h3>Bridge your service mesh and AWS</h3><p><i>Santosh Ananthakrishnan & Harihara K Narayanan</i></p><p>[<a href="https://fwdcloudsec.org/presentations/2021/Bridge_Your_Service_Mesh_and_AWS.pdf">Slides</a>]</p><h3>GALILEO: In GPS We Trust?</h3><p><i>Áron Szabó, Levente Kovács, and Péter Ligeti</i></p><p>[<a href="http://www.kormanyablak.org/it_security/2021-07-04/GALILEO_GNSS_Hacktivity_Aron_Szabo_2021-10-08.pdf">Slides</a>]</p><h3>“We wait, because we know you.” Inside the ransomware negotiation economics.</h3><p><i>Pepijn Hack & Harihara K Narayanan</i></p><p>[<a href="https://fwdcloudsec.org/presentations/2021/Bridge_Your_Service_Mesh_and_AWS.pdf">Paper</a>]</p><h3>Privacy of DNS-over-HTTPS: Requiem for a dream?</h3><p><i>Levente Csikor, Himanshu Singh, Min Suk Kang, and Dinil Mon Divakaran</i></p><p>[<a href="https://www.ieee-security.org/TC/EuroSP2021/slides/Levente%20Csikor%20-%20Levente%20Csikor-Privacy%20of%20DNS-over-HTTPS_Requiem%20for%20a%20dream.pdf">Slides</a>] </p><h3>Sleight of ARM: Demystifying Intel Houdini</h3><p><i>Brian Hong</i></p><p>[<a href="https://media.defcon.org/DEF%20CON%2029/DEF%20CON%2029%20presentations/Brian%20Hong%20-%20Sleight%20of%20ARM%20-%20%20Demystifying%20Intel%20Houdini.pdf">Slides</a>] [<a href="https://www.youtube.com/watch?v=9oQ5XjA1aq0">Video</a>]</p>
]]></content:encoded>
      <enclosure length="21390232" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/347a2deb-d9f6-464b-82f9-4f7f8730ad6d/audio/77c4651f-fb13-41a7-896c-581893fec29d/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q4 - 2021</itunes:title>
      <itunes:author>Jacob Torrey, marco slaviero, haroon meer</itunes:author>
      <itunes:duration>00:25:28</itunes:duration>
      <itunes:summary>This is episode 2 of Thinkst Trends &amp; Takeaways (for Q4 of 2021). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:summary>
      <itunes:subtitle>This is episode 2 of Thinkst Trends &amp; Takeaways (for Q4 of 2021). A quarterly summary of information security research, talks and presentations.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding quarter.

https://thinkst.com/ts</itunes:subtitle>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">67f0608f-cdbd-4363-9f51-2cedb3b88729</guid>
      <title>ThinkstScapes Research Roundup - Q3 - 2021</title>
      <description><![CDATA[<h2>Introduction</h2><h3>Episode 1 - 2021/Q3</h3><p>Thinkst Trends and Takeaways is a show released in conjunction with <a href="https://thinkst.com/ts">ThinkstScapes</a>, a written quarterly review of information security research published in both industry and academic venues. Thinkst Labs allocates time to tracking industry research so you don’t have to, specifically looking for novel and unusual work that is impactful--this is not simply a report on bugs or vulnerabilities. Work covered here will include both offensive and defensive topics, and we explore academic publications with the same gusto as industry work. Our target listeners are primarily security practitioners in organizations who are tasked with defending their turf, but offensive-minded folks will also be exposed to new ideas and research we’ve come across.