Análisis del Apagón Eléctrico en España: 28–29 de Abril de 2025 (Spanish version)
Design of a 4-bit adder. Input two 4-bit numbers A &B, output is the 4-bit sum and a carry
Exploits and mitigations for stack, heap, and side-channel vulnerabilities in C programs using ROP, unlink attacks, and timing/fault-based analysis.
Process of designing an 8-bit shift register using CMOS 45nm technology, optimized for minimum complexity and high-speed.
This post analyzes multiple security vulnerabilities in C programs, focusing on buffer overflows and memory corruption exploits.
Should social media platforms have the power to influence the world trough political advertising?
This is the report of the Lab 3 of ECE 440 at Purdue University. In this case we are trying to hear airport tower AM signals.