Artwork

Kandungan disediakan oleh Jacob Torrey, Haroon meer, and Marco slaviero. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Jacob Torrey, Haroon meer, and Marco slaviero atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.
Player FM - Aplikasi Podcast
Pergi ke luar talian dengan aplikasi Player FM !

ThinkstScapes Research Roundup - Q4 - 2023

29:58
 
Kongsi
 

Manage episode 403598968 series 3290432
Kandungan disediakan oleh Jacob Torrey, Haroon meer, and Marco slaviero. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Jacob Torrey, Haroon meer, and Marco slaviero atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.

LLMs ain't making life any easier

Abusing Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs

Tsung-Yin Hsieh, Ben Nassi, Vitaly Shmatikov, and Eugene Bagdasaryan

[Slides] [Paper] [Code]

Tree of Attacks: Jailbreaking Black-Box LLMs Automatically

Anay Mehrotra, Manolis Zampetakis, Paul Kassianik, Blaine Nelson, Hyrum Anderson, Yaron Singer, and Amin Karbasi

[Paper] [Code]

Avoiding the basilisk's fangs: State-of-the-art in AI LLM detection

Jacob Torrey

[Slides] [Code] [Video]

Dystopian much: The Rise of the Influence Machines

Nea Paw

[Blog] [Video]

Problems in well-trodden areas

SMTP Smuggling – Spoofing E-mails Worldwide

Timo Longin

[Blog] [Video]

Blind CSS Exfiltration: Exfiltrate unknown web pages

Gareth Heyes

[Slides] [Blog] [Code]

OLE object are still dangerous today – Exploiting Microsoft Office

wh1tc and Zhiniang Peng

[Slides] [Demo Videos]

The Nightmare of Apple’s OTA Update

Mickey Jin

[Slides] [Blog] [Video]

Reflecting on our efforts

Evaluating the Security Posture of Real-World FIDO2 Deployments

Dhruv Kuchhal, Muhammad Saad, Adam Oest, and Frank Li

[Paper]

Talking about Pros and Cons

Jacob Torrey

[Slides] [Video]

NCC Group’s 2022 & 2023 Research Report

NCC Group

[Paper] [Blog]

A 3-Year Tale of Hacking a Pwn2Own Target: The Attacks, Vendor Evolution, and Lessons Learned

Orange Tsai

[Slides] [Video]

Nifty sundries

Breaking "DRM" in Polish trains

MrTick, Redford, and q3k

[Video]

Detection and Blocking with BPF via YAML

Kevin Sheldrake

[Slides] [Code]

AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis

Zhiyuan Yu, Shixuan Zhai, and Ning Zhang

[Paper] [Code]

A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier

Changqing Miao, Jianan Feng, Wei You, Wenchang Shi, Jianjun Huang, and Bin Liang

[Paper] [Code]

Spoofing DNS Records by Abusing DHCP DNS Dynamic Updates

Ori David

[Blog] [Code]

Operation Triangulation: What You Get When Attack iPhones of Researchers

Boris Larin, Leonid Bezvershenko, and Georgy Kucherin

[Blog] [Video]

Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping

Jingyang Hu, Hongbo Wang, Tianyue Zheng, Jingzhi Hu, Zhe Chen, Hongbo Jiang, and Jun Luo

[Paper] [Code]

  continue reading

12 episod

Artwork
iconKongsi
 
Manage episode 403598968 series 3290432
Kandungan disediakan oleh Jacob Torrey, Haroon meer, and Marco slaviero. Semua kandungan podcast termasuk episod, grafik dan perihalan podcast dimuat naik dan disediakan terus oleh Jacob Torrey, Haroon meer, and Marco slaviero atau rakan kongsi platform podcast mereka. Jika anda percaya seseorang menggunakan karya berhak cipta anda tanpa kebenaran anda, anda boleh mengikuti proses yang digariskan di sini https://ms.player.fm/legal.

LLMs ain't making life any easier

Abusing Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs

Tsung-Yin Hsieh, Ben Nassi, Vitaly Shmatikov, and Eugene Bagdasaryan

[Slides] [Paper] [Code]

Tree of Attacks: Jailbreaking Black-Box LLMs Automatically

Anay Mehrotra, Manolis Zampetakis, Paul Kassianik, Blaine Nelson, Hyrum Anderson, Yaron Singer, and Amin Karbasi

[Paper] [Code]

Avoiding the basilisk's fangs: State-of-the-art in AI LLM detection

Jacob Torrey

[Slides] [Code] [Video]

Dystopian much: The Rise of the Influence Machines

Nea Paw

[Blog] [Video]

Problems in well-trodden areas

SMTP Smuggling – Spoofing E-mails Worldwide

Timo Longin

[Blog] [Video]

Blind CSS Exfiltration: Exfiltrate unknown web pages

Gareth Heyes

[Slides] [Blog] [Code]

OLE object are still dangerous today – Exploiting Microsoft Office

wh1tc and Zhiniang Peng

[Slides] [Demo Videos]

The Nightmare of Apple’s OTA Update

Mickey Jin

[Slides] [Blog] [Video]

Reflecting on our efforts

Evaluating the Security Posture of Real-World FIDO2 Deployments

Dhruv Kuchhal, Muhammad Saad, Adam Oest, and Frank Li

[Paper]

Talking about Pros and Cons

Jacob Torrey

[Slides] [Video]

NCC Group’s 2022 & 2023 Research Report

NCC Group

[Paper] [Blog]

A 3-Year Tale of Hacking a Pwn2Own Target: The Attacks, Vendor Evolution, and Lessons Learned

Orange Tsai

[Slides] [Video]

Nifty sundries

Breaking "DRM" in Polish trains

MrTick, Redford, and q3k

[Video]

Detection and Blocking with BPF via YAML

Kevin Sheldrake

[Slides] [Code]

AntiFake: Using Adversarial Audio to Prevent Unauthorized Speech Synthesis

Zhiyuan Yu, Shixuan Zhai, and Ning Zhang

[Paper] [Code]

A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier

Changqing Miao, Jianan Feng, Wei You, Wenchang Shi, Jianjun Huang, and Bin Liang

[Paper] [Code]

Spoofing DNS Records by Abusing DHCP DNS Dynamic Updates

Ori David

[Blog] [Code]

Operation Triangulation: What You Get When Attack iPhones of Researchers

Boris Larin, Leonid Bezvershenko, and Georgy Kucherin

[Blog] [Video]

Password-Stealing without Hacking: Wi-Fi Enabled Practical Keystroke Eavesdropping

Jingyang Hu, Hongbo Wang, Tianyue Zheng, Jingzhi Hu, Zhe Chen, Hongbo Jiang, and Jun Luo

[Paper] [Code]

  continue reading

12 episod

Tutti gli episodi

×
 
Loading …

Selamat datang ke Player FM

Player FM mengimbas laman-laman web bagi podcast berkualiti tinggi untuk anda nikmati sekarang. Ia merupakan aplikasi podcast terbaik dan berfungsi untuk Android, iPhone, dan web. Daftar untuk melaraskan langganan merentasi peranti.

 

Panduan Rujukan Pantas

Podcast Teratas