Apply Loop Invariant in Binary Search

When reading the book “Accelerated C++” years ago, I was impressed by the effectiveness of loop invariant in ensuring bug-free of many functions implemented in the book. That reading opens me another door to formulate and solve some of the error-prone programming problems. The idea of loop invariant is a …

The University of Miami Cybersecurity Conference

I was surprised when I was told that University of Miami have its first Cybersecurity Conference in October 22th, because UM and Miami itself are not technology oriented. Before coming to the event, I quite doubt about the success of the event though Mr. Joe Sullivan, the CSO of Uber Technology, former CSO at Facebook, …

How I Failed the Flare-on Challenge 2015

The second Flare-on Challenge was ended last Tuesday. I am only on the half way when the final is due. I would like to note down some of the pitfall that I realized after the game to remind me in future journey to the final list of similar games. I would elaborate through each challenges and outline the lessons I …

Behavior Analysis in Modified Cuckoo Sandbox

The goal of this project is to build an automatic dynamic malware analysis system. We leverage the advantages of Cuckoo Sandbox as a dynamic behavior collection platform. Cuckoo Sandbox is developed over 4 years in the open-source community. It is flexible to customize due to a well structured modular architecture. …

Block and Non Block IO Socket

I have received an email from Honeynet project, they give me a code test for google summer of code 2015. The problem is

to write one program in python and another one in c to read arbitrary input from one socket and write to another for each.

This problem is much harder than it appears. I am writing a post for it …