kopia lustrzana https://github.com/thinkst/zippy
				
				
				
			
		
			
	
	
		
			12 wiersze
		
	
	
		
			1.3 KiB
		
	
	
	
		
			Plaintext
		
	
	
		
		
			
		
	
	
			12 wiersze
		
	
	
		
			1.3 KiB
		
	
	
	
		
			Plaintext
		
	
	
|   | Modern techniques for modern systems | |||
|  | Work in this theme showcases both offensive and defensive research against modern systems, protocols, or environments. Expect to see post-quantum cryptography, Web3 weaknesses, and large language model (LLM) generative AI attacks featured. | |||
|  | 
 | |||
|  | New attacks, new defences | |||
|  | This theme looks at novel attack classes targeting rich environments, from server-side prototype pollution, abusing exception handlers, and a way to use Wi-Fi power management as a way to leak sensitive data. On the defensive side, we highlight a new mitigation specifically protecting the usage of system calls. | |||
|  | 
 | |||
|  | Stepping back to gain perspective | |||
|  | Talks in this theme explore how larger, non-technical research can influence technical direction. This theme includes new European Union regulation on end-to-end encryption, user studies of which users are the most at risk, and a legend stepping back to discuss the process of security research as a target for optimisation. | |||
|  | 
 | |||
|  | Nifty sundries | |||
|  | As always, there was top notch work presented or published in this quarter that didn’t fit into the aforementioned themes, but are still worth showcasing. This quarter features a crypto[graphy] attack finding evidence of a crypto[currency] heist, the use of security tooling for performance gains, and new tooling to improve reverse engineering and vulnerability discovery. |