Paper
PowerHooK: Enabling Software-Based Power Side Channels Against AMD SEV Technologies via Transient-Execution Replay [WOOT 26]
tugraz.elsevierpure.com/en/publication…
AMD SEV-SNPに対する電力サイドチャネル攻撃PowerHooK。
AES-NIに対して攻撃してAESキーを取得。
A single bit was all it took.
We successfully exploited the kernelCTF LTS kernel with a novel 1-bit flip attack against a 15-year-old vulnerability.
It affects the latest versions of all major distributions, including Android, Ubuntu, Debian, Red Hat, CentOS, and Fedora.
Some of the bugs I disclosed to MSRC last year is now public on the company's advisory page.
E.g: CVE-2025-47985 Windows Event Tracing Elevation of Privilege
starlabs.sg/advisories/25/…
From KernelSnitch to Practical msg_msg/pipe_buffer Heap KASLR Leaks
Article by Lukas Maar about evaluating the KernelSnitch timing side-channel attack on a variety of systems, including Android.
lukasmaar.github.io/posts/heap-kas…
Went from "V8 exploitation seems unachievable" to solving all 9 @pwncollege V8 challenges.
Wrote a guide on getting into browser exploitation if you already have classic pwn knowledge.
varik.dev/blog/v8/gettin…
I discovered CVE-2026-5201. A heap buffer overflow in GNOME's gdk-pixbuf JPEG loader (CVSS 7.5). A 122-byte JPEG crashes any app using gdk_pixbuf_new_from_file(). RCE demonstrated on 32-bit via vtable hijack.
Full write-up and PoCs:
github.com/kagancapar/CVE…
An analysis of CVE-2026-21236 - A heap based buffer overflow in the Microsoft Windows Kernel afd.sys - was just published by @ASN_Sinanju_06S a recent secondment with my team EDG!
Nice work for her first triage of a kernel memory corruption bug!
nccgroup.com/research/vulne…
I participated in DiceCTF 2026 Quals and found cornelslop, a kernel exploitation challenge, especially interesting. Here is my writeup🍣
ptr-yudai.hatenablog.com/entry/2026/03/…