reaching_quantum_advantage.pdf
2.7 MB
#crypto
#Research
"The impact of hardware specifications on reaching quantum advantage in the fault tolerant regime", 2022.
// Breaking 256-bit Elliptic Curve Encryption with a Quantum Computer: no time soon... IBM’s largest ever superconducting quantum computer is 127 physical qubits.
t.iss.one/Library_Sec
#Research
"The impact of hardware specifications on reaching quantum advantage in the fault tolerant regime", 2022.
// Breaking 256-bit Elliptic Curve Encryption with a Quantum Computer: no time soon... IBM’s largest ever superconducting quantum computer is 127 physical qubits.
t.iss.one/Library_Sec
Detecting_Packed_PE_Files.pdf
1.9 MB
#Malware_analysis
"Detecting Packed PE Files
Executable file analysis for the Windows operating system", 2021.
t.iss.one/Library_Sec
"Detecting Packed PE Files
Executable file analysis for the Windows operating system", 2021.
t.iss.one/Library_Sec
Beaconfuzz.pdf
3.4 MB
#Offensive_security
"BeaconFuzz:
A Journey into Ethereum 2.0 Blockchain Fuzzing and Vulnerability Discovery",.
t.iss.one/Library_Sec
"BeaconFuzz:
A Journey into Ethereum 2.0 Blockchain Fuzzing and Vulnerability Discovery",.
t.iss.one/Library_Sec
Antivirus_Event_Analysis_CheatSheet_1.9.0.pdf
56.3 KB
#Infographics
#Malware_analysis
Antivirus Event Analysis Cheat Sheet, ver. 1.9.0.
]-> https://www.nextron-systems.com/2022/02/06/antivirus-event-analysis-cheat-sheet-v1-9-0
t.iss.one/Library_Sec
#Malware_analysis
Antivirus Event Analysis Cheat Sheet, ver. 1.9.0.
]-> https://www.nextron-systems.com/2022/02/06/antivirus-event-analysis-cheat-sheet-v1-9-0
t.iss.one/Library_Sec
Cloud_Sec_Tech_Architecture_V1.pdf
2.5 MB
#Cloud_Security
"Cloud Security Technical Reference Architecture", Ver. 1.0, 2021.
t.iss.one/Library_Sec
"Cloud Security Technical Reference Architecture", Ver. 1.0, 2021.
t.iss.one/Library_Sec
Android_Permissions_Demystified.pdf
2.2 MB
#Research #privilege
"Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings", 2021.
]-> A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android:
https://github.com/little-leiry/CuPerFuzzer
t.iss.one/Library_Sec
"Android Custom Permissions Demystified: From Privilege Escalation to Design Shortcomings", 2021.
]-> A black-box fuzzer to detect custom permission related privilege escalation vulnerabilities in Android:
https://github.com/little-leiry/CuPerFuzzer
t.iss.one/Library_Sec
JSAC22_kobayashi.pdf
2.9 MB
#tools
#Blue_Team_Techniques
"ma2tl: macOS Forensic Timeline Generator Using mac_apt Analysis Results", JSAC 2022.
t.iss.one/Library_Sec
#Blue_Team_Techniques
"ma2tl: macOS Forensic Timeline Generator Using mac_apt Analysis Results", JSAC 2022.
t.iss.one/Library_Sec
Машинное_обучение_алгоритмы_для_бизнеса_2019_Маркос_Лопез_де_Прадо.pdf
55.6 MB
Машинное обучение: алгоритмы для бизнеса
де Прадо Маркос Лопез (2019)
Машинное обучение меняет практически каждый аспект нашей жизни, алгоритмы МО выполняют задачи, которые до недавнего времени доверяли только проверенным экспертам. В ближайшем будущем машинное обучение будет доминировать в финансах, гадание на кофейной гуще уйдет в прошлое, а инвестиции перестанут быть синонимом азартных игр.
t.iss.one/Library_Sec
де Прадо Маркос Лопез (2019)
Машинное обучение меняет практически каждый аспект нашей жизни, алгоритмы МО выполняют задачи, которые до недавнего времени доверяли только проверенным экспертам. В ближайшем будущем машинное обучение будет доминировать в финансах, гадание на кофейной гуще уйдет в прошлое, а инвестиции перестанут быть синонимом азартных игр.
t.iss.one/Library_Sec
npm_threat_report.pdf
11 MB
#Analytics
"NPM THREAT REPORT:
Popular Javascript Package Registry Is a Playground For Malicious Actors...", 2022.
t.iss.one/Library_Sec
"NPM THREAT REPORT:
Popular Javascript Package Registry Is a Playground For Malicious Actors...", 2022.
t.iss.one/Library_Sec
M_21_31_Model.pdf
1.3 MB
#Blue_Team_Techniques
"Maturity Model for Event Log Management (M-21-31)", August 27, 2021.
t.iss.one/Library_Sec
"Maturity Model for Event Log Management (M-21-31)", August 27, 2021.
t.iss.one/Library_Sec
RESTful_APIs.pdf
333.2 KB
#Research
"JavaScript Instrumentation for Search-Based Software Testing: A Study with RESTful APIs", 2021.
]-> The first open-source AI-driven tool for automatically generating system-level test cases for web/enterprise applications:
https://github.com/EMResearch/EvoMaster
t.iss.one/Library_Sec
"JavaScript Instrumentation for Search-Based Software Testing: A Study with RESTful APIs", 2021.
]-> The first open-source AI-driven tool for automatically generating system-level test cases for web/enterprise applications:
https://github.com/EMResearch/EvoMaster
t.iss.one/Library_Sec
Win10_Hardening_Guide.pdf
505.8 KB
#hardening
"Configuration Recommendations for Hardening of Windows 10 Using Built-in Functionalities", 2021.
]-> https://www.bsi.bund.de/EN/Topics/Cyber-Security/Recommendations/SiSyPHuS_Win10/AP11/SiSyPHuS_AP11_node.html
t.iss.one/Library_Sec
"Configuration Recommendations for Hardening of Windows 10 Using Built-in Functionalities", 2021.
]-> https://www.bsi.bund.de/EN/Topics/Cyber-Security/Recommendations/SiSyPHuS_Win10/AP11/SiSyPHuS_AP11_node.html
t.iss.one/Library_Sec