By Kyle Campos Self-Sovereign identity is an identity management concept that is designed to replace the current central identity management…
Taking a Look at Jupyter Security
By Niklas Bernardo Correa What is Jupyter? Jupyter Notebook is an open-source web application geared toward writing and sharing “computational…
Penetration Testing with Splunk
By Justin Balroop Splunk is a software mainly used for searching, monitoring, and examining machine-generated data, or “Big Data”, through…
Microsegmentation and How to Attack it
By Chase Alexander cma7711@rit.edu 4/11/22 *** DISCLAIMER The materials discussed in this article are solely intended for informational purposes. I…
Can you do RSA encryption with Carmichael number?
By Phuong Anh (Han) Nguyen I was introduced to Carmichael numbers in CSCI462, a Carmichael number is a composite number…
DHCP Starvation: Detection and Prevention
Introduction: Networks have become an integral part of today’s society that connect tens of thousands of devices. Each of…
Web 3.0 & Decentralized Security
By: Nolan Marolf Introduction: Bitcoin, Ethereum, dApps, DeFi and DAOs are just a few of the newest technologies being created…
Analyzing Hearing Aid Bluetooth Low Energy Traffic
By Emma Lubes 1. Overview This project aims to analyze communications over Bluetooth Low Energy (BLE) protocols between hearing aids…
Incident Response Automation Utilizing the StackStorm Framework
By: Grace Lombardi With the ever-growing need for cyber security the ability to easily automate the collection of logs and…
A Review of the Algebraic Eraser Protocol on Embedded Devices
By Harmon Herring Background Embedded devices exist all around us and become a more integrated part of our lives…