Research blog

We believe in the transformative power of digitization

We actively contribute to technology evolution by finding weaknesses, so that better technology can emerge. Our research interests cover diverse technology areas, but generally focus on complex systems with many users. It is our mission to inform these users of the risk of today’s systems.

Category
Blockchain security – Best practices for your next review
No items found.
9/24/2021
Balancing long-term technology evolution with short-term side-effects - Vulnerability disclosure best practices
No items found.
9/13/2021
Honeypot research shows variety of DDoS amplification methods
No items found.
7/29/2021
Achieving Telerik Remote Code Execution 100 Times Faster
No items found.
6/22/2021
USB peripherals can turn against their users
No items found.
6/2/2021
Fingerprints are not fit for secure device unlocking
No items found.
6/2/2021
Incorrectly patched ZyXEL vulnerability becomes zero-day again
No items found.
6/2/2021
Decrypting GSM phone calls
No items found.
6/2/2021