×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
TIE - Principled Reverse Engineering of Types in Binary Programs.pdf
Home
/
Discover
/
diyhpl.us
/
~bryan
/
papers2
/
security
/
Parent Folder
TIE - Principled Reverse Engineering of Types in Binary Programs.pdf
PDF
5 years ago
1.46 MB
Copy Link
Synthesis of masking countermeasures against side channel attacks.pdf
PDF
5 years ago
174.58 kB
Copy Link
TPM-fail: TPM meets timing and lattice attacks - 2019.pdf
PDF
5 years ago
2.99 MB
Copy Link
Symbolic Execution for Software Testing in Practice - Preliminary Assessment.pdf
PDF
5 years ago
165.34 kB
Copy Link
The CLASP Application Security Process.pdf
PDF
5 years ago
1.40 MB
Copy Link
Symbolic Execution Algorithms for Test Generation.pdf
PDF
5 years ago
759.91 kB
Copy Link
The Pynchon Gate: A secure method of pseudonymous mail retrieval - Len Sassaman - Bram Cohen - Nick Mathewson.pdf
PDF
5 years ago
253.25 kB
Copy Link
SybilGuard: Defending against sybil attacks via social networks.pdf
PDF
5 years ago
454.24 kB
Copy Link
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.pdf
PDF
5 years ago
548.19 kB
Copy Link
String Oriented Programming.pdf
PDF
5 years ago
210.38 kB
Copy Link
The_Mystery_of_Duqu_2_0_a_sophisticated_cyberespionage_actor_returns.pdf
PDF
5 years ago
5.39 MB
Copy Link
Store-to-leak forwarding: Leaking data on meltdown-resistant CPUs - 2019.pdf
PDF
5 years ago
728.07 kB
Copy Link
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.pdf
PDF
5 years ago
292.62 kB
Copy Link
Stealthy dopant-level hardware trojans.pdf
PDF
5 years ago
432.53 kB
Copy Link
Time-lock puzzles and timed-release crypto - Rivest - 1996.pdf
PDF
5 years ago
112.19 kB
Copy Link
SplitScreen - Enabling Efficient, Distributed Malware Detection.pdf
PDF
5 years ago
520.59 kB
Copy Link
Towards Provably Secure Software Attestation.pdf
PDF
5 years ago
672.69 kB
Copy Link
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection.pdf
PDF
5 years ago
882.32 kB
Copy Link
Towards measuring anonymity - 2002.ps.gz
GZ
5 years ago
76.86 kB
Copy Link
Smashing the Gadgets - Hindering Return-Oriented Programming Using In-Place Code Randomization.pdf
PDF
5 years ago
849.79 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.