Vulnerabilities in supply chains aren’t a new topic and have quite a bit of focus from both a hardware and software perspective. With this post,
Author: Nathan Hamiel
Fooling Neural Networks with Rotation
In a previous blog post, we looked at the unintended effects of feeding random noise to a group of pre-trained neural networks. The subject of
Fooling Neural Networks with Noise
I’m fascinated by system failures and oddities, especially when systems are operating under normal conditions. A while back I saw a slide by Ian Goodfellow
Maximizing The Value of Virtual Security Conferences
Security conferences have been part of my life for the past two decades. I’ve learned so much, met lifelong friends, and got involved with countless
5 Common CFP Submission Mistakes for Security Conferences
Throughout my years on the review board for Black Hat, I’ve seen quite a few mistakes in submissions. Many of these mistakes are ones I’ve
Audit of KZen’s Multi-party ECDSA
KZen hired Kudelski Security to perform a security assessment of their Multi-party ECDSA library and provided us access to their source code and associated documentation.