Whitepaper Archive

hackmiami_whitepapersThank you for visiting HackMiami’s Whitepaper Archive.

HackMiami publishes whitepapers for researchers, businesses, and technical audiences. Our papers cover a variety of topics and investigate the latest developments in internet security and important trends in the global threatscape. whitepaper_button

 

Because the terrain of the digital landscape is constantly shifting, we invite you to visit our archive often to download our latest research. You may also be interested in our HackMiami Presentation Archive where we share content from past HackMiami meetings and events.



Whitepaper: Analysis of the Cryptocurrency Marketplace

An overview of  the technical, economic, and social impact of cryptocurrencies such as Bitcoin and Litecoin
by: Alexander Heid

HackMiami Cryptocurrency WhitepaperThis document will go into a comprehensive level of detail about cryptocurrency technologies and protocols, as this is required to familiarize the reader with the principles behind the rapidly emerging open source economic ecosystem.  open_pdfFurthermore, emerging attack vectors of cryptocurrencies will be discussed, such as custom malware campaigns and targeted exploitation.

 

 


Whitepaper: HackMiami Web Application Scanner 2013 PwnOff

An Analysis of Automated Web Application Scanning Suites
Presented by: James Ball, Alexander Heid, and Rod Soto

P0wn off 2013This document is an analysis of the performance of five common web application scanners, which were put against three different types of web applications. The document will provide as an evaluation of the web application scanner suites from application to the completion of the scan, and will rate the suites on multiple criteria. The Web Application PwnOff was a live event that took place at the HackMiami 2013 Hackers Conference in Miami Beach Florida. There were three target web applications, one PHP based, one JSP based and one .NET based. open_pdf The scans consisted of a single pre-authentication scan, and a single post-authentication scan against each user level.