-
» Authentication
-
» Browser extensions
-
» Browser extensions
-
» Csc 724
- Paper Review - Capturing, Indexing, Clustering, and Retrieving System History by Cohen et al.
- Paper Review - Correlating instrumentation data to system states by Cohen et al.
- Paper Review - Pastry Scalable, decentralized object location and routing
- Review - Chord A Scalable Peer-to-peer Lookup Service
- Review - Time, Clocks, and the Ordering of Events in a Distributed System by Leslie Lamport
- Paper review - Distributed Snapshots by K. Mani Chandy and Leslie Lamport
-
» Csc591
- Paper review - All Your Clicks Belong to Me Investigating Click Interception
- Paper review - Characterizing Pixel Tracking through Disposable Email Services
- Paper review - Full Speed Fuzzing Reducing Fuzz Overhead using Coverage-guided tracing
- Paper review - ScriptProtect Mitigating Unsafe Third Party JavaScript Practices
- Paper review - Beyond Credential Stuffing Password Similarity Models using NN
-
» Csc724
-
» Code migration
-
» Coursera
-
» Cryptography
- Paper review - All Your Clicks Belong to Me Investigating Click Interception
- Thou Shalt Not Depend on Me Analysing the Use of Outdated JavaScript Libraries
- Everyone is Different Client-side Diversification Defending Extension Fingerprinting
- What is Symbolic Execution?
- Paper review - Characterizing Pixel Tracking through Disposable Email Services
- Paper review - Full Speed Fuzzing Reducing Fuzz Overhead using Coverage-guided tracing
- Paper review - ScriptProtect Mitigating Unsafe Third Party JavaScript Practices
- Paper review - Beyond Credential Stuffing Password Similarity Models using NN
- Paper review - EmPoWeb Empowering Web Applications with Browser Extensions
- Finding Nemo and Random number generators
- Crypto and the Second Amendment
-
» Distributed systems
- SRE Book Chapter Review - SLOs
- Presentation - Google Omega
- Paper Review - Capturing, Indexing, Clustering, and Retrieving System History by Cohen et al.
- Paper Review - Correlating instrumentation data to system states by Cohen et al.
- Introduction to Gossip Protocol
- Paper Review - Pastry Scalable, decentralized object location and routing
- Review - Chord A Scalable Peer-to-peer Lookup Service
- Review - Time, Clocks, and the Ordering of Events in a Distributed System by Leslie Lamport
- Notes - Site Reliability Engineering
- Paper review - Distributed Snapshots by K. Mani Chandy and Leslie Lamport
-
» Functional programming
-
» Gdd
-
» Ietf
-
» Learning
-
» Notes
-
» Prng
-
» Paper review
- Paper Review - Capturing, Indexing, Clustering, and Retrieving System History by Cohen et al.
- Paper Review - Correlating instrumentation data to system states by Cohen et al.
- Paper Review - Pastry Scalable, decentralized object location and routing
- Review - Chord A Scalable Peer-to-peer Lookup Service
- Review - Time, Clocks, and the Ordering of Events in a Distributed System by Leslie Lamport
- Paper review - Distributed Snapshots by K. Mani Chandy and Leslie Lamport
-
» Privacy
-
» Procrastination
-
» Sre
-
» Scala
-
» Studies
-
» Systems security
-
» Tls
-
» Technology
- Paper review - All Your Clicks Belong to Me Investigating Click Interception
- Paper review - Characterizing Pixel Tracking through Disposable Email Services
- Paper review - Full Speed Fuzzing Reducing Fuzz Overhead using Coverage-guided tracing
- Paper review - ScriptProtect Mitigating Unsafe Third Party JavaScript Practices
- Paper review - Beyond Credential Stuffing Password Similarity Models using NN
- Paper review - EmPoWeb Empowering Web Applications with Browser Extensions
- Presentation - Google Omega
- IIESoc Connections 2018
- ELI5 TLS1.3
- Crypto and the Second Amendment
- Steps to migrate code
- IIESoc Connections
- A Good American - review
- ZKP based multifactor auth scheme for BHIM
- /dev/random vs /dev/urandom
-
» Tensorflow
-
» Twitter