Tagged articles
9 articles
Page 1 of 1
Linux Kernel Journey
Linux Kernel Journey
Apr 30, 2026 · Information Security

Understanding the BPF Loader and Its Signature Schemes

This article provides an in‑depth technical walkthrough of the eBPF loader implementation, explains two signature schemes, details map creation, hash calculation, CO‑RE relocation handling, the use_loader mode, kernel‑side verification via Hornet LSM, and discusses the advantages, limitations, and TOCTOU concerns.

BPF loaderCO-REHornet LSM
0 likes · 31 min read
Understanding the BPF Loader and Its Signature Schemes
Test Development Learning Exchange
Test Development Learning Exchange
Jul 18, 2025 · Backend Development

Build a Flask Mock Payment Callback Service with Signature Verification

Learn how to create a local Flask-based mock payment callback server that validates signatures, returns standardized responses for platforms like WeChat and Alipay, includes a recommended project structure, detailed code examples, testing with pytest, and tips for extending functionality and exposing it via ngrok.

FlaskMock ServerPayment Callback
0 likes · 7 min read
Build a Flask Mock Payment Callback Service with Signature Verification
Su San Talks Tech
Su San Talks Tech
Nov 28, 2024 · Backend Development

Unified Asynchronous Notification Verification Using Custom Spring MVC Argument Resolvers

The article explains how to encapsulate asynchronous notification signature verification in Spring MVC by creating a custom annotation and argument resolver, discusses why aspects and @RequestBody are unsuitable, and presents an alternative unified notification handling design using a service interface and dynamic implementation loading.

Custom Argument ResolverJavaSpring MVC
0 likes · 9 min read
Unified Asynchronous Notification Verification Using Custom Spring MVC Argument Resolvers
JavaEdge
JavaEdge
Sep 9, 2024 · Backend Development

Avoid Common Pitfalls When Implementing WeChat Pay v2: A Backend Guide

This article outlines essential backend best practices for integrating WeChat Pay v2, covering correct handling of order amounts, trade type fields, second signatures, merchant binding, currency units, duplicate consumption prevention, payment result verification, non‑transactional operation logging, and the unified order API.

BackendDuplicate PreventionJava
0 likes · 6 min read
Avoid Common Pitfalls When Implementing WeChat Pay v2: A Backend Guide
Top Architect
Top Architect
Nov 9, 2023 · Backend Development

Implementing Open API Signature Verification with Spring Boot and AOP

This article explains the concept of open interfaces and signature verification, outlines the end‑to‑end signing and verification flow, and provides a complete Spring Boot implementation including configuration properties, a signature manager, custom annotation, AOP aspect, request‑caching filter and utility classes, all illustrated with code snippets.

API SecurityJavaOpenAPI
0 likes · 20 min read
Implementing Open API Signature Verification with Spring Boot and AOP
Programmer DD
Programmer DD
Nov 5, 2020 · Information Security

How to Verify WeChat Pay V3 Response Signatures in Java

This guide explains why and how to verify WeChat Pay V3 response signatures using Java, covering certificate serial checks, constructing the verification string from response headers, and performing SHA256‑with‑RSA validation to ensure responses truly originate from the WeChat Pay server.

API SecurityJavaRSA
0 likes · 7 min read
How to Verify WeChat Pay V3 Response Signatures in Java
JD Retail Technology
JD Retail Technology
Dec 14, 2017 · Information Security

Android Signature Verification and JNI Registration: Security Challenges and Mitigation Strategies

This article explains the background of Android app signing, outlines the core security objectives of confidentiality, integrity and availability, compares static and dynamic JNI registration methods, demonstrates native signature verification and certificate integrity checks, and summarizes common cracking techniques together with practical hardening solutions.

AndroidJNISecurity
0 likes · 16 min read
Android Signature Verification and JNI Registration: Security Challenges and Mitigation Strategies
Hujiang Technology
Hujiang Technology
Dec 13, 2016 · Information Security

Common Pitfalls and Solutions When Building an APK Protection Tool

This article enumerates the typical traps encountered while developing an Android APK protection solution—such as signature verification, JNI library stripping, smali injection limits, magic‑number manipulation, and post‑obfuscation safeguards—and offers practical mitigation strategies for each.

APK protectionAndroid SecurityJNI
0 likes · 11 min read
Common Pitfalls and Solutions When Building an APK Protection Tool