Understand and evaluate browser security through a browser-based penetration testing tool
Keywords Education, Computer Security Staff Ruth Hoffmann
Keywords Education, Computer Security Staff Ruth Hoffmann
The coursework task was to build a simple web application that will allow the creation of music playlists. As the user chooses songs to be added to the playlist metadata regarding the songs will be displayed on the…
Constraint Programming is a method of problem-solving that involves defining variables and their relationships in the form of constraints. It is widely used in various fields such as scheduling, resource allocation,…
Stardust Oxide is the Rust rewrite of a research operating system (OS) called Stardust, with the goal of exploring how Rust can be used to improve the way operating systems are developed and used. Stardust Oxide uses a…
Side-channel attacks are a class of security exploits that gather information indirectly from a system. This project explores how these attacks could compromise identity privacy in network traffic. Specifically, it…