Abstract is missing.
- Achilles Heel in Secure Boot: Breaking RSA Authentication and Bitstream Recovery from Zynq-7000 SoCPrasanna Ravi, Arpan Jati, Shivam Bhasin. 1-10 [doi]
- WhatsApp with privacy? Privacy issues with IM E2EE in the Multi-device settingTal A. Beery. 11-16 [doi]
- Introduction to Procedural Debugging through Binary LibificationJonathan Brossard. 17-25 [doi]
- The Power of Words: Generating PowerShell Attacks from Natural LanguagePietro Liguori, Christian Marescalco, Roberto Natella, Vittorio Orbinato, Luciano Pianese. 27-43 [doi]
- Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPUOlivia Gruza, Elias Heftrig, Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner. 45-57 [doi]
- Amplifying Threats: The Role of Multi-Sender Coordination in SMS-Timing-Based Location Inference AttacksEvangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan. 59-73 [doi]
- MakeShift: Security Analysis of Wireless Gear Shifting in BicyclesMaryam Motallebighomi, Earlence Fernandes, Aanjhan Ranganathan. 75-88 [doi]
- Engineering a backdoored bitcoin walletAdam Scott, Sean Andersen. 89-100 [doi]
- Oh No, My RAN! Breaking Into an O-RAN 5G Indoor Base StationLeon Janzen, Lucas Becker, Colin Wiesenäcker, Matthias Hollick. 101-115 [doi]
- RIPencapsulation: Defeating IP Encapsulation on TI MSP DevicesPrakhar Sah, Matthew Hicks. 117-132 [doi]
- Reverse Engineering the Eufy Ecosystem: A Deep Dive into Security Vulnerabilities and Proprietary ProtocolsVictor Goeman, Dairo de Ruck, Tom Cordemans, Jorn Lapon, Vincent Naessens. 133-147 [doi]
- SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M SystemsXi Tan, Zheyuan Ma, Sandro Pinto 0001, Le Guan, Ning Zhang 0017, Jun Xu 0024, Zhiqiang Lin, Hongxin Hu, Ziming Zhao 0001. 149-169 [doi]
- Not Quite Write: On the Effectiveness of Store-Only Bounds CheckingAdriaan Jacobs, Stijn Volckaert. 171-187 [doi]
- SoK: On the Effectiveness of Control-Flow Integrity in PracticeLucas Becker, Matthias Hollick, Jiska Classen. 189-209 [doi]
- Exploiting Android's Hardened Memory AllocatorPhilipp Mao, Elias Valentin Boschung, Marcel Busch, Mathias Payer. 211-227 [doi]
- Breaking Espressif's ESP32 V3: Program Counter Control with Computed Values using Fault InjectionJeroen Delvaux, Cristofaro Mune, Mario Romero, Niek Timmers. 229-243 [doi]
- Basilisk: Remote Code Execution by Laser Excitation of P-N Junctions Without Insider AssistanceJoe Loughry, Kasper Rasmussen. 245-261 [doi]
- SOK: 3D Printer Firmware Attacks on Fused Filament FabricationMuhammad Haris Rais, Muhammad Ahsan, Irfan Ahmed 0001. 263-282 [doi]