Arwa | IrenaVkASCWG Quals 2024 All Crypto ChallengesHi! I am Arwa (IrenaVk) and I participated in the ASCWG qualifications with my team, V3n0mdotpy. We were able to secure 3rd place and…1d ago
Patrick WalshinThe Salty HashAnalysis of Apple’s New AI Private Compute CloudThe Good and the Bad of Their Approach to Private Server-side LLMsJun 133
Tal Be'eryRevealing the Inner Structure of AWS Session TokensTL;DR: A world first reverse engineering analysis of AWS Session Tokens. Prior to our research these tokens were a complete black box…Jul 25Jul 25
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceHappy 50th Birthday to SQLFor decades, it was IBM who were at the forefront of computing, and who conducted world-leading research. And, so, in 1957, they created…May 314May 314
Arwa | IrenaVkASCWG Quals 2024 All Crypto ChallengesHi! I am Arwa (IrenaVk) and I participated in the ASCWG qualifications with my team, V3n0mdotpy. We were able to secure 3rd place and…1d ago
Patrick WalshinThe Salty HashAnalysis of Apple’s New AI Private Compute CloudThe Good and the Bad of Their Approach to Private Server-side LLMsJun 133
Tal Be'eryRevealing the Inner Structure of AWS Session TokensTL;DR: A world first reverse engineering analysis of AWS Session Tokens. Prior to our research these tokens were a complete black box…Jul 25
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceHappy 50th Birthday to SQLFor decades, it was IBM who were at the forefront of computing, and who conducted world-leading research. And, so, in 1957, they created…May 314
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceHow Can We Determine If Bob Is Older Than Alice, Without Revealing Their Ages?The millionaire’s problem has been known for decades, and when two millionaires meet and want to know who has the most money but don’t want…Jul 30
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceSerialization of Homomorphic Encryption ElementsIn any program, we can have data objects and which are represented in a binary format. These reside in memory. But what if we need to send…7h ago1
Prof Bill Buchanan OBE FRSEThe Weakest Link in the Cybersecurity Chain: EmailHow do you actually know it was me who wrote this article? Well, I will prove it. I will take the first paragraph of the introduction, and…Apr 278