</p><h3>Full bibliography of referenced works:</h3><p>Embedded security research</p><ul><li>Precursor: Towards Evidence-Based Trust in Hardware<ul><li>Andrew ‘bunnie’ Huang</li><li><a href="https://www.youtube.com/watch?v=mrKBKZ0RJAo">[Video]</a></li></ul></li><li>Kernel Pwning with eBPF: a Love Story<ul><li>Valentina Palmiotti (@chompie1337)</li><li>[<a href="https://www.graplsecurity.com/post/kernel-pwning-with-ebpf-a-love-story">Paper</a>]</li></ul></li><li>InternalBlue / Frankenstein / Spectra<ul><li>Jan Ruge, Jiska Classen, Francesco Gringoli, and Matthias Hollick</li><li><a href="https://www.usenix.org/system/files/sec20_slides_ruge.pdf">[Slides]</a> <a href="https://i.blackhat.com/USA-20/Thursday/us-20-Classen-Spectra-Breaking-Separation-Between-Wireless-Chips.pdf">[Slides]</a> <a href="http://www.youtube.com/embed/0k6XHOkt6NE?width%3D745%26amp%3Bheight%3D420%26amp%3Btheme%3Ddark%26amp%3Bautoplay%3D0%26amp%3Bvq%3Dhd720%26amp%3Brel%3D0%26amp%3Bshowinfo%3D0%26amp%3Bmodestbranding%3D0%26amp%3Biv_load_policy%3D1%26amp%3Bcontrols%3D1%26amp%3Bautohide%3D2%26amp%3Bwmode%3Dopaque">[Video]</a></li></ul></li><li>HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation<ul><li>Abraham Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, and Mathias Payer</li><li><a href="https://www.usenix.org/system/files/sec20_slides_clements.pdf">[Slides]</a> <a href="https://www.usenix.org/system/files/sec20-clements.pdf">[Paper]</a> <a href="http://www.youtube.com/embed/7mFqTjfLuEM?width%3D745%26amp%3Bheight%3D420%26amp%3Btheme%3Ddark%26amp%3Bautoplay%3D0%26amp%3Bvq%3Dhd720%26amp%3Brel%3D0%26amp%3Bshowinfo%3D0%26amp%3Bmodestbranding%3D0%26amp%3Biv_load_policy%3D1%26amp%3Bcontrols%3D1%26amp%3Bautohide%3D2%26amp%3Bwmode%3Dopaque">[Video]</a></li></ul></li><li>Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation<ul><li>Chen Cao, Le Guan, Jiang Ming, and Peng Liu</li><li><a href="https://openreview.net/pdf?id=rylaZ6iIDr">[Paper]</a></li></ul></li><li>Remote Timing Attacks on TPMs, AKA TPM-Fail<ul><li>Daniel Moghimi</li><li><a href="https://moghimi.org/slides/blackhat2020-tpmfail.pdf">[Slides]</a></li></ul></li><li>Breaking VSM by Attacking SecureKernel<ul><li>Saar Amar and Daniel King</li><li><a href="https://i.blackhat.com/USA-20/Thursday/us-20-Amar-Breaking-VSM-By-Attacking-SecureKernal.pdf">[Slides]</a></li></ul></li><li>Whispers Among the Stars: Perpetrating (and Preventing) Satellite Eavesdropping Attacks<ul><li>James Pavur</li><li><a href="https://i.blackhat.com/USA-20/Wednesday/us-20-Pavur-Whispers-Among-The-Stars-Perpetrating-And-Preventing-Satellite-Eavesdropping-Attacks.pdf">[Slides]</a> <a href="https://www.youtube.com/watch?v=d5Sbwlu6f8o">[Video]</a></li></ul></li></ul><p>Exploiting 'Differences of opinion'</p><ul><li>HTTP/2: The Sequel is Always Worse<ul><li>James Kettle</li><li><a href="https://portswigger.net/kb/papers/rfekn2Uv/HTTP2whitepaper.pdf">[Paper]</a></li></ul></li><li>Differential Fuzzing of x86-64 Instruction Decoders<ul><li>William Woodruff, Niki Carroll, and Sebastiaan Peters</li><li><a href="https://github.com/gangtan/LangSec-papers-and-slides/raw/main/langsec21/papers/Woodruff_LangSec21.pdf">[Paper]</a> <a