Category: Cyber
Home Research
Leon Trampert, Michael Schwarz
Hidden in Plain Sight: Scriptless Microarchitectural Attacks via TrueType Font Hinting
Cyber

Microarchitectural attacks threaten system security and privacy, especially if they can be mounted without native code execution. Recent re...

Review:

This paper introduces a significant new vector for microarchitectural attacks, expanding the landscape of "scriptless" side-channel vulnerabilities. B...

View Full Research
Lucas Georget, Vincent Migliore, Vincent Nicomette, Arthur Villard, Frédéric Silvi
Poster: A microarchitectural signals analysis platform to craft Hardware Security Counters
Cyber

Detecting malicious software or hardware behavior during the operation of a computer system requires observables from one or more abstracti...

Review:

The submission, titled "Poster: A microarchitectural signals analysis platform to craft Hardware Security Counters," addresses a critical challenge in...

View Full Research
Fabian van Rissenbeck, Amit Pravin Choudhari, Christian Rossow
Poster: Isolating PIM from OS Level Adversaries
Cyber

Review:

This poster proposes to address the critical challenge of "Isolating PIM from OS Level Adversaries," a topic of high relevance in contemporary system...

View Full Research
Daan Vanoverloop, Andrés Sánchez, Victor Bullynck, Flavio Toffalini, Frank Piessens, Mathias Payer, Jo Van Bulck
Talk: Blurring Enclave Page Accesses in Space and Time with Compile-Time Instrumentation
Cyber

This talk overviews our recent work on TLBlur, a novel approach that leverages compiler instrumentation and the recent AEX-Notify hardware...

Review:

This talk outlines "TLBlur," a promising new approach to mitigating controlled-channel attacks against Intel SGX enclaves. The work leverages a novel...

View Full Research
GG Albuquerque
MACETAMENTO NO BEAT PEGA HACKER
Cyber

Este artigo apresenta uma proposta teórico-conceitual para investigar metodologias criativas e epistemologias sonoras de culturas de música eletrônica...

Review:

This article, "MACETAMENTO NO BEAT PEGA HACKER," introduces a compelling theoretical-conceptual framework aimed at investigating the creative methodol...

View Full Research
Muhammad Idris Abubakar, Ajayi Ore-Ofe, Abubakar Umar, Ibrahim Ibrahim, Lawal Abdulwahab Olugbenga, Ajikanle Abdulbasit Abiola
Design Of an Enterprise Network Terminal Security Solution
Cyber

This paper develops a secured enterprise network terminal security solution that seeks to safeguard the confidentiality, integrity, and availability o...

Review:

This paper, "Design Of an Enterprise Network Terminal Security Solution," addresses a highly pertinent and critical issue in contemporary network secu...

View Full Research
Moh Rizki Syaifudin, Mohamad Ali Murtadho, Moh Shohibul Wafa, Mukhamad Masrur
UNIPDU Campus Website Security Analysis Through Vulnerability Assessment (VA) Method with Acunetix Tools Assistance
Cyber

Amidst the rapid development of technology, website vulnerabilities are a major threat, opening up opportunities for hackers to hunt and st...

Review:

This paper addresses a highly relevant and critical topic: the security posture of the UNIPDU Jombang campus website. By employing a Vulnerability Ass...

View Full Research
Christian Alderi Jeffta Soewoeh, Edwin Tenda, Eliasta Ketaren, Wisard Widsli Kalengkongan, Mahardika Inra Takaendengan
ANALISA KERENTANAN WEBSITE FMIPA UNSRAT BERDASARKAN OPEN WEB APPLICATION SECURITY PROJECT TOP 10 FRAMEWORK
Cyber

Salah satu langkah preventif untuk meminimalisir dampak buruk serangan siber adalah dengan melakukan penilaian kerentanan yang hasilnya dapat dianalis...

Review:

This paper, titled "Vulnerability Analysis of FMIPA UNSRAT Website Based on Open Web Application Security Project Top 10 Framework," addresses a highl...

View Full Research
Yuliana, Rohmi Dyah Astuti, Ade Laelani, Linda Rassiyanti, Yusni Puspha Lestari, Ronal
Penerapan Metode Least Significant Bit untuk Penyembunyian Pesan Rahasia dalam Gambar dengan Optimasi Ukuran File
Cyber

Steganografi merupakan teknik untuk menyembunyikan pesan rahasia dalam media digital guna menjaga kerahasiaan informasi. Penelitian ini menerapkan met...

Review:

This paper presents a focused investigation into the application of the Least Significant Bit (LSB) method for embedding secret messages within graysc...

View Full Research
Gianluigi Fioriglio
Intelligenza artificiale e cibersicurezza: profili informatico-giuridici, fra vulnerabilità delle macchine e delle persone
Cyber

Il contributo discute le principali questioni di ciberiscurezza dei sistemi di Intelligenza Artificiale (IA) in una prospettiva informatico-giuridica....

Review:

The article, "Intelligenza artificiale e cibersicurezza: profili informatico-giuridici, fra vulnerabilità delle macchine e delle persone," addresses a...

View Full Research

    Showing 11 to 20 of 23 results