NCC Group Research Blog
Whitepaper: Recognizing and Preventing TOCTOU
10 months 2 weeks ago
Why AI Will Not Fully Replace Humans for Web Penetration Testing
10 months 2 weeks ago
Whitepaper – XML Schema, DTD, and Entity Attacks: A Compendium of Known Techniques
10 months 2 weeks ago
Whitepaper: CA Alternative
10 months 2 weeks ago
Whitepaper – Project Triforce: Run AFL On Everything (2017)
10 months 2 weeks ago
Whitepaper – Weaning the Web off of Session Cookies: Making Digest Authentication Viable
10 months 2 weeks ago
Whitepaper – Microcontroller Readback Protection: Bypasses and Defenses
10 months 2 weeks ago
Whitepaper – Practical Attacks on Machine Learning Systems
10 months 2 weeks ago
Whitepaper – Hardware-Backed Heist: Extracting ECDSA Keys from Qualcomm’s TrustZone
10 months 2 weeks ago
Whitepaper – HTTP Digest Integrity: Another look, in light of recent attacks
10 months 2 weeks ago
Whitepaper – Coinbugs: Enumerating Common Blockchain Implementation-Level Vulnerabilities
10 months 2 weeks ago
Whitepaper – Exploring the Security of KaiOS Mobile Applications
10 months 2 weeks ago
Whitepaper – Double Fetch Vulnerabilities in C and C++
10 months 2 weeks ago
Whitepaper – A Heap of Trouble: Breaking the Linux Kernel SLOB Allocator
10 months 2 weeks ago
Whitepaper – A Tour of Curve 25519 in Erlang
10 months 2 weeks ago
White Paper: Login Service Security
10 months 2 weeks ago
whitebox
10 months 2 weeks ago
White Paper: Browser Extension Password Managers
10 months 2 weeks ago
White Paper: Cryptopocalypse Reference Paper
10 months 2 weeks ago
Checked
8 hours 9 minutes ago