Network Security

Sample Blogs


Blog Entry Author
Trust Issues - Exploiting TrustZone TEEs Google Project Zero

Blog 1 Fall 17 Index


Blog Entry Author
Cyber Attack Event Detection Using Social Media Data Taoran Ji
Bot Nets - An Overview Louis "Mischa" Michael
Can You Fool an AI? A Beginner’s Guide to Adversarial Machine Learning Yang Xiao
Cyber Attack Detection Weisheng Zhong
TLS Proxies and Latency They Bring Kaidi Wang
Intro to Cryptanalysis Ya Xiao
Zero Trust Network Jonathan DeFreeuw
Fuzzing Ruide Zhang
Key Logger Joel Bill
The Password Reset Man in the Middle Attack Kate Nguyen
Adversarial Examples in Deep Neural Networks Xuchao Zhang
Private Traits Prediction Lei Zhang

Blog 2 Fall 17 Index


Blog Entry Author
Covert Channels Weisheng Zhong
A Forensic Analysis of Residual Artifacts From Private and Portable Web Browsing Sessions Kaidi Wang
Detecting Cyber-attack Using Unsupervised Method Taoran Ji
Detecting Credential Spearphishing Attacks in Enterprise Settings Kate Nguyen
Car Hacking - An Overview and Introduction to CAN Louis "Mischa" Michael
An Intro to Device Authentication and Fingerprinting Jonathan DeFreeuw
Primary Users' Location Privacy in Shared Spectrum Yang Xiao
What is Tor? Ya Xiao
One Pixel Attack Xuchao Zhang
DDoS Resilience in Cloud Lei Zhang
Fuzzing Take 2 Ruide Zhang

CS/ECE 5584: Network Security, Fall 2017, Ning Zhang