×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
NetSpectre: Read arbitrary memory over network - 2018.pdf
Home
/
Discover
/
diyhpl.us
/
~bryan
/
papers2
/
security
/
Parent Folder
NetSpectre: Read arbitrary memory over network - 2018.pdf
PDF
5 years ago
520.64 kB
Copy Link
Mining your P's and Q's: Detection of widespread weak keys in network devices.pdf
PDF
5 years ago
488.83 kB
Copy Link
Neuroscience meets cryptography: Designing crypto primitives secure against rubber hose attacks.pdf
PDF
5 years ago
518.69 kB
Copy Link
Minimizing disclosure of private information in credential-based interactions: A graph-based approach.pdf
PDF
5 years ago
624.61 kB
Copy Link
Nickel: a framework for design and verification of information flow control systems - 2018.pdf
PDF
5 years ago
623.03 kB
Copy Link
Microgadgets: size does matter in turing-complete return-oriented programming.pdf
PDF
5 years ago
284.83 kB
Copy Link
No place to hide: contactless probing of secret data on FPGAs - 2016.pdf
PDF
5 years ago
2.01 MB
Copy Link
Metsploit Unleashed.pdf
PDF
5 years ago
4.61 MB
Copy Link
OS-Sommelier: Memory-Only Operating System Fingerprinting in the Cloud.pdf
PDF
5 years ago
442.58 kB
Copy Link
Measuring and mitigating AS-level adversaries with Tor.pdf
PDF
5 years ago
2.45 MB
Copy Link
On the Applicability of Time-Driven Cache Attacks on Mobile Devices.pdf
PDF
5 years ago
753.68 kB
Copy Link
Making sure crypto stays insecure - Daniel J. Bernstein - slides.pdf
PDF
5 years ago
409.40 kB
Copy Link
On the Expressiveness of Return-into-libc Attacks.pdf
PDF
5 years ago
289.00 kB
Copy Link
LoongChecker: Practical summary-based semi-simulation to detect vulnerability in binary code.pdf
PDF
5 years ago
262.22 kB
Copy Link
Opportunities and limits of remote timing attacks - 2009.pdf
PDF
5 years ago
673.83 kB
Copy Link
LibsafeXP: A Practical and Transparent Tool for Run-time Buffer Overflow Preventions.pdf
PDF
5 years ago
616.35 kB
Copy Link
Packed, Printable, and Polymorphic Return-Oriented Programming.pdf
PDF
5 years ago
466.40 kB
Copy Link
LibsafeXP.tar.gz
GZ
5 years ago
27.01 kB
Copy Link
Paper keys under doormats - 2015.pdf
PDF
5 years ago
217.03 kB
Copy Link
Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables.pdf
PDF
5 years ago
272.36 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.