Building a dataset of IoT device firmwares (completed)

Performing security analysis of IoT devices is often expensive as it requires purchasing the IoT device, which is not practical at scale. To avoid this some researchers perform security analysis over the apps used by those IoT devices. Although this analysis can be useful it has some limitations as only one element of the ecosystem … full description “Building a dataset of IoT device firmwares (completed)”

Developing a Steganographic Wallet for Cryptocurrencies (available)

Steganography is a well-known mechanism that has been used for centuries (with different levels of sophistication) to avoid censorship and enable secret communications. Cryptocurrency wallets are normally protected by different levels of encryption and can even be stored into hardware wallets with different levels of security. Carrying one of this wallets can be problematic in … full description “Developing a Steganographic Wallet for Cryptocurrencies (available)”