-
> SIV needs a more formal threat model.
>
> Formally stating what adversaries you expect to prevent what sorts of attacks is a really important part of designing any cryptographic system. When exam…
-
great work! Can we get code for adversary attack?
-
Hey there,
I'm trying out the adversary generation example lies in `mxnet_root/example/adversary`.
In the [notebook](https://github.com/dmlc/mxnet/blob/master/example/adversary/adversary_generation.i…
-
# Lines of code
https://github.com/code-423n4/2024-05-arbitrum-foundation/blob/main/src/challengeV2/libraries/EdgeChallengeManagerLib.sol#L826-L829
# Vulnerability details
## Impact
Adversary can …
-
0x52
high
# Adversary can economically exploit wstETHLiquidityVault
## Summary
Adversary can profit off of the single sided liquidity vault by depositing, buying OHM, withdrawing then dumping the …
-
## 論文リンク
https://arxiv.org/abs/1808.02651
## 公開日(yyyy/mm/dd)
2018/08/08
## 概要
adversarial example を作るために摂動を加える時、従来手法の多くは物体の形状などは気にせず単にピクセルに誤認識を引き起こすような摂動を加えるものだった。これは物体の形状を考慮していないので、デジタル上の処理で…
-
lemonmon
High
# The worker and reputer's payload may be tampered due to lack of check for the pubkey's ownership
## Summary
`InsertBulkWorkerPayload` and `InsertBulkReputerPayload` does not check …
-
> Other tools (...and pushover) may have similar [compromsing] powers in this environment
> [...]
> The goal is not to cast aspersions on the vendor, but to point out that the system is fundamentall…
-
> Other tools (supabase, ...) may have similar [compromising] powers in this environment
> [...]
> The goal is not to cast aspersions on the vendor, but to point out that the system is fundamentally…
-
Specifically, in line 83 of SPSG/adversary/transfer.py, the tuple (y_t[i].cpu().squeeze(), sg_t[i].cpu().squeeze()) is saved, while in lines 82-84 of SPSG/utils/model.py, it tries to load three elemen…