dlat: security*

53 bookmark(s) - Sort by: Date ↓ / Title / - Bookmarks from other users for this tag

  1. NSA Security Guides.
    Tags: , , , , by Andreas Turtschan (2009-11-19)
  2. SHA-1 collisions now 2^52. Cameron McDonald, Philip Hawkes and Josef Pieprzyk. "Practical collisions are within resources of a well funded organisation."
    Tags: , , by Andreas Turtschan (2009-04-30)
  3. Tags: , , , , , , by Andreas Turtschan (2012-04-25)
  4. Bypassing Browser Memory Protections. Setting back browser security by 10 years. Alexander Sotirov, Mark Dowd.
    Tags: , by Andreas Turtschan (2008-08-10)
  5. HITBSecConf2008 Presentation Announcement: Remote Code Execution Through Intel CPU Bugs. Kris Kaspersky.
  6. session papers of the first usenix workshop on large-scale exploits and emergent threats.
  7. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. David Brumley, Pongsin Poosankam, Dawn Song, and Jiang Zheng.
    Tags: , , , by Andreas Turtschan and 1 other (2008-04-24)
  8. Fingerprinting Passports. Henning Richter, Wojciech Mostowski, and Erik Poll.
    Tags: , , , by Andreas Turtschan (2008-04-21)
  9. On the security of SHA-1. Prof. Vincent Rijmen.
  10. 0-Day Patch Exposing Vendors (In)security Performance. Stefan Frei, Bernhard Tellenbach, and Bernhard Plattner.
    Tags: , by Andreas Turtschan (2008-03-28)

Top of the page

First / Previous / Next / Last / Page 2 of 6 Bookmarks: Tags: security

About - Propulsed by SemanticScuttle