×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
LZfuzz - a fast compression-based fuzzer for poorly documentd protocols.pdf
Home
/
Discover
/
diyhpl.us
/
~bryan
/
papers2
/
security
/
Parent Folder
LZfuzz - a fast compression-based fuzzer for poorly documentd protocols.pdf
PDF
5 years ago
395.33 kB
Copy Link
LIRA: Lightweight Incentivized Routing for Anonymity.pdf
PDF
5 years ago
1.15 MB
Copy Link
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables.pdf
PDF
5 years ago
272.36 kB
Copy Link
Jump-oriented programming: a new class of code-reuse attack.pdf
PDF
5 years ago
333.45 kB
Copy Link
LibsafeXP.tar.gz
GZ
5 years ago
27.01 kB
Copy Link
Jump-Oriented Programming - A New Class of Code-Reuse Attack.pdf
PDF
5 years ago
333.45 kB
Copy Link
LibsafeXP: A Practical and Transparent Tool for Run-time Buffer Overflow Preventions.pdf
PDF
5 years ago
616.35 kB
Copy Link
Jakstab - a static analysis platform for binaries.pdf
PDF
5 years ago
46.71 kB
Copy Link
LoongChecker: Practical summary-based semi-simulation to detect vulnerability in binary code.pdf
PDF
5 years ago
262.22 kB
Copy Link
Introduction to OCaml.pdf
PDF
5 years ago
2.23 MB
Copy Link
Making sure crypto stays insecure - Daniel J. Bernstein - slides.pdf
PDF
5 years ago
409.40 kB
Copy Link
IntScope: Automatically Detecting Integer Overflow Vulnerability In X86 Binary Using Symbolic Execution.pdf
PDF
5 years ago
198.00 kB
Copy Link
Measuring and mitigating AS-level adversaries with Tor.pdf
PDF
5 years ago
2.45 MB
Copy Link
IntScope - Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.pdf
PDF
5 years ago
198.00 kB
Copy Link
Metsploit Unleashed.pdf
PDF
5 years ago
4.61 MB
Copy Link
IDA_Pro_Shortcuts.pdf
PDF
5 years ago
70.66 kB
Copy Link
Microgadgets: size does matter in turing-complete return-oriented programming.pdf
PDF
5 years ago
284.83 kB
Copy Link
IDA PLUG-IN WRITING IN C and C .pdf
PDF
5 years ago
507.34 kB
Copy Link
Minimizing disclosure of private information in credential-based interactions: A graph-based approach.pdf
PDF
5 years ago
624.61 kB
Copy Link
Hyperflow: A processor architecture for nonmalleable, timing-safe information flow security - 2018.pdf
PDF
5 years ago
764.28 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.