×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Paper keys under doormats - 2015.pdf
Home
/
Discover
/
diyhpl.us
/
~bryan
/
papers2
/
security
/
Parent Folder
Paper keys under doormats - 2015.pdf
PDF
5 years ago
217.03 kB
Copy Link
Packed, Printable, and Polymorphic Return-Oriented Programming.pdf
PDF
5 years ago
466.40 kB
Copy Link
Polyglot - Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis.pdf
PDF
5 years ago
184.49 kB
Copy Link
Opportunities and limits of remote timing attacks - 2009.pdf
PDF
5 years ago
673.83 kB
Copy Link
Power and timing side channels for PUFs and their efficient exploitation.pdf
PDF
5 years ago
341.72 kB
Copy Link
On the Expressiveness of Return-into-libc Attacks.pdf
PDF
5 years ago
289.00 kB
Copy Link
Practical DRAM physically unclonable functions in commodity devices - 2016.pdf
PDF
5 years ago
1.30 MB
Copy Link
On the Applicability of Time-Driven Cache Attacks on Mobile Devices.pdf
PDF
5 years ago
753.68 kB
Copy Link
Practical threshold signatures.pdf
PDF
5 years ago
210.37 kB
Copy Link
OS-Sommelier: Memory-Only Operating System Fingerprinting in the Cloud.pdf
PDF
5 years ago
442.58 kB
Copy Link
Precise static analysis of binaries by extracting relational information - REIL.pdf
PDF
5 years ago
203.89 kB
Copy Link
No place to hide: contactless probing of secret data on FPGAs - 2016.pdf
PDF
5 years ago
2.01 MB
Copy Link
Pricing anonymity - 2018.pdf
PDF
5 years ago
317.63 kB
Copy Link
Nickel: a framework for design and verification of information flow control systems - 2018.pdf
PDF
5 years ago
623.03 kB
Copy Link
Privacy-preserving genome-wide association study is practical - 2017.pdf
PDF
5 years ago
482.90 kB
Copy Link
Neuroscience meets cryptography: Designing crypto primitives secure against rubber hose attacks.pdf
PDF
5 years ago
518.69 kB
Copy Link
Privilege escalation attacks on android.pdf
PDF
5 years ago
259.78 kB
Copy Link
NetSpectre: Read arbitrary memory over network - 2018.pdf
PDF
5 years ago
520.64 kB
Copy Link
Profiling a Million User DHT.pdf
PDF
5 years ago
1.31 MB
Copy Link
Mining your P's and Q's: Detection of widespread weak keys in network devices.pdf
PDF
5 years ago
488.83 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.