- 05 Nov 2019 »
Tor Network: Malicious Exit Relay and DNS Resolution
Introduction
In the past few weeks, I have been working on a subject project. In this project, we attempt to monitor and analysis Tor exit relays by detecting the malicious exit relays and looking ...
- 22 Sep 2019 »
Brief Overview on Measurement of Blockchain
Why It Matters
It is not doubted that Blockchain technologies are taking the world by storm. Some of the most remarkable public blockchains, such like Bitcoin and Ethereum, the former establishes ...
- 12 Sep 2019 »
About Concurrency In Python
Why
Emm…I was heading to talk about this little topic(you sure it is a little topic??) few weeks ago, but you know, procrastination. Actually I happened to write an assignment in Python for scann...
- 03 Sep 2019 »
Paper Review - Examining How the Great Firewall Discovers Hidden Circumvention Servers
Examining How the Great Firewall Discovers Hidden Circumvention Servers
Roya Ensafi , David Fifield , Philipp Winter , Nick Feamster , Nicholas Weaver , Vern Paxson, Examining How the Great Firewa...
- 03 Sep 2019 »
Paper Review - Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
Hijacking Bitcoin: Routing Attacks on Cryptocurrencies
Apostolaki Maria, Zohar Aviv, and Vanbever Laurent. “Hijacking Bitcoin: Routing Attacks on Cryptocurrencies”. In: Proceedings of the 2017 IEE...