Documents

In this repository, I will collect documents, writings, papers and publications that I write for various reasons. Some of these documents will be assignments from my Master’s study that turn out interesting enough that others might want to see them. Other documents will be produced for work reasons or out of personal interest.

Finding Software Vulnerabilities

At the time of writing this paper, I knew very little about how one would go about finding a software vulnerability, and potentially exploit it, so when I got the chance, I did some research into existing publications on the subject, and summarized everything in this paper.

Generating S-Boxes for Block Ciphers

A paper originally written for a crypto course. Explains how to generate s-boxes using “almost perfect nonlinear” functions, and how to test the quality of these generated s-boxes to weed out the ones that are not suitable.

Mobile Application Sandboxing

This paper explores the technology used to protect users of mobile phones against malicious applications by means of sandboxing. We will look at possible attacks and ways that these sandboxes could be improved.

Web Payments Value Chains

I have spent quite some time working with the Web Payments specifications, and have had numerous discussions with various people on what the best strategy for adoption would be, and whether the technology is even viable. This document expresses the various forms of web payments as value chains, which provides an interesting and illuminating perspective on the subject.