Did Security Notifications Reach the Owners of IoT Devices?

Abstract: We have been working to discover IoT devices with security risks and to deliver security notifications to their owners. Our activities include discovering remote management devices used in critical infrastructure and notifying their operators; investigating IoT devices deployed within university networks and issuing notifications to administrators; and offering a security diagnostic service for consumer

Post-Quantum Threshold Ring Signature Applications from VOLE-in-the-Head

Abstract: We propose efficient, post-quantum threshold ring signatures constructed from one-wayness of AES encryption and the VOLE-in-the-Head zero-knowledge proof system. Our scheme scales efficiently to large rings and extends the ring signatures paradigm. We define and construct key-binding deterministic tags for signature linkability, that also enable succinct aggregation with approximate lower bound arguments of knowledge;

GhostRace: Exploiting and Mitigating Speculative Race Conditions

Abstract: Race conditions arise when multiple threads attempt to access a shared resource without proper synchronization, often leading to vulnerabilities such as concurrent use-after-free. To mitigate their occurrence, operating systems rely on synchronization primitives such as mutexes, spinlocks, etc. In this paper, we present GhostRace, the first security analysis of these primitives on speculatively executed

How to Crack a Train

Abstract: You’ve probably already heard the story: we got contracted to analyze a bunch of trains breaking down after being serviced by third-party workshops. We reverse engineered them and found code which simulated failures when they detected servicing attempts. We presented our findings at 37C3 and then an update of the story at 38C3. This

Trust and Authentication in Satellite Systems: Past, Present, and Future

Abstract: The security landscape of satellite systems has undergone a significant transformation in recent decades. With thousands of satellites launched annually, space-based infrastructure has become increasingly critical for communication, observation, and scientific measurement. However, this growth has also been accompanied by a decrease in the barrier to entry for attacks, driven by the widespread availability