By Andrew Hyatt Short Introduction to Anti-Cheat An anti-cheat can be defined as “software [that] is designed to prevent players…
Analysis of RedXOR Malware
By Jakob Zielinski Introduction The prevalence of malware written for Linux is increasing with each year. 2020 alone saw a…
Evolution of an Algorithm: From DES to DESX
By Alex Sutay For as long as we’ve been sharing information, we’ve been trying to obscure that information. Secret…
Blockchain Authentication
By A.J. Musacchio What is the Blockchain? The blockchain in its most basic form is a database. How it takes…
Web 3.0 & Decentralized Security
By: Nolan Marolf Introduction: Bitcoin, Ethereum, dApps, DeFi and DAOs are just a few of the newest technologies being created…
Understanding and Preventing DHCP Starvation Attacks
By Ryan Kessler Introduction: Networks have become an integral part of today’s society that connect tens of thousands of…
Beginners guide to Reverse Engineering Malware
By Quan Huynh To get started on reverse engineering malware, it is essential to have a separate sandbox. I recommend…
Malware Analysis Lab: Introduction to Non-Executable/Non-Binary Malware
Section I: Introduction During my internship at MITRE during the summer of 2021, I worked on the Cross Domain Solution…
XSS with JavaScript Type Coercion
By Max Fusco Introduction Did you know that you can express any javascript code in nothing more than the 10…
Security Analysis of IoT Device Networks
By: Ryan Corbin Introduction It is no secret that IoT devices are becoming more and more prevalent in society.…