Other articles


  1. Truman: discovering hypervisor bugs through virtual device models

    Hypervisors power not just the cloud but are becoming a commodity in mobile phones and desktops as well. They separate virtual machines from each other, enabling strong isolation and security guarantees. In cloud environments, hypervisors separate non-trusting virtual machines and an attacker may try to compromise and gain access to …

    read more
  2. Auto-tagging SPAM emails

    Are you tired of publishing SPAM? Join me on a journey to set up simple blocklists to auto-filter based on origin and sender for Postfix mail servers.

    If you're in academia, you likely know publishing SPAM. For those that are not (or missed out on the pleasure so far), publishing …

    read more
  3. From Fuzzing to Frameworks: 2024 Research Highlights

    2024 was an active year for the HexHive research group, marked by tireless efforts to enhance the security of various complex systems. A key trend throughout the year was the continued evolution of fuzzing research. Notably, we observed a gradual shift away from general-purpose fuzzing as a primary research focus …

    read more

Page 1 / 9 »

links

social