Security Reviews: The Heuristics Zoo, Part 2/2
Introduction (Part I) > Heuristics Zoo, Part 1/2 > Note: standard Disclaimer expressed in Part I applies here as well. Heuristic 5: “Area Expertise” and “Penetration Testing” These two seemingly different techniques share a lot…
Security Reviews: The Heuristics Zoo, Part 1/2
Initially meant to fit into one chapter, this text grew quickly and I had to split it into two. So there will be four parts of the article in total. See Introduction (or Part 1) >…
Practice and Theory of Security Reviews
Click here if you want to skip all the theory and just go to the Security Reviews Heuristics Zoo If you are a software security professional, you might’ve been asked sometimes to conduct a “security…
Inverse Privacy
Proving the TLS Handshake Secure (As It Is)
MSR Elliptic Curve Cryptography Library
MSR ECCLib was an efficient cryptography library that provided functions for computing essential elliptic curve operations on a new set of high-security curves. All computations on secret data exhibit regular, constant-time execution, providing protection against…