The current state of Upvote Google Upvote is a lightweight management UI and ‘sync server’ for Google’s Santa. Together these…
Performing Forensic Analysis in Memory Acquisition Lab
By: Emily Wu Introduction As someone who has an interest in digital forensics and incident response, I was excited to…
Building a Distributed Hash Table with Web Technologies
By Ethan Witherington A distributed hash table is a kind of distributed technology – Many nodes work together to achieve…
Subverting Cryptography with Dynamic Library Interpolation
By Michael Vaughan Cryptography is one of the most important security measures employed by organizations all over the world. Unlike…
SE Linux for Even Mere-er Mortals
By Lukas Vacula During my Authentication and Security Models class, I (along with the rest of the class) was assigned…
Computing Security in Gaming: Riot Games Weighs in
By Anthony Troiano As of 2016, 2.5 billion people around the world played video games. The estimated value of the…
Using Machine Learning to Attempt to Determine a Song’s Genre by the Lyrics
By Michael Smith The Basics Machine learning shows many uses throughout the cybersecurity field, being used for spam detection, malware…
Standing Stone Games and Their Fight Against In-Game Item Duplication
By Joe Schultz As long as there have been video games, there has been some part of the user population…
Setting up a Wireguard VPN Server to Access Restricted Networks
By Fred Rybin Introduction If you are a student in RIT’s Computing Security Program or have taken classes that are…
Dumping the MIFARE CRYPTO1
By Devon Reilly Introduction: Radio Frequency Identification (RFID) is a form of wireless communication identification through radio waves. This kind…