Repository files navigation
Jailbreaking + steering text of LLMs
Virtual TPM
Remote attestation - TPM/2.0
Attestation protocols
Measurements of secure workloads
Built in privacy in CV/text
Mobile security
AMD SFV technologies: SFV, SFV-FS, SFC-SNP, T20
Formal verification in software delivery
Reverse engineering
Coding theory
Information theory
Group theory
Number theory
Foundations of crypto
Encryption algorithms
Pi calculus
Mental map of Infosec
OS/Rust development
More about internet security
Haskell
ML impact on secure software
Confidential computing + data confidentiality
Virtualization SKUM, linear kernel
SDLC
Web security
Offensive security
Cloud security
Simularities & equivalence relations (bisimulation)
Fair resource allocation algorithms
Formal verification in ISABELLE/HOL
Deep learning
Adversarial ML
Privacy enhancing technology
Algebra/ linear algebra
Computer networks (P2P)
Security in OS development
Sandboxing/virtualization in containers
About
A repository where we collect topics and learning resources
Resources
Stars
Watchers
Forks
You can’t perform that action at this time.