×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Secure communications over insecure channels - Merkle - 1978.pdf
Home
/
Discover
/
diyhpl.us
/
~bryan
/
papers2
/
security
/
Parent Folder
Secure communications over insecure channels - Merkle - 1978.pdf
PDF
5 years ago
562.50 kB
Copy Link
Robust and efficient elimination of cache and timing side channels - Dan Boneh - 2015.pdf
PDF
5 years ago
528.61 kB
Copy Link
Securing Untrusted Code via Compiler-Agnostic Binary Rewriting.pdf
PDF
5 years ago
378.14 kB
Copy Link
Riposte: An anonymous messaging system handling millions of users.pdf
PDF
5 years ago
599.89 kB
Copy Link
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.pdf
PDF
5 years ago
463.41 kB
Copy Link
Riffle: an efficient communication system with strong anonymity.pdf
PDF
5 years ago
4.38 MB
Copy Link
Smashing the Gadgets - Hindering Return-Oriented Programming Using In-Place Code Randomization.pdf
PDF
5 years ago
849.79 kB
Copy Link
Reversing Stealthy Dopant-Level Circuits.pdf
PDF
5 years ago
6.49 MB
Copy Link
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection.pdf
PDF
5 years ago
882.32 kB
Copy Link
Reverse Engineering Intel DRAM Addressing and Exploitation.pdf
PDF
5 years ago
221.67 kB
Copy Link
SplitScreen - Enabling Efficient, Distributed Malware Detection.pdf
PDF
5 years ago
520.59 kB
Copy Link
Return-oriented programming without returns on ARM.pdf
PDF
5 years ago
426.60 kB
Copy Link
Stealthy dopant-level hardware trojans.pdf
PDF
5 years ago
432.53 kB
Copy Link
Return-Oriented Programming without Returns.pdf
PDF
5 years ago
569.29 kB
Copy Link
Store-to-leak forwarding: Leaking data on meltdown-resistant CPUs - 2019.pdf
PDF
5 years ago
728.07 kB
Copy Link
Retrofitting Security in COTS Software with Binary Rewriting.pdf
PDF
5 years ago
137.69 kB
Copy Link
String Oriented Programming.pdf
PDF
5 years ago
210.38 kB
Copy Link
Renovo - A Hidden Code Extractor for Packed Executables.pdf
PDF
5 years ago
124.06 kB
Copy Link
SybilGuard: Defending against sybil attacks via social networks.pdf
PDF
5 years ago
454.24 kB
Copy Link
Reconfigurable random bit storage using polymer-dispersed liquid crystal.pdf
PDF
5 years ago
1.19 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.