ocular
6 posts
Case Studies: Weak Crypto
ocular
For those who directly arrived to this post, I'd strongly suggest reading the following in sequence to gain context From Code to Code Property GraphFrom Code Property Graph to OcularA Whirlwind Tour of
Case Studies: Cookie Poisoning
ocular
For those who directly arrived to this post, I'd strongly suggest reading the following in sequence to gain context From Code to Code Property GraphFrom Code Property Graph to OcularA Whirlwind Tour of
Case Studies: Detecting Sensitive Data Leaks
ocular
For those who directly arrived to this post, I'd strongly suggest reading the following in sequence to gain context From Code to Code Property GraphFrom Code Property Graph to OcularA Whirlwind Tour of
A Whirlwind Tour of Ocular
ocular
In my study of learning styles, I came across the whole to part and part to whole concept. As with all learning style paradigms, this has a strong connection to communication styles, and
From Code Property Graph to Ocular
ocular
Information flow is fundamental to application security. We do not want sensitive information to reach untrusted principals (confidentiality), andWe do not want untrusted principals to corrupt trusted information (integrity)For example, it is
From Code to Code Property Graph
ocular
The most important security vulnerabilities thus far have been found via laborious code auditing. Also, this is the only way vulnerabilities can be found and fixed during development. However, as software production rates