×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Power and timing side channels for PUFs and their efficient exploitation.pdf
Home
/
Discover
/
diyhpl.us
/
~bryan
/
papers2
/
security
/
Parent Folder
Power and timing side channels for PUFs and their efficient exploitation.pdf
PDF
5 years ago
341.72 kB
Copy Link
Polyglot - Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis.pdf
PDF
5 years ago
184.49 kB
Copy Link
Practical DRAM physically unclonable functions in commodity devices - 2016.pdf
PDF
5 years ago
1.30 MB
Copy Link
Paper keys under doormats - 2015.pdf
PDF
5 years ago
217.03 kB
Copy Link
Practical threshold signatures.pdf
PDF
5 years ago
210.37 kB
Copy Link
Packed, Printable, and Polymorphic Return-Oriented Programming.pdf
PDF
5 years ago
466.40 kB
Copy Link
Precise static analysis of binaries by extracting relational information - REIL.pdf
PDF
5 years ago
203.89 kB
Copy Link
Opportunities and limits of remote timing attacks - 2009.pdf
PDF
5 years ago
673.83 kB
Copy Link
Pricing anonymity - 2018.pdf
PDF
5 years ago
317.63 kB
Copy Link
On the Expressiveness of Return-into-libc Attacks.pdf
PDF
5 years ago
289.00 kB
Copy Link
Privacy-preserving genome-wide association study is practical - 2017.pdf
PDF
5 years ago
482.90 kB
Copy Link
On the Applicability of Time-Driven Cache Attacks on Mobile Devices.pdf
PDF
5 years ago
753.68 kB
Copy Link
Privilege escalation attacks on android.pdf
PDF
5 years ago
259.78 kB
Copy Link
OS-Sommelier: Memory-Only Operating System Fingerprinting in the Cloud.pdf
PDF
5 years ago
442.58 kB
Copy Link
Profiling a Million User DHT.pdf
PDF
5 years ago
1.31 MB
Copy Link
No place to hide: contactless probing of secret data on FPGAs - 2016.pdf
PDF
5 years ago
2.01 MB
Copy Link
Program synthesis in reverse engineering - Rolf Rolles.pdf
PDF
5 years ago
826.31 kB
Copy Link
Nickel: a framework for design and verification of information flow control systems - 2018.pdf
PDF
5 years ago
623.03 kB
Copy Link
Proof-of-censorship: Enabling centralized censorship-resistant content providers - 2018.pdf
PDF
5 years ago
318.21 kB
Copy Link
Neuroscience meets cryptography: Designing crypto primitives secure against rubber hose attacks.pdf
PDF
5 years ago
518.69 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.