PinnedPublished inInfoSec Write-upsExploiting Android Zygote Injection (CVE-2024–31317)How Android Zygote Injection Enables System-Wide Code Execution and Privilege EscalationFeb 271Feb 271
PinnedReinforcement Learning II: Markov Decision ProcessesAn Introduction to Finite Markov Decision Processes and their MathematicsDec 31, 2024Dec 31, 2024
Reinforcement Learning I: Multi-Armed BanditsThis article addresses the challenge of solving multi-armed bandit problems using action-value methods, an important concept in…Sep 29, 2024Sep 29, 2024
Published inInfoSec Write-upsFunction Hooking Using LD_PRELOADAn Introductory Guide to Function Hooking in Unix Systems with LD_PRELOADSep 11, 2024Sep 11, 2024
Published inInstaDeepCurious Agents V: Large Sparse-Reward EnvironmentsWelcome back to our series where we investigate promising self-supervised reinforcement learning (RL) methods. In previous posts, we…Nov 7, 2023Nov 7, 2023