Questions tagged [research]
An activity meant to understand the way a mechanism or system works. The study or examination of a security problem or class of security problems.
111 questions
0 votes
2 answers
224 views
If I'm creating malicious software for research/educational purposes, how do I avoid my account being banned?
I've been thinking about creating proof-of-concept malicious packages, specifically in the JavaScript space. Think a repository that directly contains malicious code that scans for secrets, or an NPM ...
3 votes
0 answers
202 views
A paper about putting formally proven secure "fake" vulnerabilities into your software to waste malicious actors' time
I remember seeing a tweet about an infosec research paper a while ago on how one can put a lot of "fake vulnerabilities", which resemble real vulnerabilities but are actually formally proven ...
0 votes
0 answers
103 views
Prevention of User Tampering the API by Serverless clients which are in sync with the real world client
As we all know, never trust the client, when they send data to your server. However what if you prevent data manipulation by completely restructuring the architecture to something like the following: ...
1 vote
1 answer
283 views
Get in depth information about vulnerability from a CVE
I'm trying to understand how to get more information about a vulnerability given a CVE. I noticed that some CVEs, on websites like https://www.cvedetails.com, have got references to articles or to ...
1 vote
1 answer
107 views
Are there HTTP/2 specific attacks different from request smuggling?
I'm researching information about HTTP/2 from a cybersecurity point of view for an article, and i wanted to include a section about attacks exclusive to HTTP/2 or were this protocol have a key role. I ...
1 vote
1 answer
2k views
How to encode a public key in PKCS#8?
RFC5958 defines a set of enhancements to the PKCS#8 key serialization format, bumping the version field up to 1 and additionally permitting serialization of public keys for arbitrary asymmetric ...
13 votes
5 answers
6k views
Why are there more research papers on Android malware than iOS malware?
Based on this question. Why are there more research papers on Android malware than iOS malware?
2 votes
0 answers
68 views
How do malware analysts know when malware is state-sponsored? [duplicate]
When reading malware-analysis posts, I see researchers talking about sophisticated state-sponsored actors. How can researchers know when something is state-sponsored from their code/C2 servers alone?
15 votes
2 answers
4k views
Is a crash always exploitable for RCE?
Reading papers written by teams looking for vulnerabilities using fuzzing, I notice that many people label a crash as a DoS vulnerability. While in other papers and researches, they go deeper after ...
1 vote
2 answers
151 views
Security Controls Categorization [closed]
I'm doing research about Information Security Controls. Considering that the topic is very wide, I would like to organize in macro categories the security controls that can be adopted by an enterprise ...
1 vote
0 answers
331 views
FYP ideas in Applications of Machine Learning in Cyber Security domain [closed]
I am a Computer Science Engineering undergraduate aspiring to pursue a career in the field of cyber security. I have some experience in web application security, memory and network forensics fields. I ...
12 votes
3 answers
5k views
Ring -3 exploits and existence of other rings
Concept of Rings Rings were introduced in the forerunner of UNIX, Multics, and had 8 rings for reading, writing, executing and calling (I don't quite understand why it needed 8 rings to do this, if ...
2 votes
0 answers
3k views
OAuth access token/API key patterns for large web sites
First off, let me preface this post by saying I'm not a security expert. I'm trying to build regular expressions to find OAuth 2.0 access tokens and API Keys for common web sites such as Google, ...
0 votes
1 answer
3k views
What is an IT Artefact
I am going to be starting my dissertation soon in MSc Cyber Security. The supervisor keeps asking me 'What will be your IT artefact?' and to be honest I have no idea what he is actually asking me. I ...
1 vote
0 answers
190 views
Android Debugging: Error accessing memory address [closed]
I'm attempting to debug different native binaries in my Android device using the adb shell and gdbserver. I receive the following error when i place a breakpoint in a program using gdb and continue ...