research
∙
06/28/2023
A Diamond Model Analysis on Twitter's Biggest Hack
Cyberattacks have prominently increased over the past few years now, and...
research
∙
06/27/2023
Automated Fuzzing Harness Generation for Library APIs and Binary Protocol Parsers
Fuzzing is a widely used software security testing technique that is des...
research
∙
08/23/2022
Analyzing Trends in Tor
The Tor Network has been a significant part of the Internet for years. T...
research
∙
08/23/2022
SoK: Content Moderation Schemes in End-to-End Encrypted Systems
This paper aims to survey various techniques utilized for content modera...
research
∙
09/16/2021
Summarizing and Analyzing the Privacy-Preserving Techniques in Bitcoin and other Cryptocurrencies
Bitcoin and many other similar Cryptocurrencies have been in existence f...
research
∙
12/21/2019