Amit Klein's security corner - research http://securitygalore.com/site3/taxonomy/term/27 en Recent (non-Academic) Research http://securitygalore.com/site3/recent_research <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p><span style="font-size:14px;">Research published in 2016-today</span></p> <p><span style="font-size:14px;">"<a href="http://i.blackhat.com/USA-20/Wednesday/us-20-Klein-HTTP-Request-Smuggling-In-2020-New-Variants-New-Defenses-And-New-Challenges-wp.pdf" target="_blank">HTTP Request Smuggling in 2020 - New Variants, New Defenses and New Challenges</a>", presented at BlackHat USA 2020 (<a href="http://i.blackhat.com/USA-20/Wednesday/us-20-Klein-HTTP-Request-Smuggling-In-2020-New-Variants-New-Defenses-And-New-Challenges.pdf" target="_blank">slides</a>, <a href="https://github.com/SafeBreach-Labs/HRS" target="_blank">source code - attacks</a>, <a href="https://github.com/SafeBreach-Labs/RSFW" target="_blank">source code - RSFW</a>)</span></p> <p><span style="font-size:14px;"><a href="https://i.blackhat.com/USA-19/Thursday/us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All-wp.pdf" target="_blank">"Process Injection Techniques - Gotta Catch Them All"</a> (co-authored with <a href="http://ikotler.org/" style="font-size: 13.008px;" target="_blank">Itzik Kotler</a>, <span style="color: rgb(74, 74, 74);">presented at BlackHat USA 2019, DefCon 27 USA 2019) (<a href="https://i.blackhat.com/USA-19/Thursday/us-19-Kotler-Process-Injection-Techniques-Gotta-Catch-Them-All.pdf" target="_blank">slides</a>, <a href="https://github.com/SafeBreach-Labs/pinjectra" target="_blank">source code</a>)</span></span></p> <p style="margin-top: 0px; margin-bottom: 1.2em; color: rgb(74, 74, 74); font-family: Georgia, &quot;Times New Roman&quot;, Times, serif; font-size: 14.994px;"><span style="font-size:14px;">"<a href="https://go.safebreach.com/rs/535-IXZ-934/images/Adventures_AV_Leaky_Sandbox.pdf" target="_blank">The Adventures of AV and the Leaky Sandbox</a>" <span style="color: rgb(0, 0, 0);">(co-authored with </span><a href="http://ikotler.org/" style="font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, sans-serif; font-size: 13.008px;" target="_blank">Itzik Kotler</a><span style="color: rgb(0, 0, 0);">, </span>presented at BlackHat USA 2017, DefCon 25 USA 2017) (<a href="https://go.safebreach.com/rs/535-IXZ-934/images/BlackHat_AV_Leaky_SandBox.pdf" target="_blank">slides</a>, <a href="https://github.com/SafeBreach-Labs/spacebin" target="_blank">source code</a>)</span></p> <p style="margin-top: 0px; margin-bottom: 1.2em; color: rgb(74, 74, 74); font-family: Georgia, &quot;Times New Roman&quot;, Times, serif; font-size: 14.994px;"><span style="font-size:14px;">"<a href="https://www.blackhat.com/us-16/briefings/schedule/index.html#crippling-https-with-unholy-pac-3778" style="color: rgb(0, 156, 191);" target="_blank">Crippling HTTPS with unholy PAC</a>" <span style="color: rgb(0, 0, 0);">(co-authored with </span><a href="http://ikotler.org/" style="font-family: &quot;Lucida Grande&quot;, &quot;Lucida Sans Unicode&quot;, sans-serif; font-size: 13.008px;" target="_blank">Itzik Kotler</a><span style="color: rgb(0, 0, 0);">, </span>presented at BlackHat USA 2016) (<a href="https://www.blackhat.com/docs/us-16/materials/us-16-Kotler-Crippling-HTTPS-With-Unholy-PAC.pdf" style="font-size: 14.994px; color: rgb(0, 156, 191);" target="_blank">slides</a>, <a href="https://github.com/SafeBreach-Labs/pacdoor" style="font-size: 14.994px; color: rgb(0, 156, 191);" target="_blank">source code</a>)</span></p> <p><span style="font-size:14px;">"<a href="https://go.safebreach.com/rs/535-IXZ-934/images/Whitepaper_Perfect_Exfiltration.pdf" target="_blank">In plain site: the perfect exfiltration</a>" (co-authored with <a href="http://ikotler.org/" target="_blank">Itzik Kotler</a>, presented in <a href="http://conference.hitb.org/hitbsecconf2016ams/materials/D2T1%20Itzik%20Kotler%20and%20Amit%20Klein%20-%20The%20Perfect%20Exfiltration%20Technique.pdf" target="_blank">Hack-in-the-Box Amsterdam, May 2016</a>)</span></p> <p> </p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix"><h3 class="field-label">Tags: </h3><ul class="links"><li class="taxonomy-term-reference-0" rel="dc:subject"><a href="/site3/taxonomy/term/27" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">research</a></li></ul></div> Thu, 12 Jan 2017 14:58:04 +0000 amit 23 at http://securitygalore.com/site3 http://securitygalore.com/site3/recent_research#comments