Summary
- What was studied
- Why it matters
- Key outcomes
Context and goals
Describe the target component, platform versions, and the research question.
Threat model / assumptions
Clarify attacker capabilities, prerequisites, and intended security property.
Methodology
Document tools, instrumentation, test matrix, and validation steps.
Findings
Explain results with enough detail to be meaningful, without sensitive specifics.
Mitigations / recommendations
Actionable engineering guidance.
Limitations
What was not tested or what remains unknown.