| Blog Entry | Author |
|---|---|
| Trust Issues - Exploiting TrustZone TEEs | Google Project Zero |
| Blog Entry | Author |
|---|---|
| Cyber Attack Event Detection Using Social Media Data | Taoran Ji |
| Bot Nets - An Overview | Louis "Mischa" Michael |
| Can You Fool an AI? A Beginner’s Guide to Adversarial Machine Learning | Yang Xiao |
| Cyber Attack Detection | Weisheng Zhong |
| TLS Proxies and Latency They Bring | Kaidi Wang |
| Intro to Cryptanalysis | Ya Xiao |
| Zero Trust Network | Jonathan DeFreeuw |
| Fuzzing | Ruide Zhang |
| Key Logger | Joel Bill |
| The Password Reset Man in the Middle Attack | Kate Nguyen |
| Adversarial Examples in Deep Neural Networks | Xuchao Zhang |
| Private Traits Prediction | Lei Zhang |
| Blog Entry | Author |
|---|---|
| Covert Channels | Weisheng Zhong |
| A Forensic Analysis of Residual Artifacts From Private and Portable Web Browsing Sessions | Kaidi Wang |
| Detecting Cyber-attack Using Unsupervised Method | Taoran Ji |
| Detecting Credential Spearphishing Attacks in Enterprise Settings | Kate Nguyen |
| Car Hacking - An Overview and Introduction to CAN | Louis "Mischa" Michael |
| An Intro to Device Authentication and Fingerprinting | Jonathan DeFreeuw |
| Primary Users' Location Privacy in Shared Spectrum | Yang Xiao |
| What is Tor? | Ya Xiao |
| One Pixel Attack | Xuchao Zhang |
| DDoS Resilience in Cloud | Lei Zhang |
| Fuzzing Take 2 | Ruide Zhang |
CS/ECE 5584: Network Security, Fall 2017, Ning Zhang