×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
Undangle - Early Detection of Dangling Pointers in Use-After-Free.pdf
Home
/
Discover
/
diyhpl.us
/
~bryan
/
papers2
/
security
/
Parent Folder
Undangle - Early Detection of Dangling Pointers in Use-After-Free.pdf
PDF
5 years ago
522.31 kB
Copy Link
USBee: Air-gap covert-channel via electromagnetic emission from USB - 2016.pdf
PDF
5 years ago
1,016.69 kB
Copy Link
Untagging tor: A formal treatment of onion encryption - 2018.pdf
PDF
5 years ago
516.20 kB
Copy Link
Twice the bits, twice the trouble: Vulnerabilities introduced by migrating to 64-bit platforms - 2016.pdf
PDF
5 years ago
371.51 kB
Copy Link
Users Get Routed - Traffic Correlation on Tor by Realistic Adversaries.pdf
PDF
5 years ago
1.79 MB
Copy Link
Trawling for Tor Hidden Services - Detection, Measurement, Deanonymization.pdf
PDF
5 years ago
469.54 kB
Copy Link
Using sphinx to improve onion routing circuit construction - 2009.pdf
PDF
5 years ago
186.45 kB
Copy Link
Traffic analysis and trade-offs in anonymity providing systems.pdf
PDF
5 years ago
54.12 kB
Copy Link
Verifiable ASICs using SNARKs - Walfish - 2016.pdf
PDF
5 years ago
435.58 kB
Copy Link
Towards reliable storage of 56-bit secrets in human memory (using spaced repetition).pdf
PDF
5 years ago
417.39 kB
Copy Link
Whanau: A sybil-proof distributed hash table.pdf
PDF
5 years ago
874.83 kB
Copy Link
Towards measuring anonymity - 2002.ps.gz
GZ
5 years ago
76.86 kB
Copy Link
You can type, but you can't hide: a stealthy GPU-based keylogger.pdf
PDF
5 years ago
344.88 kB
Copy Link
Towards Provably Secure Software Attestation.pdf
PDF
5 years ago
672.69 kB
Copy Link
ZIP attacks with reduced known plaintext.pdf
PDF
5 years ago
314.98 kB
Copy Link
Time-lock puzzles and timed-release crypto - Rivest - 1996.pdf
PDF
5 years ago
112.19 kB
Copy Link
aws-security-whitepaper.pdf
PDF
5 years ago
1.15 MB
Copy Link
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.pdf
PDF
5 years ago
292.62 kB
Copy Link
caribnog-dnssec-design-module1-12jun12-en.pdf
PDF
5 years ago
1.94 MB
Copy Link
The_Mystery_of_Duqu_2_0_a_sophisticated_cyberespionage_actor_returns.pdf
PDF
5 years ago
5.39 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.