Archive for the ‘Blog’ Category

The following is a multi-part series on our evaluation of the Chinese LoongArch Architecture. This series summarizes work conducted by one of our interns, Neven J., over the course of the summer. The Chinese LoongArch architecture, developed by Loongson, is a homegrown instruction set architecture (ISA) intended to reduce reliance on foreign technologies like x86… » Read More

The following is a summary of an internal research project conducted by Hudson H. and Andrew G. Goals The Find My network consists of a billion Apple devices (AirTags, iPhones, AirPods, etc) that communicate using Bluetooth and ultra-wideband, helping each other geolocate lost devices and report them to Apple’s servers. Google has created the similarly-named… » Read More

Cincinnati, Ohio – August 18, 2025: Cryptic Vector, a leading provider of full spectrum offensive cyber, electronic warfare, and secure radio frequency communications solutions, announced today it has acquired Caesar Creek Software, a provider of offensive cyber research and development services in the fields of vulnerability analysis, exploit development, reverse engineering, and network security for… » Read More

Introduction Previously, in this blog post series on countering object detection, we spoke about novel testing methodologies and benchmark schemes for determining how effective an adversarial patch is at fooling object detection. In this post, we’ll speak on how our patches can be used in real world attacks and where we see future work heading…. » Read More

Introduction In the previous post on our series of posts about countering object detection, we finished our two part mini-series talking about our adversarial patches. In this post, we speak about our novel testing methodologies for determining which of our adversarial patches were good in the real world and which were not. To test adversarial… » Read More