Skip to main content

Questions tagged [research]

An activity meant to understand the way a mechanism or system works. The study or examination of a security problem or class of security problems.

0 votes
2 answers
224 views

I've been thinking about creating proof-of-concept malicious packages, specifically in the JavaScript space. Think a repository that directly contains malicious code that scans for secrets, or an NPM ...
dwjohnston's user avatar
3 votes
0 answers
202 views

I remember seeing a tweet about an infosec research paper a while ago on how one can put a lot of "fake vulnerabilities", which resemble real vulnerabilities but are actually formally proven ...
Hypatia du Bois-Marie's user avatar
0 votes
0 answers
103 views

As we all know, never trust the client, when they send data to your server. However what if you prevent data manipulation by completely restructuring the architecture to something like the following: ...
mrtechtroid's user avatar
1 vote
1 answer
283 views

I'm trying to understand how to get more information about a vulnerability given a CVE. I noticed that some CVEs, on websites like https://www.cvedetails.com, have got references to articles or to ...
Fral's user avatar
  • 13
1 vote
1 answer
107 views

I'm researching information about HTTP/2 from a cybersecurity point of view for an article, and i wanted to include a section about attacks exclusive to HTTP/2 or were this protocol have a key role. I ...
kiratross's user avatar
1 vote
1 answer
2k views

RFC5958 defines a set of enhancements to the PKCS#8 key serialization format, bumping the version field up to 1 and additionally permitting serialization of public keys for arbitrary asymmetric ...
JamesTheAwesomeDude's user avatar
13 votes
5 answers
6k views

Based on this question. Why are there more research papers on Android malware than iOS malware?
Marcus's user avatar
  • 1,157
2 votes
0 answers
68 views

When reading malware-analysis posts, I see researchers talking about sophisticated state-sponsored actors. How can researchers know when something is state-sponsored from their code/C2 servers alone?
Jack walker's user avatar
15 votes
2 answers
4k views

Reading papers written by teams looking for vulnerabilities using fuzzing, I notice that many people label a crash as a DoS vulnerability. While in other papers and researches, they go deeper after ...
J. Doe's user avatar
  • 75
1 vote
2 answers
151 views

I'm doing research about Information Security Controls. Considering that the topic is very wide, I would like to organize in macro categories the security controls that can be adopted by an enterprise ...
Doraemon's user avatar
1 vote
0 answers
331 views

I am a Computer Science Engineering undergraduate aspiring to pursue a career in the field of cyber security. I have some experience in web application security, memory and network forensics fields. I ...
Picanto's user avatar
  • 11
12 votes
3 answers
5k views

Concept of Rings Rings were introduced in the forerunner of UNIX, Multics, and had 8 rings for reading, writing, executing and calling (I don't quite understand why it needed 8 rings to do this, if ...
LTPCGO's user avatar
  • 1,065
2 votes
0 answers
3k views

First off, let me preface this post by saying I'm not a security expert. I'm trying to build regular expressions to find OAuth 2.0 access tokens and API Keys for common web sites such as Google, ...
Geoff Williams's user avatar
0 votes
1 answer
3k views

I am going to be starting my dissertation soon in MSc Cyber Security. The supervisor keeps asking me 'What will be your IT artefact?' and to be honest I have no idea what he is actually asking me. I ...
Liqua's user avatar
  • 1
1 vote
0 answers
190 views

I'm attempting to debug different native binaries in my Android device using the adb shell and gdbserver. I receive the following error when i place a breakpoint in a program using gdb and continue ...
david 's user avatar
  • 11

15 30 50 per page
1
2 3 4 5
8