href="https://www.youtube.com/watch?v=a2q86KTZt0g">[Video]</a></li></ul></li><li>EtherOops: Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks<ul><li>Ben Seri, Gregory Vichnepolsky, and Yevgeny Yusepovsky</li><li><a href="http://i.blackhat.com/USA-20/Thursday/us-20-Seri-EtherOops-Exploring-Practical-Methods-To-Exploit-Ethernet-Packet-In-Packet-Attacks.pdf">[Slides]</a> <a href="http://i.blackhat.com/USA-20/Thursday/us-20-Seri-EtherOops-Exploring-Practical-Methods-To-Exploit-Ethernet-Packet-In-Packet-Attacks-wp.pdf">[Paper]</a></li></ul></li><li>Light Commands: Laser-Based Audio Injection on Voice-Controllable Systems<ul><li>Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, and Kevin Fu</li><li><a href="https://www.usenix.org/system/files/sec20_slides_sugawara.pdf">[Slides]</a></li></ul></li><li>Interpretable Deep Learning Under Fire<ul><li>Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, and Ting Wang</li><li><a href="https://www.usenix.org/system/files/sec20_slides_zhang-xinyang.pdf">[Slides]</a> <a href="https://www.usenix.org/system/files/sec20spring_zhang_prepub.pdf">[Paper]</a> <a href="http://www.youtube.com/embed/8bK1uUHPtyE?width%3D745%26amp%3Bheight%3D420%26amp%3Btheme%3Ddark%26amp%3Bautoplay%3D0%26amp%3Bvq%3Dhd720%26amp%3Brel%3D0%26amp%3Bshowinfo%3D0%26amp%3Bmodestbranding%3D0%26amp%3Biv_load_policy%3D1%26amp%3Bcontrols%3D1%26amp%3Bautohide%3D2%26amp%3Bwmode%3Dopaque">[Video]</a></li></ul></li><li>Hiding Objects from Computer Vision by Exploiting Correlation Biases<ul><li>Yin Minn Pa Pa, Paul Ziegler, and Masaki Kamizono</li><li><a href="http://i.blackhat.com/asia-21/Thursday-Handouts/as-21-PaPa-Ziegler-Hiding-Objects-From-Computer-Vision-By-Exploiting-Correlation-Biases.pdf">[Slides]</a></li></ul></li><li>Disrupting Continuity of Apple’s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL and Wi-Fi<ul><li>Milan Stute, Alexander Heinrich, Jannik Lorenz, and Matthias Hollick</li><li><a href="https://www.usenix.org/system/files/sec21fall-stute.pdf">[Paper]</a></li></ul></li></ul><p>Defence</p><ul><li>Entangled Watermarks as a Defense Against Model Extraction<ul><li>Hengrui Jia, Christopher A. Choquette-Choo, Varun Chandrasekaran, Nicolas Papernot</li><li><a href="https://www.usenix.org/system/files/sec21fall-jia.pdf">[Paper]</a></li></ul></li><li>Hopper: Modeling and Detecting Lateral Movement<ul><li>Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey Voelker, and David Wagner</li><li><a href="https://arxiv.org/pdf/2105.13442.pdf">[Paper]</a></li></ul></li><li>Faking a Factory: Creating and Operating a Realistic Honeypot<ul><li>Charles Perine</li><li><a href="https://i.blackhat.com/asia-20/Thursday/asia-20-Perine-Faking-A-Factory-Creating-And-Operating-A-Realistic-Honeypot.pdf">[Slides]</a> <a href="https://documents.trendmicro.com/assets/white_papers/wp-caught-in-the-act-running-a-realistic-factory-honeypot-to-capture-real-threats.pdf">[Paper]</a> <a href="https://www.youtube.com/watch?v=4y7JJoZd0ic">[Video]</a></li></ul></li><li>Do You Speak My Language? Making Static Analysis Engines Understand Each Other<ul><li>Ibrahim Mohamed and Manuel Fahndrich</li><li><a href="https://i.blackhat.com/USA21/Wednesday-Handouts/us-21-Elsayed-Do-You-Speak-My-Language-Make-Static-Analysis-Engines-Understand-Each-Other.pdf">[Slides]</a></li></ul></li><li>Practical