"Then, we show how this vulnerability can be used to construct second preimages and preimages for the implementation, and we provide a specially constructed file that, when hashed, allows the attacker to execute arbitrary code on the victim's device. " 💥🔥

https://eprint.iacr.org/2023/331

Reply to this note

Please Login to reply.

Discussion

No replies yet.