- oblivious hashing
- self-checksumming
- call stack integrity verification
- optimized protection composition framework using integer linear programming
- graph-sage machine-learning attacks on software protection
- Basic self-checksumming protection in Python
- SSH server with challenge-based and OTP authentication in Go
- Crypto secret sharing schemes in C++
- Microservice-based Paper review and taxonomy modelling tool in Go
_ _ _
| | | | | |
____ ___ | |__ ___ _____ ____ _____| |__ ____ _____ __| |_ _
| \ / _ \| _ \ /___) ___ | _ \ (____ | _ \| \(____ |/ _ | | | |
| | | | |_| | | | |___ | ____| | | |_/ ___ | | | | | | / ___ ( (_| |\ V /
|_|_|_|\___/|_| |_(___/|_____)_| |_(_)_____|_| |_|_|_|_\_____|\____| \_/
_____ _ _
/ __ \ (_) |
| | / )___ ____ _____ _| | ____ ___ ____
| | \__/ _ | \(____ | | | / ___) _ \| \
| |___( (_| | | | / ___ | | | ( (__| |_| | | | |
\_____)___ |_|_|_\_____|_|\_|_)____)___/|_|_|_|
(_____|