Defenses Against Adversarial Machine Learning<ul><li>Ariel Herbert-Voss</li><li><a href="https://www.youtube.com/watch?v=RdHYZJ2S_Zk">[Video]</a></li></ul></li></ul><p>Nifty sundries</p><ul><li>Remote Side-Channel Attacks on Anonymous Transactions<ul><li>Florian Tramer, Dan Boneh, and Kenneth G. Paterson</li><li><a href="https://crypto.stanford.edu/timings/paper.pdf">[Paper]</a></li></ul></li><li>An Observational Investigation of Reverse Engineers’ Processes<ul><li>Daniel Votipka, Seth Rabin, Kristopher Micinski, Jeffrey Foster, and Michelle Mazurek</li><li><a href="https://www.usenix.org/system/files/sec20_slides_votipka-observational.pdf">[Paper]</a> <a href="http://www.youtube.com/embed/QKe4F5bkDf0?width%3D745%26amp%3Bheight%3D420%26amp%3Btheme%3Ddark%26amp%3Bautoplay%3D0%26amp%3Bvq%3Dhd720%26amp%3Brel%3D0%26amp%3Bshowinfo%3D0%26amp%3Bmodestbranding%3D0%26amp%3Biv_load_policy%3D1%26amp%3Bcontrols%3D1%26amp%3Bautohide%3D2%26amp%3Bwmode%3Dopaque">[Video]</a></li></ul></li><li>On the Feasibility of Automating Stock Market Manipulation<ul><li>Carter Yagemann, Simon Chung, Erkam Uzun, Sai Ragam, Brendan Saltaformaggio, and Wenke Lee</li><li><a href="https://saltaformaggio.ece.gatech.edu/publications/ACSAC_20.pdf">[Paper]</a></li></ul></li><li>IoT Skimmer: Energy Market Manipulation through High-Wattage IoT Botnets<ul><li>Tohid Shekari and Raheem Beyah</li><li><a href="http://i.blackhat.com/USA-20/Wednesday/us-20-Shekari-IoT-Skimmer-Energy-Market-Manipulation-Through-High-Wattage-IoT-Botnets.pdf">[Slides]</a></li></ul></li><li>The Dark Age of Memory Corruption Mitigations in the Spectre Era<ul><li>Andrea Mambretti and Alexandra Sandulescu</li><li><a href="https://i.blackhat.com/USA21/Wednesday-Handouts/US-21-Mambretti-The-Dark-Age-of-Memory-Corruption.pdf">[Slides]</a></li></ul></li><li>Everything Old is New Again: Binary Security of WebAssembly<ul><li>Daniel Mehmann, Johannes Kinder, and Michael Pradel</li><li><a href="https://www.usenix.org/system/files/sec20_slides_lehmann.pdf">[Slides]</a> <a href="https://www.usenix.org/system/files/sec20-lehmann.pdf">[Paper]</a> <a href="http://www.youtube.com/embed/glL__xjviro?width%3D745%26amp%3Bheight%3D420%26amp%3Btheme%3Ddark%26amp%3Bautoplay%3D0%26amp%3Bvq%3Dhd720%26amp%3Brel%3D0%26amp%3Bshowinfo%3D0%26amp%3Bmodestbranding%3D0%26amp%3Biv_load_policy%3D1%26amp%3Bcontrols%3D1%26amp%3Bautohide%3D2%26amp%3Bwmode%3Dopaque">[Video]</a></li></ul></li><li>ProxyLogon is Just the Tip of the Iceberg: A New Attack Surface on Microsoft Exchange Server!<ul><li>Orange Tsai</li><li><a href="https://i.blackhat.com/USA21/Wednesday-Handouts/us-21-ProxyLogon-Is-Just-The-Tip-Of-The-Iceberg-A-New-Attack-Surface-On-Microsoft-Exchange-Server.pdf">[Slides]</a></li></ul></li></ul><p>brought to you by </p><img src="https://lh3.googleusercontent.com/siavFNQ5fjbL8qpFqUsrWnx2u330zRyzdjyHnTITiYkNJEc3_PN-QUapVxVCC0EHjzhE3te6t7kbVoqmZ05W3DXWfyfOpceCGqjw3lxcmMmL4hgYxo4Pr4UvvZqITT0ladgMCoIp=s0" alt="" /><p>Most companies find out way too late that they've been breached. Thinkst Canary changes this. Canaries deploy in under 4 minutes and require 0 ongoing admin overhead. They remain silent till they need to chirp, and then, you receive that single alert.</p><p>When.it.matters.</p><p>Find out why some of the smartest security teams in the world swear by Thinkst Canary <a href="https://canary.love">https://canary.love</a></p>
