MalwareResearchCurious case of minimizing turn around time for experiments involving large buildsI love system internals. Especially exploring the internals of the cross-platform systems and their derivatives.May 4, 2023May 4, 2023
MalwareResearchCurious case of Rust’s memory safety and info stealing malwareLet us start from where we left in the previous post —…Jul 31, 2022Jul 31, 2022
MalwareResearchCurious case of Rust’s memory managementI love Reverse Engineering. As a creature of habit, I see any concept of computing through a Reverse Engineer’s lens.Jul 30, 2022Jul 30, 2022
MalwareResearchWordle powered by Set Theory and Probabilities and Knowledge GraphI love mining information from connected entities. The key ability of the Knowledge Graph is to provide its users with the information at…Mar 28, 2022Mar 28, 2022
MalwareResearchCurious case of floating point valuewhat is the maximum value a float variable can hold?Nov 22, 20211Nov 22, 20211
MalwareResearchThe curious case of app collusionI like analogies. Both for learning and teaching. Especially if the analogy involves drawing parallels from a beloved intellect or fan…Aug 30, 2021Aug 30, 2021
MalwareResearchBinary Debugging of the instrumentation script — FridaI like frida. People who know me know that I am in absolute awe of the frida DBI framework right from its inception. In my opinion it has…Aug 13, 2021Aug 13, 2021
MalwareResearchThe curious case of 0s and 1sI like having conversations with people who are eager to learn concepts from the root level. Recently, a high level programmer was talking…Aug 8, 2021Aug 8, 2021
MalwareResearchThe curious case of a “register” variableI like looking at the concepts of a programming language from the process memory perspective. This weekend, I was looking at a disassembly…Aug 2, 2021Aug 2, 2021
MalwareResearchAsimovian take on computer security — part 1Prof. Isaac Asimov considered “computers” as immobile robots. Therefore, his legendary three laws of robotics is applicable to computers…Jun 14, 2021Jun 14, 2021