CVE-2022-0461
Policy bypass in COOP in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to bypass iframe sandbox via a crafted HTML page.
Robust Fingerprinting of Genomic Databases. (arXiv:2204.01801v1 [cs.CR])
Database fingerprinting has been widely used to discourage unauthorized redistribution of data by providing means to identify the source of data leakages. However, there is no fingerprinting scheme aiming at…
An Algebraic System for Constructing Cryptographic Permutations over Finite Fields. (arXiv:2204.01802v1 [cs.CR])
In this paper we identify polynomial dynamical systems over finite fields as the central component of almost all iterative block cipher design strategies over finite fields. We propose a generalized…
An Algebraic System for Constructing Cryptographic Permutations over Finite Fields. (arXiv:2204.01802v1 [cs.CR])
In this paper we identify polynomial dynamical systems over finite fields as the central component of almost all iterative block cipher design strategies over finite fields. We propose a generalized…
CVE-2022-0462
Inappropriate implementation in Scroll in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting. (arXiv:2204.01934v1 [cs.CV])
Fine-tuning attacks are effective in removing the embedded watermarks in deep learning models. However, when the source data is unavailable, it is challenging to just erase the watermark without jeopardizing…
Compliance Checking with NLI: Privacy Policies vs. Regulations. (arXiv:2204.01845v1 [cs.CL])
A privacy policy is a document that states how a company intends to handle and manage their customers’ personal data. One of the problems that arises with these privacy policies…
Compliance Checking with NLI: Privacy Policies vs. Regulations. (arXiv:2204.01845v1 [cs.CL])
A privacy policy is a document that states how a company intends to handle and manage their customers’ personal data. One of the problems that arises with these privacy policies…
CVE-2022-0463
Use after free in Accessibility in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption…
Attention Distraction: Watermark Removal Through Continual Learning with Selective Forgetting. (arXiv:2204.01934v1 [cs.CV])
Fine-tuning attacks are effective in removing the embedded watermarks in deep learning models. However, when the source data is unavailable, it is challenging to just erase the watermark without jeopardizing…