@minhyuc

        • 2조원대 바이비트 해킹; 北 라자루스 지목
        • FBI Warns of Scattered Spider's Expanding Attacks on Airlines Using Social Engineering
        • How many dangerous permissions are too many? Popular apps see no limits
        • New Crocodilus malware steals Android users’ crypto wallet keys
        • Outsmarting Cyber Threats with Attack Graphs
        • RansomHub ransomware uses new Betruger ‘multi-function’ backdoor
        • Researchers Expose New Polymorphic Attack That Clones Browser Extensions to Steal Credentials
        • THN Weekly Recap; New Attacks, Old Tricks, Bigger Impact
        • 📦 A Multilanguage Static Analysis of Python Promgrams with Native C Extensions
        • 📦 AmpFuzz; Fuzzing for Amplification DDoS Vulnerabilities
        • 📦 Analyzing the iOS Local Network Permission from a Technical and User Perspective
        • 📦 APPATCH; Automated Adaptive Prompting Large Language Models for Real-World Software Vulnerability Patching
        • 📦 Bilingual Problems; Studying the Security Risks Incurred by Native Extensions in Scripting Languages
        • 📦 CRYTBARA; Dependency-Guided Detection of Python Cryptographic API Misuses
        • 📦 DVa; Extracting Victims and Abuse Vectors from Android Accessibility Malware
        • 📦 Extending hand to attackers; Browser Privilege Escalation Attacks via Extensions
        • 📦 Mistrust Plugins You Must; A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces
        • 📦 TARDIS; Rolling Back The Clock On CMS-Targeting Cyber Attacks
        • 📦 UntrustIDE; Exploiting Weaknesses in VS Code Extensions
    Home

    ❯

    papers

    Folder: papers

    11 items under this folder.

    • Mar 13, 2026

      📦 UntrustIDE; Exploiting Weaknesses in VS Code Extensions

      • Mar 13, 2026

        📦 TARDIS; Rolling Back The Clock On CMS-Targeting Cyber Attacks

        • Mar 13, 2026

          📦 Mistrust Plugins You Must; A Large-Scale Study Of Malicious Plugins In WordPress Marketplaces

          • Mar 13, 2026

            📦 Extending hand to attackers; Browser Privilege Escalation Attacks via Extensions

            • Mar 13, 2026

              📦 DVa; Extracting Victims and Abuse Vectors from Android Accessibility Malware

              • Mar 13, 2026

                📦 CRYTBARA; Dependency-Guided Detection of Python Cryptographic API Misuses

                • Mar 13, 2026

                  📦 Bilingual Problems; Studying the Security Risks Incurred by Native Extensions in Scripting Languages

                  • Mar 13, 2026

                    📦 Analyzing the iOS Local Network Permission from a Technical and User Perspective

                    • Mar 13, 2026

                      📦 AmpFuzz; Fuzzing for Amplification DDoS Vulnerabilities

                      • Mar 13, 2026

                        📦 APPATCH; Automated Adaptive Prompting Large Language Models for Real-World Software Vulnerability Patching

                        • Mar 13, 2026

                          📦 A Multilanguage Static Analysis of Python Promgrams with Native C Extensions