×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.pdf
Home
/
Discover
/
diyhpl.us
/
~bryan
/
papers2
/
security
/
Parent Folder
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.pdf
PDF
5 years ago
292.62 kB
Copy Link
The_Mystery_of_Duqu_2_0_a_sophisticated_cyberespionage_actor_returns.pdf
PDF
5 years ago
5.39 MB
Copy Link
Time-lock puzzles and timed-release crypto - Rivest - 1996.pdf
PDF
5 years ago
112.19 kB
Copy Link
The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.pdf
PDF
5 years ago
548.19 kB
Copy Link
Towards Provably Secure Software Attestation.pdf
PDF
5 years ago
672.69 kB
Copy Link
The Pynchon Gate: A secure method of pseudonymous mail retrieval - Len Sassaman - Bram Cohen - Nick Mathewson.pdf
PDF
5 years ago
253.25 kB
Copy Link
Towards measuring anonymity - 2002.ps.gz
GZ
5 years ago
76.86 kB
Copy Link
The CLASP Application Security Process.pdf
PDF
5 years ago
1.40 MB
Copy Link
Towards reliable storage of 56-bit secrets in human memory (using spaced repetition).pdf
PDF
5 years ago
417.39 kB
Copy Link
TPM-fail: TPM meets timing and lattice attacks - 2019.pdf
PDF
5 years ago
2.99 MB
Copy Link
Traffic analysis and trade-offs in anonymity providing systems.pdf
PDF
5 years ago
54.12 kB
Copy Link
TIE - Principled Reverse Engineering of Types in Binary Programs.pdf
PDF
5 years ago
1.46 MB
Copy Link
Trawling for Tor Hidden Services - Detection, Measurement, Deanonymization.pdf
PDF
5 years ago
469.54 kB
Copy Link
Synthesis of masking countermeasures against side channel attacks.pdf
PDF
5 years ago
174.58 kB
Copy Link
Twice the bits, twice the trouble: Vulnerabilities introduced by migrating to 64-bit platforms - 2016.pdf
PDF
5 years ago
371.51 kB
Copy Link
Symbolic Execution for Software Testing in Practice - Preliminary Assessment.pdf
PDF
5 years ago
165.34 kB
Copy Link
USBee: Air-gap covert-channel via electromagnetic emission from USB - 2016.pdf
PDF
5 years ago
1,016.69 kB
Copy Link
Symbolic Execution Algorithms for Test Generation.pdf
PDF
5 years ago
759.91 kB
Copy Link
Undangle - Early Detection of Dangling Pointers in Use-After-Free.pdf
PDF
5 years ago
522.31 kB
Copy Link
SybilGuard: Defending against sybil attacks via social networks.pdf
PDF
5 years ago
454.24 kB
Copy Link
Join FilePursuit on
chat for discussions and more information.