]]></description>
      <pubDate>Mon, 30 Aug 2021 18:57:17 +0000</pubDate>
      <author>jacob@thinkst.com (marco slaviero, haroon meer, Jacob Torrey)</author>
      <link>https://thinkst.com/ts.html</link>
      <content:encoded><![CDATA[<h2>Introduction</h2><h3>Episode 1 - 2021/Q3</h3><p>Thinkst Trends and Takeaways is a show released in conjunction with <a href="https://thinkst.com/ts">ThinkstScapes</a>, a written quarterly review of information security research published in both industry and academic venues. Thinkst Labs allocates time to tracking industry research so you don’t have to, specifically looking for novel and unusual work that is impactful--this is not simply a report on bugs or vulnerabilities. Work covered here will include both offensive and defensive topics, and we explore academic publications with the same gusto as industry work. Our target listeners are primarily security practitioners in organizations who are tasked with defending their turf, but offensive-minded folks will also be exposed to new ideas and research we’ve come across.</p><h3>Full bibliography of referenced works:</h3><p>Embedded security research</p><ul><li>Precursor: Towards Evidence-Based Trust in Hardware<ul><li>Andrew ‘bunnie’ Huang</li><li><a href="https://www.youtube.com/watch?v=mrKBKZ0RJAo">[Video]</a></li></ul></li><li>Kernel Pwning with eBPF: a Love Story<ul><li>Valentina Palmiotti (@chompie1337)</li><li>[<a href="https://www.graplsecurity.com/post/kernel-pwning-with-ebpf-a-love-story">Paper</a>]</li></ul></li><li>InternalBlue / Frankenstein / Spectra<ul><li>Jan Ruge, Jiska Classen, Francesco Gringoli, and Matthias Hollick</li><li><a href="https://www.usenix.org/system/files/sec20_slides_ruge.pdf">[Slides]</a> <a href="https://i.blackhat.com/USA-20/Thursday/us-20-Classen-Spectra-Breaking-Separation-Between-Wireless-Chips.pdf">[Slides]</a> <a href="http://www.youtube.com/embed/0k6XHOkt6NE?width%3D745%26amp%3Bheight%3D420%26amp%3Btheme%3Ddark%26amp%3Bautoplay%3D0%26amp%3Bvq%3Dhd720%26amp%3Brel%3D0%26amp%3Bshowinfo%3D0%26amp%3Bmodestbranding%3D0%26amp%3Biv_load_policy%3D1%26amp%3Bcontrols%3D1%26amp%3Bautohide%3D2%26amp%3Bwmode%3Dopaque">[Video]</a></li></ul></li><li>HALucinator: Firmware Re-hosting Through Abstraction Layer Emulation<ul><li>Abraham Clements, Eric Gustafson, Tobias Scharnowski, Paul Grosen, David Fritz, Christopher Kruegel, Giovanni Vigna, Saurabh Bagchi, and Mathias Payer</li><li><a href="https://www.usenix.org/system/files/sec20_slides_clements.pdf">[Slides]</a> <a href="https://www.usenix.org/system/files/sec20-clements.pdf">[Paper]</a> <a href="http://www.youtube.com/embed/7mFqTjfLuEM?width%3D745%26amp%3Bheight%3D420%26amp%3Btheme%3Ddark%26amp%3Bautoplay%3D0%26amp%3Bvq%3Dhd720%26amp%3Brel%3D0%26amp%3Bshowinfo%3D0%26amp%3Bmodestbranding%3D0%26amp%3Biv_load_policy%3D1%26amp%3Bcontrols%3D1%26amp%3Bautohide%3D2%26amp%3Bwmode%3Dopaque">[Video]</a></li></ul></li><li>Device-agnostic Firmware Execution