Interesting approach of using a fault-tolerance feature to handle transient HW issues as a way to bypass fingerprint attempt counters. Obviously less practical due to needing invasive physical access and a fingerprint database, but a nice multi-device logic bug class!
User Profile
This link opens in a pop-up window
User Activity
RSS feed Back
Fingerprint authentication has been widely adopted on smartphones to complement traditional password authentication, making it …
Fingerprint authentication has been widely adopted on smartphones to complement traditional password authentication, making it …
Heard about this on @riskybusiness@infosec.exchange and @casey thought it would be a good one to read as a #ThinkstScapes candidate.
Jacob T. finished reading LIMA: Less Is More for Alignment by Chunting Zhou
Large language models are trained in two stages: (1) unsupervised pretraining from raw text, to …
Not a ton more than what was in the abstract: it only takes a small number of fine-tuning samples to greatly improve the [human-scored] performance of LLMs.
Jacob T. started reading Art of Prolog by Leon S. Sterling
Rereading for the third time
Jacob T. wants to read LIMA: Less Is More for Alignment by Chunting Zhou
Large language models are trained in two stages: (1) unsupervised pretraining from raw text, to …
Curious to see how model fine-tuning works as well as see about detection accuracy for tuned LLMs.
A recent series of experiments demonstrated that introducing ranking bias to election-related search engine results …
Suggested by @khae to read.
We present a practical method to achieve timelock encryption, where a ciphertext is guaranteed to …
A breakthrough if it withstands scrutiny
5 stars
This paper (and the associated code/service: timevault.drand.love/) may be one of the most/only valuable contributions to come from the entire web3 ecosystem. The ability to commit to a future decryption time is a powerful primitive, such as in auctions, coordinated disclosure, and other "dead man's switch" scenarios.
I look forward to this work being critiqued and built-upon for a whole host of interesting offerings.
Jacob T. wants to read An illusion of predictability in scientific results by Sam Zhang
Traditionally, scientists have placed more emphasis on communicating inferential uncertainty (i.e., the precision of statistical …
Found this posted by @ct_bergstrom@fediscience.org as the "best paper I've read this year", which is a strong endorsement.
Satellites in Geostationary Orbit (GEO) provide a number of commercial, government, and military services around …
While an interesting modeling exercise, and certainly something to be worried about if you own or rely on a GEO satellite, the hostile takeover of an entire LEO constellation would be incredibly impactful beyond temporary jamming of a GEO bird.
COSPAS-SARSAT is an International programme for “Search and Rescue” (SAR) missions based on the “Satellite …
High consequence junk hacking
2 stars
This paper predictably finds a lack of authentication and cryptographic protections in a legacy RF protocol that is designed to work around the world for life-saving signals. While they determine is it possible to spoof a signal in a lab environment, and call for improved authentication, etc. they fail to include the international legal framework surrounding these signals, and the fact that in a safety-critical environment, a signal discarded due to lack of nonce freshness is more risky than allowing bad actors with drones to send illegal signals.
Wi-Fi devices routinely queue frames at various layers of the network stack before transmitting, for …
A good reminder that edge cases in state machines can have severe security implications, even if the crypto itself is done well.

casey commented on The right kind of crazy by Adam Steltzner
Jacob T. finished reading Using ZK Proofs to Fight Disinformation by Trisha Datta
Verifying where and when a digital image was taken has become increasingly difficult; this issue …
Great talk on a timely topic. Other applications of this work could have significant benefits across numerous fields, including pharmaceutical research, repeatable science, etc.

Let Me Unwind That For You: Exceptions to Backward-Edge Protection (2023, NDSS Symposium 2023)
Backward-edge control-flow hijacking via stack buffer overflow is the holy grail of software exploitation. The …
Resurrecting stack-based overflows (yet again)
4 stars
This paper explored the weaknesses and risks associated with modern exception handlers (across all major OS and architectures) in unwinding attacker-controlled state. The most powerful example is a bypass of stack canaries where a function throws an exception after the overflow but before the function return; the exception handler would eventually execute attacker-controlled memory.
There is an attempt to quantify the overall impact of this mitigation bypass by looking at the Debian repos for code that uses exception handlers, but it is quite context sensitive. The paper concludes with three CVEs that would be exploitable with current mitigations (stack canaries, etc.) using the new technique.