The cross-cache attack is a fundamental component of modern Linux kernel exploits, spanning real-world attacks and recent research. Despite its importance, it is often regarded as unreliable due to its complex setup, and existing studies lack …
File systems are essential components of modern operating systems, with Windows being one of the most dominant platforms. Recently, a series of attacks have exploited the Windows file system to trigger serious security threats such as privilege …
Memory corruptions in cellular basebands are critical because they can be
remotely exploited over-the-air, resulting in severe consequences such as
remote code execution, denial of service, and information leakage. While
previous research has made …
Decentralized Finance (DeFi) enables many novel applications that were impossible in traditional finances. However, it also introduces new types of vulnerabilities. An example of such vulnerabilities is a composability bug between token contracts and …
Cellular baseband processors represent critical security components in modern
mobile devices, yet they remain challenging to analyze due to their complexity
and restricted access. While the FirmWire enables full-system baseband
emulation, it lacks …
WebAssembly runtimes embed compilers to compile WebAssembly code into machine code for execution. These compilers use various compiler rules to define how to optimize and lower the WebAssembly code. However, existing testing tools struggle to explore …