Vaibhav Singh

  • Home
  • Projects
  • Books
  • Blog
  • Github
  • RSS Feed

  • » Authentication
    • ZKP based multifactor auth scheme for BHIM ‐ November 06, 2017
  • » Browser extensions
    • Everyone is Different Client-side Diversification Defending Extension Fingerprinting ‐ June 26, 2019
  • » Browser extensions
    • Paper review - EmPoWeb Empowering Web Applications with Browser Extensions ‐ June 12, 2019
  • » Csc 724
    • Paper Review - Capturing, Indexing, Clustering, and Retrieving System History by Cohen et al. ‐ January 27, 2019
    • Paper Review - Correlating instrumentation data to system states by Cohen et al. ‐ January 27, 2019
    • Paper Review - Pastry Scalable, decentralized object location and routing ‐ January 21, 2019
    • Review - Chord A Scalable Peer-to-peer Lookup Service ‐ January 21, 2019
    • Review - Time, Clocks, and the Ordering of Events in a Distributed System by Leslie Lamport ‐ January 19, 2019
    • Paper review - Distributed Snapshots by K. Mani Chandy and Leslie Lamport ‐ January 14, 2019
  • » Csc591
    • Paper review - All Your Clicks Belong to Me Investigating Click Interception ‐ July 03, 2019
    • Paper review - Characterizing Pixel Tracking through Disposable Email Services ‐ June 19, 2019
    • Paper review - Full Speed Fuzzing Reducing Fuzz Overhead using Coverage-guided tracing ‐ June 19, 2019
    • Paper review - ScriptProtect Mitigating Unsafe Third Party JavaScript Practices ‐ June 12, 2019
    • Paper review - Beyond Credential Stuffing Password Similarity Models using NN ‐ June 12, 2019
  • » Csc724
    • Presentation - Google Omega ‐ April 14, 2019
  • » Code migration
    • Steps to migrate code ‐ November 13, 2017
  • » Coursera
    • Functional Programming in Scala Specialization - A review ‐ July 03, 2019
  • » Cryptography
    • Paper review - All Your Clicks Belong to Me Investigating Click Interception ‐ July 03, 2019
    • Thou Shalt Not Depend on Me Analysing the Use of Outdated JavaScript Libraries ‐ June 26, 2019
    • Everyone is Different Client-side Diversification Defending Extension Fingerprinting ‐ June 26, 2019
    • What is Symbolic Execution? ‐ June 20, 2019
    • Paper review - Characterizing Pixel Tracking through Disposable Email Services ‐ June 19, 2019
    • Paper review - Full Speed Fuzzing Reducing Fuzz Overhead using Coverage-guided tracing ‐ June 19, 2019
    • Paper review - ScriptProtect Mitigating Unsafe Third Party JavaScript Practices ‐ June 12, 2019
    • Paper review - Beyond Credential Stuffing Password Similarity Models using NN ‐ June 12, 2019
    • Paper review - EmPoWeb Empowering Web Applications with Browser Extensions ‐ June 12, 2019
    • Finding Nemo and Random number generators ‐ November 23, 2017
    • Crypto and the Second Amendment ‐ November 13, 2017
  • » Distributed systems
    • SRE Book Chapter Review - SLOs ‐ June 18, 2019
    • Presentation - Google Omega ‐ April 14, 2019
    • Paper Review - Capturing, Indexing, Clustering, and Retrieving System History by Cohen et al. ‐ January 27, 2019
    • Paper Review - Correlating instrumentation data to system states by Cohen et al. ‐ January 27, 2019
    • Introduction to Gossip Protocol ‐ January 27, 2019
    • Paper Review - Pastry Scalable, decentralized object location and routing ‐ January 21, 2019
    • Review - Chord A Scalable Peer-to-peer Lookup Service ‐ January 21, 2019
    • Review - Time, Clocks, and the Ordering of Events in a Distributed System by Leslie Lamport ‐ January 19, 2019
    • Notes - Site Reliability Engineering ‐ January 19, 2019
    • Paper review - Distributed Snapshots by K. Mani Chandy and Leslie Lamport ‐ January 14, 2019
  • » Functional programming
    • Functional Programming in Scala Specialization - A review ‐ July 03, 2019