is Possible: A Concolic Execution Approach for Peripheral Emulation<ul><li>Chen Cao, Le Guan, Jiang Ming, and Peng Liu</li><li><a href="https://openreview.net/pdf?id=rylaZ6iIDr">[Paper]</a></li></ul></li><li>Remote Timing Attacks on TPMs, AKA TPM-Fail<ul><li>Daniel Moghimi</li><li><a href="https://moghimi.org/slides/blackhat2020-tpmfail.pdf">[Slides]</a></li></ul></li><li>Breaking VSM by Attacking SecureKernel<ul><li>Saar Amar and Daniel King</li><li><a href="https://i.blackhat.com/USA-20/Thursday/us-20-Amar-Breaking-VSM-By-Attacking-SecureKernal.pdf">[Slides]</a></li></ul></li><li>Whispers Among the Stars: Perpetrating (and Preventing) Satellite Eavesdropping Attacks<ul><li>James Pavur</li><li><a href="https://i.blackhat.com/USA-20/Wednesday/us-20-Pavur-Whispers-Among-The-Stars-Perpetrating-And-Preventing-Satellite-Eavesdropping-Attacks.pdf">[Slides]</a> <a href="https://www.youtube.com/watch?v=d5Sbwlu6f8o">[Video]</a></li></ul></li></ul><p>Exploiting 'Differences of opinion'</p><ul><li>HTTP/2: The Sequel is Always Worse<ul><li>James Kettle</li><li><a href="https://portswigger.net/kb/papers/rfekn2Uv/HTTP2whitepaper.pdf">[Paper]</a></li></ul></li><li>Differential Fuzzing of x86-64 Instruction Decoders<ul><li>William Woodruff, Niki Carroll, and Sebastiaan Peters</li><li><a href="https://github.com/gangtan/LangSec-papers-and-slides/raw/main/langsec21/papers/Woodruff_LangSec21.pdf">[Paper]</a> <a href="https://www.youtube.com/watch?v=a2q86KTZt0g">[Video]</a></li></ul></li><li>EtherOops: Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks<ul><li>Ben Seri, Gregory Vichnepolsky, and Yevgeny Yusepovsky</li><li><a href="http://i.blackhat.com/USA-20/Thursday/us-20-Seri-EtherOops-Exploring-Practical-Methods-To-Exploit-Ethernet-Packet-In-Packet-Attacks.pdf">[Slides]</a> <a href="http://i.blackhat.com/USA-20/Thursday/us-20-Seri-EtherOops-Exploring-Practical-Methods-To-Exploit-Ethernet-Packet-In-Packet-Attacks-wp.pdf">[Paper]</a></li></ul></li><li>Light Commands: Laser-Based Audio Injection on Voice-Controllable Systems<ul><li>Takeshi Sugawara, Benjamin Cyr, Sara Rampazzi, Daniel Genkin, and Kevin Fu</li><li><a href="https://www.usenix.org/system/files/sec20_slides_sugawara.pdf">[Slides]</a></li></ul></li><li>Interpretable Deep Learning Under Fire<ul><li>Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, and Ting Wang</li><li><a href="https://www.usenix.org/system/files/sec20_slides_zhang-xinyang.pdf">[Slides]</a> <a href="https://www.usenix.org/system/files/sec20spring_zhang_prepub.pdf">[Paper]</a> <a href="http://www.youtube.com/embed/8bK1uUHPtyE?width%3D745%26amp%3Bheight%3D420%26amp%3Btheme%3Ddark%26amp%3Bautoplay%3D0%26amp%3Bvq%3Dhd720%26amp%3Brel%3D0%26amp%3Bshowinfo%3D0%26amp%3Bmodestbranding%3D0%26amp%3Biv_load_policy%3D1%26amp%3Bcontrols%3D1%26amp%3Bautohide%3D2%26amp%3Bwmode%3Dopaque">[Video]</a></li></ul></li><li>Hiding Objects from Computer Vision by Exploiting Correlation Biases<ul><li>Yin Minn Pa Pa, Paul Ziegler, and Masaki Kamizono</li><li><a href="http://i.blackhat.com/asia-21/Thursday-Handouts/as-21-PaPa-Ziegler-Hiding-Objects-From-Computer-Vision-By-Exploiting-Correlation-Biases.pdf">[Slides]</a></li></ul></li><li>Disrupting Continuity of