3KeyTrap: Serious Vulnerability in the Internet Infrastructure (opens in new tab)athene-center.de1pedro841y ago0
9Cross Layer Attacks and How to Use Them (For DNS Cache Poisoning (opens in new tab)arxiv.org1pedro845y ago0
10How to Store Session Tokens in a Browser (and the Impacts of Each) (opens in new tab)blog.ropnop.com4pedro845y ago1
11On modern hardware the min-max heap beats a binary heap (opens in new tab)probablydance.com244pedro845y ago43
12The Octopus Scanner Malware: Attacking the open source supply chain (opens in new tab)securitylab.github.com2pedro845y ago0