Tag: Vulnerabilities

Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks

This is a brief for the research paper “Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks”, published in the technical track of the International Conference on Automated Software Engineering (ASE 2023). This work was led by Paschal Amusuo. The full pap...

The Art of Owning Our Vulnerabilities

There is a common misconception that being vulnerable makes us weak, but how true is that? For me, being vulnerable is about embracing our imperfections, acknowledging our weaknesses, and not trying to hide them from the world. Don’t try to be perfect, because it not only puts pressure o...

The Powerful Effects of Hiding My Vulnerabilities and Emotions

Society often expects us to mainly display strength and resilience, making it uncomfortable for some to openly express vulnerabilities or emotions. While this can be particularly true in certain cultures or workplaces, we generally hide our vulnerabilities and emotions to serve various purposes and ...

Identifying vulnerabilities in GitHub Actions & AWS OIDC Configurations

In 2021, GitHub released support for OpenID Connect (OIDC) for GitHub Actions (GHA), allowing developers to securely interact with their infrastructure resources in Amazon Web Services (AWS), and other major cloud service providers. The OIDC support allows GHA jobs to retrieve short-lived session to...

Sapiens: A Brief History of Humankindby by Yuval Noah Harari

Agriculture Revolution: Instead of being seen as progress, the transition from hunter-gatherer to settled agricultural communities is described as a “Faustian bargain.” Populations increased due to increased food production, but it also brought along new vulnerabilities, drudgery, a...