Apple’s Wireless Ecosystem Security: New Tracking, DoS, and MitM Attacks on iOS and macOS Through Bluetooth Low Energy, AWDL and Wi-Fi<ul><li>Milan Stute, Alexander Heinrich, Jannik Lorenz, and Matthias Hollick</li><li><a href="https://www.usenix.org/system/files/sec21fall-stute.pdf">[Paper]</a></li></ul></li></ul><p>Defence</p><ul><li>Entangled Watermarks as a Defense Against Model Extraction<ul><li>Hengrui Jia, Christopher A. Choquette-Choo, Varun Chandrasekaran, Nicolas Papernot</li><li><a href="https://www.usenix.org/system/files/sec21fall-jia.pdf">[Paper]</a></li></ul></li><li>Hopper: Modeling and Detecting Lateral Movement<ul><li>Grant Ho, Mayank Dhiman, Devdatta Akhawe, Vern Paxson, Stefan Savage, Geoffrey Voelker, and David Wagner</li><li><a href="https://arxiv.org/pdf/2105.13442.pdf">[Paper]</a></li></ul></li><li>Faking a Factory: Creating and Operating a Realistic Honeypot<ul><li>Charles Perine</li><li><a href="https://i.blackhat.com/asia-20/Thursday/asia-20-Perine-Faking-A-Factory-Creating-And-Operating-A-Realistic-Honeypot.pdf">[Slides]</a> <a href="https://documents.trendmicro.com/assets/white_papers/wp-caught-in-the-act-running-a-realistic-factory-honeypot-to-capture-real-threats.pdf">[Paper]</a> <a href="https://www.youtube.com/watch?v=4y7JJoZd0ic">[Video]</a></li></ul></li><li>Do You Speak My Language? Making Static Analysis Engines Understand Each Other<ul><li>Ibrahim Mohamed and Manuel Fahndrich</li><li><a href="https://i.blackhat.com/USA21/Wednesday-Handouts/us-21-Elsayed-Do-You-Speak-My-Language-Make-Static-Analysis-Engines-Understand-Each-Other.pdf">[Slides]</a></li></ul></li><li>Practical Defenses Against Adversarial Machine Learning<ul><li>Ariel Herbert-Voss</li><li><a href="https://www.youtube.com/watch?v=RdHYZJ2S_Zk">[Video]</a></li></ul></li></ul><p>Nifty sundries</p><ul><li>Remote Side-Channel Attacks on Anonymous Transactions<ul><li>Florian Tramer, Dan Boneh, and Kenneth G. Paterson</li><li><a href="https://crypto.stanford.edu/timings/paper.pdf">[Paper]</a></li></ul></li><li>An Observational Investigation of Reverse Engineers’ Processes<ul><li>Daniel Votipka, Seth Rabin, Kristopher Micinski, Jeffrey Foster, and Michelle Mazurek</li><li><a href="https://www.usenix.org/system/files/sec20_slides_votipka-observational.pdf">[Paper]</a> <a href="http://www.youtube.com/embed/QKe4F5bkDf0?width%3D745%26amp%3Bheight%3D420%26amp%3Btheme%3Ddark%26amp%3Bautoplay%3D0%26amp%3Bvq%3Dhd720%26amp%3Brel%3D0%26amp%3Bshowinfo%3D0%26amp%3Bmodestbranding%3D0%26amp%3Biv_load_policy%3D1%26amp%3Bcontrols%3D1%26amp%3Bautohide%3D2%26amp%3Bwmode%3Dopaque">[Video]</a></li></ul></li><li>On the Feasibility of Automating Stock Market Manipulation<ul><li>Carter Yagemann, Simon Chung, Erkam Uzun, Sai Ragam, Brendan Saltaformaggio, and Wenke Lee</li><li><a href="https://saltaformaggio.ece.gatech.edu/publications/ACSAC_20.pdf">[Paper]</a></li></ul></li><li>IoT Skimmer: Energy Market Manipulation through High-Wattage IoT Botnets<ul><li>Tohid Shekari and Raheem Beyah</li><li><a href="http://i.blackhat.com/USA-20/Wednesday/us-20-Shekari-IoT-Skimmer-Energy-Market-Manipulation-Through-High-Wattage-IoT-Botnets.pdf">[Slides]</a></li></ul></li><li>The Dark Age of Memory