Programming

Binary-level exploits — How to execute input data as machine code

Exploits can address any layer of an application. The most fundamental ones are those that target the binary level and...

Stack smashing prevention

Buffer overflows are common attack vectors that leverage missing checks of input data to overwrite program instructions. A rewarding program...

Step-by-step signature verification of X.509 certificates in Java

The Java code below demonstrates signature verification in a chain of X.509 certificates using cryptographic primitives (i.e. hash functions and ciphers)....

Encrypting web service demo in Java

The example below shows two simple crypto operations that are exposed via a web service interface. The approach is top-down,...

Linear blur filter demo in Java

The Java code below implements a simple linear blur filter for images. Its main purpose is to demonstrate the access and...