Careless Retention and Management-Understanding and Detecting Data Retention Denial-of-Service Vulnerabilities in Java Web Containers
Towards Automatic Detection and Exploitation of Java Web Application Vulnerabilities via Concolic Execution guided by Cross-thread Object Manipulation
2022_TQLCTF_Unbelievable_write
2025NepCTF
CADE-Detecting and Explaining Concept Drift Samples for Security Applications
pwn-tricks