Corruption Mitigations in the Spectre Era<ul><li>Andrea Mambretti and Alexandra Sandulescu</li><li><a href="https://i.blackhat.com/USA21/Wednesday-Handouts/US-21-Mambretti-The-Dark-Age-of-Memory-Corruption.pdf">[Slides]</a></li></ul></li><li>Everything Old is New Again: Binary Security of WebAssembly<ul><li>Daniel Mehmann, Johannes Kinder, and Michael Pradel</li><li><a href="https://www.usenix.org/system/files/sec20_slides_lehmann.pdf">[Slides]</a> <a href="https://www.usenix.org/system/files/sec20-lehmann.pdf">[Paper]</a> <a href="http://www.youtube.com/embed/glL__xjviro?width%3D745%26amp%3Bheight%3D420%26amp%3Btheme%3Ddark%26amp%3Bautoplay%3D0%26amp%3Bvq%3Dhd720%26amp%3Brel%3D0%26amp%3Bshowinfo%3D0%26amp%3Bmodestbranding%3D0%26amp%3Biv_load_policy%3D1%26amp%3Bcontrols%3D1%26amp%3Bautohide%3D2%26amp%3Bwmode%3Dopaque">[Video]</a></li></ul></li><li>ProxyLogon is Just the Tip of the Iceberg: A New Attack Surface on Microsoft Exchange Server!<ul><li>Orange Tsai</li><li><a href="https://i.blackhat.com/USA21/Wednesday-Handouts/us-21-ProxyLogon-Is-Just-The-Tip-Of-The-Iceberg-A-New-Attack-Surface-On-Microsoft-Exchange-Server.pdf">[Slides]</a></li></ul></li></ul><p>brought to you by </p><img src="https://lh3.googleusercontent.com/siavFNQ5fjbL8qpFqUsrWnx2u330zRyzdjyHnTITiYkNJEc3_PN-QUapVxVCC0EHjzhE3te6t7kbVoqmZ05W3DXWfyfOpceCGqjw3lxcmMmL4hgYxo4Pr4UvvZqITT0ladgMCoIp=s0" alt="" /><p>Most companies find out way too late that they've been breached. Thinkst Canary changes this. Canaries deploy in under 4 minutes and require 0 ongoing admin overhead. They remain silent till they need to chirp, and then, you receive that single alert.</p><p>When.it.matters.</p><p>Find out why some of the smartest security teams in the world swear by Thinkst Canary <a href="https://canary.love">https://canary.love</a></p>
]]></content:encoded>
      <enclosure length="18105203" type="audio/mpeg" url="https://cdn.simplecast.com/audio/c6bd35f9-1dfa-46bd-b8dd-b79e4ee45ff0/episodes/12bc27e3-793b-405f-bd3b-740d0b2d7266/audio/df6aeadb-5ca2-456b-b4b3-9c1127810b63/default_tc.mp3?aid=rss_feed&amp;feed=nrxyNeko"/>
      <itunes:title>ThinkstScapes Research Roundup - Q3 - 2021</itunes:title>
      <itunes:author>marco slaviero, haroon meer, Jacob Torrey</itunes:author>
      <itunes:duration>00:21:33</itunes:duration>
      <itunes:summary>This is the first episode of Thinkst Trends &amp; Takeaways. A quarterly summary of information security research, talks and presentations. Future episodes will focus on research published per quarter but this issue is based on the previous year.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding 12 months.</itunes:summary>
      <itunes:subtitle>This is the first episode of Thinkst Trends &amp; Takeaways. A quarterly summary of information security research, talks and presentations. Future episodes will focus on research published per quarter but this issue is based on the previous year.

Join our host Jacob Torrey as he highlights the research and papers that caught our eye during the preceding 12 months.</itunes:subtitle>
      <itunes:keywords>information security, cyber security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
  </channel>
</rss>