Whitepaper called iSpy: Automatic Reconstruction of Typed Input from Compromising Reflections. The authors investigate the implications of the ubiquity of personal mobile devices and reveal new techniques for compromising the privacy of users typing on virtual keyboards.
60b7681fb94a33a6c412266114a942f9cd9a18a4b3db0a3554e8c4298fb91873
Whitepaper called English Shellcode. In this paper, they challenge the assumption that shellcode must conform to superficial and discernible representations. Specifically, they demonstrate a technique for automatically producing English Shellcode, transforming arbitrary shell-code into a representation that is superficially similar to English prose.
520adbcbc20b5b74ff45288dfb818039f329155c76d5816f3314408df708f644