
ThinkstScapes ThinkstScapes Research Roundup - Q4 - 2025
Feb 12, 2026
33:24
Networking beyond plug-and-play
GET /large file HTTP/1.1: Connection-Based TCP Amplification Attacks
Yepeng Pan, Lars Richter, and Christian Rossow
WAFFLED: Exploiting Parsing Discrepancies to Bypass Web Application Firewalls
Seyed Ali Akhavani, Bahruz Jabiyev, Ben Kallus, Cem Topcuoglu, Sergey Bratus, and Engin Kirda
Excuse me, what precise time is it?
Oliver Ettlin
[Video]
Cut To The QUIC: Slashing QUIC's Performance With A Hash DoS
Paul Bottinelli
High-impact security at the foundations
Understanding the Security Impact of CHERI on the Operating System Kernel
Zhaofeng Li, Jerry Zhang, Joshua Tlatelpa-Agustin, Xiangdong Chen, and Anton Burtsev
CUDA de Grâce: Owning AI Cloud Infrastructure with GPU Exploits
Valentina Palmiotti and Samuel Lovejoy
[Video]
Defeating KASLR by Doing Nothing at All
Seth Jenkins
Build a Fake Phone, Find Real Bugs: Qualcomm GPU Emulation and Fuzzing with LibAFL QEMU
Romain Malmain and Scott Bauer
Rust in Android: move fast and fix things
Jeff Vander Stoep
[Blog post] [Rust course]
Skynet Starter Kit: From Embodied AI Jailbreak to Remote Takeover of Humanoid Robots
Shipei Qu, Zikai Xu, and Xuangan Xiao
[Video]
Wins and losses with LLMs and security
Scaling agentic architectures for autonomous security testing and offensive operations
Jason Garman, Jake Coyne, and Aaron Brown
Forced Descent: Google Antigravity Persistent Code Execution Vulnerability
Aaron Portnoy
Flaw And Order: Finding The Needle In The Haystack Of CodeQL Using LLMs
Simcha Kosman
Rescuing the Unpoisoned: Efficient Defense against Knowledge Corruption Attacks on RAG Systems
Kim Minseok, Lee Hankook, and Koo Hyungjoon
Whisper Leak: A novel side-channel attack on remote language models
Jonathan Bar Or and Geoff McDonald
Nifty sundries
Format-Preserving Compression-Tolerating Authenticated Encryption for Images
Alexandra Boldyreva, Kaishuo Cheng, and Jehad Hussein
Why Quantum Cryptanalysis is Bollocks
Peter Gutmann
Unmasking Organizations' Security Postures: Insights From Phishing-Resistant Authentication
Fei Liu
[Slides]
Those Who Do Not Learn from Advisories Are Doomed to Repeat Them
Louis Nyffenegger
[Video]