  • » Gdd
    • Google Developer Days 2017 ‐ November 30, 2017
  • » Ietf
    • IIESoc Connections 2018 ‐ November 16, 2018
    • IIESoc Connections ‐ November 08, 2017
  • » Learning
    • Learning How to Learn ‐ November 12, 2017
  • » Notes
    • SRE Book Chapter Review - SLOs ‐ June 18, 2019
    • Notes - Site Reliability Engineering ‐ January 19, 2019
  • » Prng
    • Finding Nemo and Random number generators ‐ November 23, 2017
    • /dev/random vs /dev/urandom ‐ November 05, 2017
  • » Paper review
    • Paper Review - Capturing, Indexing, Clustering, and Retrieving System History by Cohen et al. ‐ January 27, 2019
    • Paper Review - Correlating instrumentation data to system states by Cohen et al. ‐ January 27, 2019
    • Paper Review - Pastry Scalable, decentralized object location and routing ‐ January 21, 2019
    • Review - Chord A Scalable Peer-to-peer Lookup Service ‐ January 21, 2019
    • Review - Time, Clocks, and the Ordering of Events in a Distributed System by Leslie Lamport ‐ January 19, 2019
    • Paper review - Distributed Snapshots by K. Mani Chandy and Leslie Lamport ‐ January 14, 2019
  • » Privacy
    • A Good American - review ‐ November 07, 2017
  • » Procrastination
    • Twitterbots and Procrastination ‐ November 14, 2017
  • » Sre
    • SRE Book Chapter Review - SLOs ‐ June 18, 2019
    • Notes - Site Reliability Engineering ‐ January 19, 2019
  • » Scala
    • Functional Programming in Scala Specialization - A review ‐ July 03, 2019
  • » Studies
    • Learning How to Learn ‐ November 12, 2017
  • » Systems security
    • Thou Shalt Not Depend on Me Analysing the Use of Outdated JavaScript Libraries ‐ June 26, 2019
    • Everyone is Different Client-side Diversification Defending Extension Fingerprinting ‐ June 26, 2019
    • What is Symbolic Execution? ‐ June 20, 2019
  • » Tls
    • ELI5 TLS1.3 ‐ November 08, 2018
  • » Technology
    • Paper review - All Your Clicks Belong to Me Investigating Click Interception ‐ July 03, 2019
    • Paper review - Characterizing Pixel Tracking through Disposable Email Services ‐ June 19, 2019
    • Paper review - Full Speed Fuzzing Reducing Fuzz Overhead using Coverage-guided tracing ‐ June 19, 2019
    • Paper review - ScriptProtect Mitigating Unsafe Third Party JavaScript Practices ‐ June 12, 2019
    • Paper review - Beyond Credential Stuffing Password Similarity Models using NN ‐ June 12, 2019
    • Paper review - EmPoWeb Empowering Web Applications with Browser Extensions ‐ June 12, 2019
    • Presentation - Google Omega ‐ April 14, 2019
    • IIESoc Connections 2018 ‐ November 16, 2018
    • ELI5 TLS1.3 ‐ November 08, 2018
    • Crypto and the Second Amendment ‐ November 13, 2017
    • Steps to migrate code ‐ November 13, 2017
    • IIESoc Connections ‐ November 08, 2017
    • A Good American - review ‐ November 07, 2017
    • ZKP based multifactor auth scheme for BHIM ‐ November 06, 2017
    • /dev/random vs /dev/urandom ‐ November 05, 2017
  • » Tensorflow
    • Google Developer Days 2017 ‐ November 30, 2017
  • » Twitter
    • Twitterbots and Procrastination ‐ November 14, 2017

Blog Categories

  • Authentication
  • Browser Extensions
  • Browser extensions
  • CSC 724
  • CSC591
  • CSC724
  • Code migration
  • Coursera
  • Cryptography
  • Distributed Systems
  • Functional Programming
  • GDD
  • IETF
  • Learning
  • Notes
  • PRNG
  • Paper Review
  • Privacy
  • Procrastination
  • SRE
  • Scala
  • Studies
  • Systems Security
  • TLS
  • Technology
  • Tensorflow
  • Twitter

Connect

  • Linkedin
  • Github
  • Email
  • Goodreads
  • SoundCloud
LinkedIn | Github | SoundCloud | Email | Goodreads | JProfiler*
© 2012–2020 Vaibhav Singh. All rights reserved.
*Shameless Jprofiler plug.