×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Store-to-leak forwarding: Leaking data on meltdown-resistant CPUs - 2019.pdf
Home
/
Discover
/
diyhpl.us
/
~bryan
/
papers2
/
security
/
Parent Folder
Store-to-leak forwarding: Leaking data on meltdown-resistant CPUs - 2019.pdf
PDF
5 years ago
728.07 kB
Copy Link
Stealthy dopant-level hardware trojans.pdf
PDF
5 years ago
432.53 kB
Copy Link
String Oriented Programming.pdf
PDF
5 years ago
210.38 kB
Copy Link
SplitScreen - Enabling Efficient, Distributed Malware Detection.pdf
PDF
5 years ago
520.59 kB
Copy Link
SybilGuard: Defending against sybil attacks via social networks.pdf
PDF
5 years ago
454.24 kB
Copy Link
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection.pdf
PDF
5 years ago
882.32 kB
Copy Link
Symbolic Execution Algorithms for Test Generation.pdf
PDF
5 years ago
759.91 kB
Copy Link
Smashing the Gadgets - Hindering Return-Oriented Programming Using In-Place Code Randomization.pdf
PDF
5 years ago
849.79 kB
Copy Link
Symbolic Execution for Software Testing in Practice - Preliminary Assessment.pdf
PDF
5 years ago
165.34 kB
Copy Link
SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.pdf
PDF
5 years ago
463.41 kB
Copy Link
Synthesis of masking countermeasures against side channel attacks.pdf
PDF
5 years ago
174.58 kB
Copy Link
Securing Untrusted Code via Compiler-Agnostic Binary Rewriting.pdf
PDF
5 years ago
378.14 kB
Copy Link
TIE - Principled Reverse Engineering of Types in Binary Programs.pdf
PDF
5 years ago
1.46 MB
Copy Link
Secure communications over insecure channels - Merkle - 1978.pdf
PDF
5 years ago
562.50 kB
Copy Link
TPM-fail: TPM meets timing and lattice attacks - 2019.pdf
PDF
5 years ago
2.99 MB
Copy Link
Robust and efficient elimination of cache and timing side channels - Dan Boneh - 2015.pdf
PDF
5 years ago
528.61 kB
Copy Link
The CLASP Application Security Process.pdf
PDF
5 years ago
1.40 MB
Copy Link
Riposte: An anonymous messaging system handling millions of users.pdf
PDF
5 years ago
599.89 kB
Copy Link
The Pynchon Gate: A secure method of pseudonymous mail retrieval - Len Sassaman - Bram Cohen - Nick Mathewson.pdf
PDF
5 years ago
253.25 kB
Copy Link
Riffle: an efficient communication system with strong anonymity.pdf
PDF
5 years ago
4.38 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.