Archive for the ‘Blog’ Category
The following is a multi-part series on our evaluation of the Chinese LoongArch Architecture. This series summarizes work conducted by one of our interns, Neven J., over the course of the summer. The Chinese LoongArch architecture, developed by Loongson, is a homegrown instruction set architecture (ISA) intended to reduce reliance on foreign technologies like x86… » Read More
The following is a summary of an internal research project conducted by Hudson H. and Andrew G. Goals The Find My network consists of a billion Apple devices (AirTags, iPhones, AirPods, etc) that communicate using Bluetooth and ultra-wideband, helping each other geolocate lost devices and report them to Apple’s servers. Google has created the similarly-named… » Read More
Cryptic Vector Acquires Caesar Creek Software, Expanding Its Leadership in Offensive Cyber Solutions
August 18th, 2025 by Brian
Cincinnati, Ohio – August 18, 2025: Cryptic Vector, a leading provider of full spectrum offensive cyber, electronic warfare, and secure radio frequency communications solutions, announced today it has acquired Caesar Creek Software, a provider of offensive cyber research and development services in the fields of vulnerability analysis, exploit development, reverse engineering, and network security for… » Read More
Countering UAS AI-based Object Detection (Part 5 of 5) – Real World Attacks and Future Work
August 8th, 2025 by Brian
Introduction Previously, in this blog post series on countering object detection, we spoke about novel testing methodologies and benchmark schemes for determining how effective an adversarial patch is at fooling object detection. In this post, we’ll speak on how our patches can be used in real world attacks and where we see future work heading…. » Read More
Countering UAS AI-based Object Detection (Part 4 of 5) – Simulating a Real World for Patch Testing
August 7th, 2025 by Brian
Introduction In the previous post on our series of posts about countering object detection, we finished our two part mini-series talking about our adversarial patches. In this post, we speak about our novel testing methodologies for determining which of our adversarial patches were good in the real world and which were not. To test adversarial… » Read More
