samvartaka
Home
About
Publications
Archive
Tags
Archive
2018
January
January 16, 2018
»
Analyzing the TRITON industrial malware
2017
December
December 8, 2017
»
Elevation of Privilege vulnerability in QNX Qnet
September
September 8, 2017
»
A quick look at the CIA's Protego: likely a MANPADS missile control system
January
January 3, 2017
»
33C3: Analyzing Embedded Operating System Random Number Generators
2016
June
June 3, 2016
»
Dead RATs: Exploiting malware C2 servers
April
April 8, 2016
»
VolgaCTF 2016 Quals - Five Blocks (Crypto 600) Writeup
February
February 2, 2016
»
Cryptanalysis of intercepted Israeli drone feeds
2015
November
November 20, 2015
»
A king's ransom: an analysis of the CTB-locker ransomware
September
September 13, 2015
»
The flawed crypto of Hacking Team's 'core-packer' malware crypter
September 7, 2015
»
Crypto-trouble in Poison Ivy's C2 protocol
September 3, 2015
»
Detecting an asymmetric Curve25519 backdoor in RSA key generation algorithms