AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Navigating Information Security Vulnerabilities
This chapter explores the diverse array of challenges and vulnerabilities in information security, focusing on both infrastructure and application layers. It emphasizes proactive measures and automated detection techniques to uncover critical vulnerabilities such as dangling domains and static secrets, and discusses the implications of these findings across various technology protocols. The chapter also delves into specific security issues in cloud-native environments, BGP routing, and wireless protocols, reinforcing the need for continuous adaptation in security practices.
Edge cases at scale still matter
Works from this theme exploit rarely-occurring issues, but with an internet-wide aperture to end up with impressive results. Look for: mechanising bit-squatting; static code analysis for vulnerabilities across all browser extensions, or across web ecosystems; and how Let’s Encrypt worries about revoking and reissuing 400M certificates in a week.
Going above and beyond
Talks and papers often use state-of-the-art tooling to measure/detect an interesting phenomenon. This theme highlights four works that could have followed that path, but also built robust tooling/research data to help others push the state-of-the-art forward. Look for: large scale collection and remediation of dangling domains and static secret leaks, preventing memory-corruption vulnerabilities across the Android ecosystem, remote timing attack frameworks, and SSH testing at scale.
What goes on behind the curtain can be dangerous
Modern IT systems are composed of many layers. Usually the details at lower levels can be abstracted and safely put out of mind. This theme highlights work that shows that what happens in these oft-ignored places can have significant impacts. See: AWS-internal resources built on your behalf, BGP security weaknesses, stealthy hardware backdoors in access control systems spanning over 15 years, Wi-Fi management plane vulnerabilities, VPN-OS interactions, and a legacy file-system hack in Windows.
Nifty sundries
As always, we wanted to showcase work that didn’t fit into the major themes of this issue. We cover: bypassing voice authentication with only a picture of the victim’s face, racking up bills on locked credit cards, email parsing confusion, scanning IPv6, and a timing attack on remote web clients.
Joohoi and STÖK
Eugene Lim
Eddie Zhang
Aaron Gable
Bill Demirkapi
[Blog]
Jeff Vander Stoep and Alex Rebert
[Blog]
James Kettle
HD Moore and Rob King
Yakir Kadkoda, Michael Katchinskiy, and Ofek Itach
Niklas Vogel, Donika Mirdita, Haya Schulmann, and Michael Waidner
Philippe Teuwen
Xin'an Zhou, Zhiyun Qian, Juefei Pu, Qing Deng, Srikanth Krishnamurthy, and Keyu Man
Benjamin Mixon-Baca, Jeffrey Knockel, Diwen Xue, Deepak Kapur, Roya Ensafi, and Jed Crandall
[Paper]
Or Yair
[Slides] [Blog] [Video] [Code]
Nan Jiang, Bangjie Sun, Terence Sim, and Jun Han
Raja Hasnain Anwar, Syed Rafiul Hussain, and Muhammad Taqi Raza
Gareth Heyes
Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, and Paul Pearce
Daniel Gruss and Stefan Gast
While we started off 2024 with a modest amount of high-quality works, this has scaled up significantly. As conference publications increase, we do see a slight decline in the number of blogs; there does appear to be some inverse correlation between the two tallies.
We highlighted three themes for this quarter:
We’re looking forward to seeing how the year closes out with our year in review and the final quarter of 2024.
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode
Hear something you like? Tap your headphones to save it with AI-generated key takeaways
Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more
Listen to all your favourite podcasts with AI-powered features
Listen to the best highlights from the podcasts you love and dive into the full episode