- See Also
-
Links
- “Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons”, 2023
- “EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers”, Et Al 2022
- “Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing”, Et Al 2022
- “Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models”, Et Al 2022
- “BTD: Decompiling X86 Deep Neural Network Executables”, Et Al 2022
- “Scammers Created an AI Hologram of Me to Scam Unsuspecting Projects”, 2022
- “Adversarial Attacks on Image Generation With Made-Up Words”, 2022
- “SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables”, 2022
- “Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing”, Et Al 2022
- “Pop Quiz! Can a Large Language Model Help With Reverse Engineering?”, Et Al 2022
- “Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on X86”, Et Al 2022
- “A Deep Dive into an NSO Zero-click IMessage Exploit: Remote Code Execution”, Beer & Groß 2021
- “Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED”, Et Al 2021
- “EvilModel: Hiding Malware Inside of Neural Network Models”, Et Al 2021
- “Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine”, 2021
- “The Relevance of Classic Fuzz Testing: Have We Solved This One?”, Et Al 2020
- “Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations”, Et Al 2020
- “Psychic Paper”, 2020
- “Spectre Is Here to Stay: An Analysis of Side-channels and Speculative Execution”, Et Al 2019
- “V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing”, Et Al 2019
- “ExSpectre: Hiding Malware in Speculative Execution”, Wampler & Al 2019
- “Chaff Bugs: Deterring Attackers by Making Software Buggier”, Et Al 2018
- “Bad Romance: To Cash in on Kindle Unlimited, a Cabal of Authors Gamed Amazon’s Algorithm”, 2018
- “Kindle Unlimited Book Stuffing Scam Earns Millions and Amazon Isn’t Stopping It: Book Stuffer Chance Carter Is Gone. But Readers Are Still Paying for Books That Are 90% Filler.”, 2018
- “Security, Moore’s Law, and the Anomaly of Cheap Complexity”, 2018
- “Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning”, Et Al 2018
- “Deep Reinforcement Fuzzing”, Et Al 2018
- “Weird Machines, Exploitability, and Provable Unexploitability”, 2017
- “When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries”, Et Al 2015
- “Microsoft Sheds Reputation As an Easy Mark for Hackers”, 2015
- “Antikernel: A Decentralized Secure Hardware-software Operating System Architecture”, 2015
- “What Are Weird Machines?”, 2015
- “Bloom Filter Applications in Network Security: A State-of-the-art Survey”, 2013
- “The Page-Fault Weird Machine: Lessons in Instruction-less Computation”, 2013
- “On Seeing Through and Unseeing: The Hacker Mindset”, 2012
- “Digital Image Forensics: a Booklet for Beginners”, Et Al 2010
- “Orangutans, Resistance and the Zoo”, 2008
- “How To Break Anonymity of the Netflix Prize Dataset”, 2006
- “Oral History of Butler Lampson § WWW”, 2006 (page 36)
- “Toward a Broader View of Security Protocols”, 2004
- “30 Years Later: Lessons from the Multics Security Evaluation”, 2002
- “An Empirical Study of the Reliability of UNIX Utilities”, Et Al 1990
- “FRACTRAN: A Simple Universal Programming Language for Arithmetic”, 1987
- “StarCraft: Remastered—Emulating a Buffer Overflow for Fun and Profit”
- “Furiosa’s Cat Feeder: The Trick Is to Be Smarter Than the Animal With a Brain the Size of a Walnut”
- “Appendix F: Personal Observations on the Reliability of the Shuttle”
- “Cryptoleaks: How BND and CIA Deceived Everyone: Research by ZDF, Washington Post and SRF Shows How the BND and CIA Secretly Spy on States—and Concealed Gross Human Rights Violations.”
