Research (By Popularity)
A list of research pages, sorted by upvotes and downvotes. Please upvote the pages you like and downvote the ones you don't.
|
1538
|
Timing Side Channel Port Scanner in the Browser
How web pages can use a timing side channel to "scan" your local network.
|
|
1247
|
EncFS Security Audit
The results of an EncFS security audit.
|
|
692
|
How do we model this robot?
The difference between Computational Ability and Informational Ability
|
|
624
|
Blind Birthday Attack
A birthday attack without knowing what the collision actually is.
|
|
616
|
Encryption - CBC Mode IV: Secret or Not?
Should the IV in CBC mode be kept secret?
|
|
488
|
TrueCrypt's Plausible Deniability is Theoretically Useless
Why you really ought to have a hidden volume, even if you don't need one.
|
|
479
|
Is Security Local?
Is security a locally-verifiable property of computation?
|
|
465
|
Encrypting One Time Passwords (EOTP)
EOTP is a cryptographic One Time Password (OTP) protocol designed to provide a static encryption key across login sessions.
|
|
435
|
eCryptfs Security Audit
The results of an eCryptfs security audit.
|
|
431
|
The PUP Confusion Technique
Undetecting malware by making it look like a Potentially Unwanted Program (PUP).
|
|
423
|
ZeroBin Security Audit
A security audit of the ZeroBin pastebin.
|
|
414
|
Asus G Series Keyboard Design Error
Fixing a problem with the keyboard in an ASUS laptop.
|
|
355
|
Practical Race Condition Vulnerabilities in Web Applications
An example of a web application (PHP) vulnerable to a race condition, and how to fix it.
|
|
352
|
Web Browser Cryptography is a Good Thing
Why we should support the development of browser-based crypto applications.
|
|
287
|
Exploiting C++ VTABLES: Instance Replacement
Use a memory corruption vulnerability to change an instance of class A into an instance of class B.
|
|
270
|
FLUSH+RELOAD: Multi-User Systems are Doomed
The FLUSH+RELOAD side-channel attack breaks the security of multi-user systems.
|
|
256
|
Data Flow in Web Applications
A look at the flow of data in web applications and how it can be tamed for security.
|
|
252
|
Cracking Synergy's Bad Cryptography
A tool to crack Synergy's homebrew cryptography.
|
|
241
|
Triangle of Secure Code Delivery
Three properties necessary and sufficient for delivering code safely.
|
|
235
|
Password Hashing After the PHC
Giving authenticators an advantage over password crackers with cache.
|
|
217
|
Centralization is Killing Bitcoin
An article on Bitcoin, centralization, and DDoS attacks.
|
|
167
|
Bochs Hacking Guide
Hacking the Bochs x86 CPU emulator.
|
|
118
|
A Manual Random Number Generator
Generating random numbers with paper coins.
|
|
111
|
Mitigating BREACH in PHP
PHP code for mitigating the BREACH attack.
|
|
111
|
Hash0 Security Audit
A security audit of the Hash0 pastebin.
|
|
79
|
PEFS Security Audit
Security audit of the Private Encrypted File System (PEFS).
|
|
50
|
Confirmed: Microsoft Visits Links You Send In Skype
I sent a link through Skype and Microsoft visted it, confirming The H's claims.
|
|
36
|
Concentration Bounds from Parallel Repetition Theorems
My master's thesis, showing how concentration bounds can be derived from parallel repetition theorems for nonlocal games and interactive proofs.
|
|
31
|
Gocryptfs Security Audit
A security audit of the gocryptfs encrypted filesystem.
|
|
8
|
A Simple Proof of Gödel's Second Incompleteness Theorem Using Turing Machines
Proving Gödel's second incompleteness theorem in a way that should be understandable to anyone who understands the proof that the halting problem is undecidable.
|
|
6
|
A Plausible Reason It's So Hard To Prove P!=NP
Attempting to show why P!=NP is hard to prove using hash functions.
|
|
0
|
Negative Feedback for Insecure Connections
Should web browser interfaces provide negative feedback when the connection is insecure?
|
|
0
|
Instruction Filters as an Exploitation Defense
Disabling CPU instructions to thwart ROP and other attacks.
|
|
-6
|
Side-Channel Attacks on Everyday Applications
My Black Hat USA 2016 talk about the Flush+Reload side channel.
|
|
-19
|
File System Events Leak Folder Contents
An information disclosure vulnerability in Windows shared folders that lets you see what's in folers you can't access.
|


