Archives


Fri 24 February 2023
A Practical Beginner's Guide to Intel Processor Trace
Fri 23 September 2022
VulChecker Accepted to USENIX 2023
Fri 02 September 2022
PUMM Accepted to USENIX 2023
Wed 31 August 2022
Differentiating ARCUS (USENIX'21) and Bunkerbuster (CCS'21)
Fri 03 June 2022
Update Regarding Halibut Bugs (CVE-2021-42612, CVE-2021-42613, CVE-2021-42614)
Sun 13 March 2022
Faculty Position at The Ohio State University
Tue 12 October 2021
Case Study: Security Analysis of Halibut
Mon 06 September 2021
Bunkerbuster to Appear in CCS'21
Tue 31 August 2021
MARSARA to Appear in CCS'21
Wed 26 May 2021
"Modeling Large-Scale Manipulation in Open Stock Markets" to Appear in IEEE Security & Privacy
Mon 08 February 2021
ARCUS System and Dataset Released
Sat 12 December 2020
Vulnerability Root Cause Analysis Approach "ARCUS" to Appear in USENIX'21
Mon 26 October 2020
"Justitia" Biometric Privacy to Appear in ASIACCS'21
Sun 04 October 2020
"Bot2Stock" to Appear in ACSAC'20
Mon 29 June 2020
New CVE Published (CVE-2020-14931)
Thu 18 June 2020
H&R Block App Analytics for 2020
Thu 18 June 2020
Fuzzers Suck: New 0-Day Shows We Need To Do Better
Mon 02 March 2020
New CVE Published (CVE-2020-9549)
Thu 15 August 2019
New PoC Published to Exploit-DB (EDB-ID-47254)
Sat 22 June 2019
A Beginner's Guide to Hacking Video Game Save States (Fire Emblem 7 on the GBA)
Tue 11 June 2019
MLSploit Extended Abstract to Appear in KDD 2019
Sat 08 June 2019
Barnum Paper to Appear in Information Security Conference 2019 (ISC'19)
Fri 26 April 2019
Extended Abstract to Appear in CVPR-19 Workshop on Explainable AI
Fri 12 April 2019
H&R Block App Analytics for 2019
Sat 06 April 2019
Android Intent Firewall Documentation
Thu 21 February 2019
Malware Has a Color
Thu 17 January 2019
Upcoming MLsploit Demo at Black Hat Asia 2019
Thu 27 December 2018
Three Kinds of Document Malware and Designing Frameworks to Detect Them
Wed 05 September 2018
Mention for Georgia Tech Vulnerability Disclosure
Tue 14 August 2018
The Unfortunate Economics of Defense in Depth
Mon 23 July 2018
Paper Accepted to ACM CCS 2018
Wed 30 May 2018
Weird Things Are Afoot In The Honeypot
Mon 14 May 2018
EFF and EFAIL: An Example of Hype Culture Gone Awry
Sat 24 February 2018
Debian Apt Repo for libipt
Fri 09 February 2018
H&R Block "MyBlock" App + USA Government Website Analytics = PROFIT
Sat 16 December 2017
How ASLR Helps Enable Exploits (CVE-2013-2028)
Sat 28 October 2017
Intel PT Data at Rest: A Compression Experiment
Tue 29 August 2017
Windows _EX_FAST_REF Pointers and Virtual Machine Introspection
Fri 28 July 2017
You never know where your code will end up.
Tue 21 March 2017
Intel Processor Trace, execvp, and ptrace
Thu 09 March 2017
Of Fancy Bears and Men: Attribution in Cybersecurity
Mon 30 January 2017
Getting the CR3 value for a PID in Linux
Tue 24 January 2017
Site Redesign
Sat 22 October 2016
The Problem with DRM
Thu 21 April 2016
Demystifying the Master’s Thesis — Is it right for you?
Fri 01 April 2016
Apple’s Balancing Act—Yesterday, Today, and Tomorrow
Mon 22 February 2016
Apple vs. the FBI
Mon 22 February 2016
SU Senior Carter Yagemann’s Summer of Android
Thu 04 February 2016
How Orange Helps You Sleep At Night
Mon 30 November 2015
Understanding Dell’s Root Certificate Problem
Wed 11 November 2015
Students Compete in RIT Cybersecurity Competition
Tue 03 November 2015
Android for Your Laptop
Fri 30 October 2015
Initial Observations Regarding Android Pay
Fri 30 October 2015
How Number of Limbs Relates to Robots and Organisms
Fri 30 October 2015
Installing Google Play Service and Google Apps on Nexus AOSP
Wed 28 October 2015
Digital Verses Analog Sanitization
Sat 24 October 2015
Is your data really gone? Explaining the challenges of data wiping.
Tue 20 October 2015
The importance of boot partitions in Linux systems.
Fri 18 September 2015
Using internet of things to turn on a computer.
Fri 13 February 2015
Installing psad on Raspberry Pi Running Arch Linux