×
All
Videos 🎬
Audios 🎵
eBooks 📚
Mobile Apps 📱
Archives (ZIP/ISO) 💿
FILE
PURSUIT
Home
About
Contact
Discover
+
Submit
Lights ON
us-14-Tarakanov-Data-Only-Pwning-Microsoft-Windows-Kernel-Exploitation-Of-Kernel-Pool-Overflows-On-Microsoft-Windows-8.1.pdf
Home
/
Discover
/
paper.bobylive.com
/
Meeting_Papers
/
BlackHat
/
USA-2014
/
Parent Folder
us-14-Tarakanov-Data-Only-Pwning-Microsoft-Windows-Kernel-Exploitation-Of-Kernel-Pool-Overflows-On-Microsoft-Windows-8.1.pdf
PDF
4 years ago
636.39 kB
Copy Link
us-14-Stamos-Building-Safe-Systems-At-Scale-Lessons-From-Six-Months-At Yahoo.pdf
PDF
4 years ago
3.56 MB
Copy Link
us-14-Thomas-Reverse-Engineering-The-Supra-iBox-Exploitation-Of-A-Hardened MSP430-Based-DeviceSupra.pdf
PDF
4 years ago
1.30 MB
Copy Link
us-14-Torrey-MoRE-Shadow-Walker-The-Progression-Of-TLB-Splitting-On-x86-WP.pdf
PDF
4 years ago
625.29 kB
Copy Link
us-14-Spring-Abuse-Of-CPE-Devices-And-Recommended-Fixes.pdf
PDF
4 years ago
404.56 kB
Copy Link
us-14-Torrey-MoRE-Shadow-Walker-The-Progression-Of-TLB-Splitting-On-x86.pdf
PDF
4 years ago
3.95 MB
Copy Link
us-14-Spring-Abuse-Of-CPE-Devices-And-Recommended-Fixes-WP.pdf
PDF
4 years ago
813.13 kB
Copy Link
us-14-Valtman-A-Journey-To-Protect-Point-Of-Sale.pdf
PDF
4 years ago
4.72 MB
Copy Link
us-14-Sood-What-Goes-Around-Comes-Back-Around-Exploiting-Fundamental-Weaknesses-In-Botnet-C&C-Panels.pdf
PDF
4 years ago
1.77 MB
Copy Link
us-14-Wang-RAVAGE-Runtime-Analysis-Of-Vulnerabilities-And-Generation-Of-Exploits.pdf
PDF
4 years ago
11.53 MB
Copy Link
us-14-Sood-What-Goes-Around-Comes-Back-Around-Exploiting-Fundamental-Weaknesses-In-Botnet-C&C-Panels-WP.pdf
PDF
4 years ago
1.70 MB
Copy Link
us-14-Wei-Sidewinder-Targeted-Attack-Against-Android-In-The-Golden-Age-Of-Ad-Libs.pdf
PDF
4 years ago
504.67 kB
Copy Link
us-14-Solnik-Cellular-Exploitation-On-A-Global-Scale-The-Rise-And-Fall-Of-The-Control-Protocol.pdf
PDF
4 years ago
1.41 MB
Copy Link
us-14-Seeber-Hacking-The-Wireless-World-With-Software-Defined-Radio-2.0.pdf
PDF
4 years ago
68.75 MB
Copy Link
us-14-Weis-Protecting-Data-In-Use-From-Firmware-And-Physical-Attacks-WP.pdf
PDF
4 years ago
116.21 kB
Copy Link
us-14-Schloesser-Internet-Scanning-Current-State-And-Lessons-Learned.pdf
PDF
4 years ago
886.15 kB
Copy Link
us-14-Weis-Protecting-Data-In-Use-From-Firmware-And-Physical-Attacks.pdf
PDF
4 years ago
10.41 MB
Copy Link
us-14-Williams-I-Know-Your-Filtering-Policy-Better-Than-You-Do-wp1.pdf
PDF
4 years ago
1.67 MB
Copy Link
us-14-Saxe.pdf
PDF
4 years ago
3.92 MB
Copy Link
us-14-Williams-I-Know-Your-Filtering-Policy-Better-Than-You-Do-wp2.pdf
PDF
4 years ago
1.23 MB
Copy Link
Join FilePursuit on
chat for discussions and more information.