NCC Group Research Blog
Whitepaper – Hardware-Backed Heist: Extracting ECDSA Keys from Qualcomm’s TrustZone
4 months 2 weeks ago
Whitepaper – HTTP Digest Integrity: Another look, in light of recent attacks
4 months 2 weeks ago
Whitepaper – Coinbugs: Enumerating Common Blockchain Implementation-Level Vulnerabilities
4 months 2 weeks ago
Whitepaper – Exploring the Security of KaiOS Mobile Applications
4 months 2 weeks ago
Whitepaper – Double Fetch Vulnerabilities in C and C++
4 months 2 weeks ago
Whitepaper – A Heap of Trouble: Breaking the Linux Kernel SLOB Allocator
4 months 2 weeks ago
Whitepaper – A Tour of Curve 25519 in Erlang
4 months 2 weeks ago
White Paper: Login Service Security
4 months 2 weeks ago
whitebox
4 months 2 weeks ago
White Paper: Browser Extension Password Managers
4 months 2 weeks ago
White Paper: Cryptopocalypse Reference Paper
4 months 2 weeks ago
Which database is more secure? Oracle vs. Microsoft
4 months 2 weeks ago
White Paper: An Introduction to Authenticated Encryption
4 months 2 weeks ago
When a Trusted Site in Internet Explorer was Anything But
4 months 2 weeks ago
When Security Gets in the Way: PenTesting Mobile Apps That Use Certificate Pinning
4 months 2 weeks ago
Whatsupgold Premium Directory traversal
4 months 2 weeks ago
Wheel of Fortune Outcome Prediction – Taking the Luck out of Gambling
4 months 2 weeks ago
Wheel of Fortune Outcome Prediction – Taking the Luck out of Gambling (1)
4 months 2 weeks ago
What the HEC? Security implications of HDMI Ethernet Channel and other related protocols
4 months 2 weeks ago
Checked
20 minutes 34 seconds ago