- Wikipedia
- Miscellaneous
- Link Bibliography
See Also
Links
“Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons”, 2023
“Facial Misrecognition Systems: Simple Weight Manipulations Force DNNs to Err Only on Specific Persons”, 2023-01-08 ( ; similar)
“EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers”, Et Al 2022
“EarSpy: Spying Caller Speech and Identity through Tiny Vibrations of Smartphone Ear Speakers”, 2022-12-23 ( ; similar)
“Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing”, Et Al 2022
“Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing”, 2022-12-09 ( ; similar; bibliography)
“Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models”, Et Al 2022
“Rickrolling the Artist: Injecting Invisible Backdoors into Text-Guided Image Generation Models”, 2022-11-04 ( ; similar)
“BTD: Decompiling X86 Deep Neural Network Executables”, Et Al 2022
“BTD: Decompiling x86 Deep Neural Network Executables”, 2022-10-03 ( ; similar)
“Scammers Created an AI Hologram of Me to Scam Unsuspecting Projects”, 2022
“Scammers Created an AI Hologram of Me to Scam Unsuspecting Projects”, 2022-08-17 (backlinks; similar; bibliography)
“Adversarial Attacks on Image Generation With Made-Up Words”, 2022
“Adversarial Attacks on Image Generation With Made-Up Words”, 2022-08-04 ( ; similar)
“SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables”, 2022
“SATAn: Air-Gap Exfiltration Attack via Radio Signals From SATA Cables”, 2022-07-15 (similar)
“Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing”, Et Al 2022
“Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing”, 2022-05-08 (similar)
“Pop Quiz! Can a Large Language Model Help With Reverse Engineering?”, Et Al 2022
“Pop Quiz! Can a Large Language Model Help With Reverse Engineering?”, 2022-02-02 ( ; similar)
“Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on X86”, Et Al 2022
“Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on x86”, 2022-01 (similar; bibliography)
“A Deep Dive into an NSO Zero-click IMessage Exploit: Remote Code Execution”, Beer & Groß 2021
“A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution”, 2021-12-15 ( ; backlinks; similar)
“Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED”, Et Al 2021
“Glowworm Attack: Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED”, 2021-11-14 (backlinks; similar)
“EvilModel: Hiding Malware Inside of Neural Network Models”, Et Al 2021
“EvilModel: Hiding Malware Inside of Neural Network Models”, 2021-07-19 ( ; similar)
“Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine”, 2021
“Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine”, 2021-04-22 ( ; backlinks; similar)
“The Relevance of Classic Fuzz Testing: Have We Solved This One?”, Et Al 2020
“The Relevance of Classic Fuzz Testing: Have We Solved This One?”, 2020-08-14 (similar)
“Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations”, Et Al 2020
“Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations”, 2020-08-05 (backlinks; similar)
“Psychic Paper”, 2020
“Psychic Paper”, 2020-05-01 (backlinks; similar)
“Spectre Is Here to Stay: An Analysis of Side-channels and Speculative Execution”, Et Al 2019
“Spectre is here to stay: An analysis of side-channels and speculative execution”, 2019-02-14 ( ; backlinks; similar)
“V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing”, Et Al 2019
“V-Fuzz: Vulnerability-Oriented Evolutionary Fuzzing”, 2019-01-04 ( ; similar)
“ExSpectre: Hiding Malware in Speculative Execution”, Wampler & Al 2019
“Chaff Bugs: Deterring Attackers by Making Software Buggier”, Et Al 2018
“Chaff Bugs: Deterring Attackers by Making Software Buggier”, 2018-08-02 (similar)
“Bad Romance: To Cash in on Kindle Unlimited, a Cabal of Authors Gamed Amazon’s Algorithm”, 2018
“Bad romance: To cash in on Kindle Unlimited, a cabal of authors gamed Amazon’s algorithm”, 2018-07-16 ( ; backlinks; similar)
“Kindle Unlimited Book Stuffing Scam Earns Millions and Amazon Isn’t Stopping It: Book Stuffer Chance Carter Is Gone. But Readers Are Still Paying for Books That Are 90% Filler.”, 2018
“Kindle Unlimited Book Stuffing Scam Earns Millions and Amazon Isn’t Stopping It: Book stuffer Chance Carter is gone. But readers are still paying for books that are 90% filler.”, 2018-06-13 ( ; backlinks; similar)
“Security, Moore’s Law, and the Anomaly of Cheap Complexity”, 2018
“Security, Moore’s law, and the anomaly of cheap complexity”, 2018-05-29 ( ; backlinks; similar)
“Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning”, Et Al 2018
“Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning”, 2018-01-26 ( ; similar)
“Deep Reinforcement Fuzzing”, Et Al 2018
“Deep Reinforcement Fuzzing”, 2018-01-14 ( ; similar)
“Weird Machines, Exploitability, and Provable Unexploitability”, 2017
“Weird machines, exploitability, and provable unexploitability”, 2017-12-19 ( ; backlinks; similar)
“When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries”, Et Al 2015
“When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries”, 2015-12-28 (similar)
“Microsoft Sheds Reputation As an Easy Mark for Hackers”, 2015
“Microsoft Sheds Reputation as an Easy Mark for Hackers”, 2015-11-18 (backlinks; similar)
“Antikernel: A Decentralized Secure Hardware-software Operating System Architecture”, 2015
“Antikernel: A decentralized secure hardware-software operating system architecture”, 2015-04-01 ( ; similar)
“What Are Weird Machines?”, 2015
“What are Weird Machines?”, 2015 ( ; backlinks; similar; bibliography)
“Bloom Filter Applications in Network Security: A State-of-the-art Survey”, 2013
“Bloom filter applications in network security: A state-of-the-art survey”, 2013-12-24 (similar)
“The Page-Fault Weird Machine: Lessons in Instruction-less Computation”, 2013
“On Seeing Through and Unseeing: The Hacker Mindset”, 2012
“On Seeing Through and Unseeing: The Hacker Mindset”, 2012-12-09 ( ; backlinks; similar; bibliography)
“Digital Image Forensics: a Booklet for Beginners”, Et Al 2010
“Digital image forensics: a booklet for beginners”, 2010-10-24 (similar)
“Orangutans, Resistance and the Zoo”, 2008
“Orangutans, Resistance and the Zoo”, 2008-12-16 ( ; similar)
“How To Break Anonymity of the Netflix Prize Dataset”, 2006
“How To Break Anonymity of the Netflix Prize Dataset”, 2006-10-18 ( ; backlinks; similar)
“Oral History of Butler Lampson § WWW”, 2006 (page 36)
“Oral History of Butler Lampson § WWW”, 2006-08-22 ( ; similar; bibliography)
“Toward a Broader View of Security Protocols”, 2004
“Toward a Broader View of Security Protocols”, 2004-03-06 ( ; backlinks; similar)
“30 Years Later: Lessons from the Multics Security Evaluation”, 2002
“30 years later: lessons from the Multics security evaluation”, 2002-12-09 ( ; similar; bibliography)
“An Empirical Study of the Reliability of UNIX Utilities”, Et Al 1990
“An empirical study of the reliability of UNIX utilities”, 1990 (similar)
“FRACTRAN: A Simple Universal Programming Language for Arithmetic”, 1987
“FRACTRAN: A Simple Universal Programming Language for Arithmetic”, 1987 ( ; backlinks)
“StarCraft: Remastered—Emulating a Buffer Overflow for Fun and Profit”
“Furiosa’s Cat Feeder: The Trick Is to Be Smarter Than the Animal With a Brain the Size of a Walnut”
“Appendix F: Personal Observations on the Reliability of the Shuttle”
“Cryptoleaks: How BND and CIA Deceived Everyone: Research by ZDF, Washington Post and SRF Shows How the BND and CIA Secretly Spy on States—and Concealed Gross Human Rights Violations.”
Wikipedia
Miscellaneous
-
“
/idea
”, (backlinks; bibliography) -
http://www.ranum.com/security/computer_security/editorials/dumb/
-
https://flak.tedunangst.com/post/a-brief-history-of-one-line-fixes
-
https://nitter.moomoo.me/nicksaraev/status/1598037718671708161
-
https://official-kircheis.tumblr.com/post/682013772643254272/jadagul-prokopetz-repost-this-image
-
https://www.da.vidbuchanan.co.uk/blog/exploiting-acropalypse.html
Link Bibliography
-
https://arxiv.org/abs/2212.04732
: “Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing”, Zhe Liu, Chunyang Chen, Junjie Wang, Xing Che, Yuekai Huang, Jun Hu, Qing Wang: -
https://www.binance.com/en/blog/community/scammers-created-an-ai-hologram-of-me-to-scam-unsuspecting-projects-6406050849026267209
: “Scammers Created an AI Hologram of Me to Scam Unsuspecting Projects”, Patrick Hillmann: -
2022-wang.pdf
: “Hertzbleed: Turning Power Side-Channel Attacks Into Remote Timing Attacks on X86”, Yingchen Wang, Riccardo Paccagnella, Elizabeth Tang He, Hovav Shacham, Christopher W. Fletcher, David Kohlbrenner: -
https://www.cs.dartmouth.edu/~sergey/wm/
: “What Are Weird Machines?”, Sergey Bratus: -
unseeing
: “On Seeing Through and Unseeing: The Hacker Mindset”, Gwern Branwen: -
http://archive.computerhistory.org/resources/text/Oral_History/Lampson_Butler/102658024.05.01.pdf#page=36
: “Oral History of Butler Lampson § WWW”, Butler Lampson, Alan Kay: -
2002-karger.pdf
: “30 Years Later: Lessons from the Multics Security Evaluation”, Paul A. Karger, Roger R. Schell: