Aggregator
Analyzing AI Application Threat Models
1 year 4 months ago
Analysis of Boomerang Differential Trials via a SAT-Based Constraint Solver URSA
1 year 4 months ago
Analysis of setting cookies for third party websites in different browsers
1 year 4 months ago
An offensive guide to the Authorization Code grant
1 year 4 months ago
Analysing a recent Poison Ivy sample
1 year 4 months ago
An Introduction to Quantum Computing for Security Professionals
1 year 4 months ago
An Introduction to Ultrasound Security Research
1 year 4 months ago
An Introduction to Fault Injection (Part 1/3)
1 year 4 months ago
An Introduction to Heap overflows on AIX 5.3L
1 year 4 months ago
An Analysis of Mobile Geofencing App Security
1 year 4 months ago
An Illustrated Guide to Elliptic Curve Cryptography Validation
1 year 4 months ago
An Introduction to Authenticated Encryption
1 year 4 months ago
An Adventure in Contingency Debugging: Ruby IO#read/IO#write Considered Harmful
1 year 4 months ago
An adventure in PoEKmon NeutriGo land
1 year 4 months ago
Alternative Approaches for Fault Injection Countermeasures (Part 3/3)
1 year 4 months ago
An Adaptive-Ciphertext Attack Against “I ⊕ C” Block Cipher Modes With an Oracle
1 year 4 months ago
Advice for security decision makers contemplating the value of Antivirus
1 year 4 months ago
Advisory-CraigSBlackie-CVE-2016-9795
1 year 4 months ago
Adventures in Xen Exploitation
1 year 4 months ago