×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Debugging Tech Guide Dev.pdf
Home
/
Discover
/
diyhpl.us
/
~bryan
/
papers2
/
security
/
Parent Folder
Debugging Tech Guide Dev.pdf
PDF
5 years ago
490.21 kB
Copy Link
Dealing with next-generation malware.pdf
PDF
5 years ago
1.30 MB
Copy Link
Decentralized certificate authorities - 2017.pdf
PDF
5 years ago
729.76 kB
Copy Link
De-anonymizing alt.anonymous.messages - defcon - slides.pdf
PDF
5 years ago
6.20 MB
Copy Link
Decentralized public key infrastructure - a white paper from Rebooting the Web of Trust.pdf
PDF
5 years ago
658.36 kB
Copy Link
DNSNMC okTurtles - DNSNMC replaces Certificate Authorities with Namecoin and fixes HTTPS security.pdf
PDF
5 years ago
325.10 kB
Copy Link
Deriving Input Syntactic Structure From Execution.pdf
PDF
5 years ago
545.68 kB
Copy Link
DEF CON 25 voting village report.pdf
PDF
5 years ago
1.32 MB
Copy Link
Developing Applications With Objective Caml.pdf
PDF
5 years ago
2.74 MB
Copy Link
DART - Directed Automated Random Testing.pdf
PDF
5 years ago
158.16 kB
Copy Link
Dynamic Taint Analysis and Forward Symbolic Execution.pdf
PDF
5 years ago
283.30 kB
Copy Link
Cryptanalysis of the Random Number Generator of the Windows Operating System.pdf
PDF
5 years ago
288.66 kB
Copy Link
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software.pdf
PDF
5 years ago
196.45 kB
Copy Link
Creating Vulnerability Signatures Using Weakest Preconditions.pdf
PDF
5 years ago
223.79 kB
Copy Link
Dynamic Test Generation for Large Binary Programs.pdf
PDF
5 years ago
1.25 MB
Copy Link
Crawling BitTorrent DHTs for Fun and Profit.pdf
PDF
5 years ago
337.71 kB
Copy Link
Dytan - A Generic Dynamic Taint Analysis Framework.pdf
PDF
5 years ago
347.59 kB
Copy Link
Comparison Between Two Practical Mix Designs - 2004.pdf
PDF
5 years ago
4.31 MB
Copy Link
EXE - A System for Automatically Generating Inputs of Death Using Symbolic Execution.pdf
PDF
5 years ago
193.01 kB
Copy Link
Code-Reuse Attacks - New Frontiers and Defenses [bletsch].pdf
PDF
5 years ago
783.79 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.