Nicolas PapernotA review of “Return-Oriented Programming: Systems, Languages, and Applications.”This post is a short review of the paper by Roemer et al. published in ACM Transactions on Information and System Security in March 2012.Oct 5, 2016Oct 5, 2016
Nicolas PapernotDetecting phishing websites using a decision treeIn this post, I describe a simple tutorial that allows you to train a simple decision tree classifier to detect websites used for phishing…Sep 30, 20161Sep 30, 20161
Nicolas PapernotKerberos: An Authentication Service for Computer Networks.This post is a short review of the Kerberos article published in IEEE Communications in 1994 by B. Clifford Neuman and Theodore Ts’o.Sep 28, 2016Sep 28, 2016
Nicolas PapernotAbout Usable SecurityHere are a few notes I jotted down during talks by Adrienne Porter Felt, Jon Oberheide, and Matthew Smith on the topic of usable security…Jan 30, 20161Jan 30, 20161
Nicolas PapernotKeys Under Doormats: Mandating Insecurity by Requiring Government Access to All Data and…At Enigma 2016, Ron Rivest presented one of his papers that discusses the idea of providing “exceptional access” in encrypted systems to…Jan 27, 2016Jan 27, 2016
Nicolas PapernotInternet of Things Security at Enigma 2016Enigma is a security conference launched this year by the USENIX association. Here are a few notes I jotted down during talks by Tadayoshi…Jan 27, 2016Jan 27, 2016
Nicolas PapernotHealthcare Security at Enigma 2016Enigma is a security conference launched this year by the USENIX association. Here are a few notes I jotted down during talks by Avi Rubin…Jan 26, 2016Jan 26, 2016
Nicolas PapernotNatural Language ProcessingThis post provides a brief overview of Natural Language Processing. Its intent is not to exhaustively cover the field but rather to offer a…Jan 23, 2016Jan 23, 2016