dlat: security*

53 bookmark(s) - Sort by: Date / Title ↑ / - Bookmarks from other users for this tag

  1. "breaking 104 bit wep in less than 60 seconds", erik tews, ralf-philipp weinmann and andrei pyshkin.
    Tags: , , , , by Andreas Turtschan and 1 other (2007-04-09)
  2. SHA-1 collisions now 2^52. Cameron McDonald, Philip Hawkes and Josef Pieprzyk. "Practical collisions are within resources of a well funded organisation."
    Tags: , , by Andreas Turtschan (2009-04-30)
  3. Reprinted from: CACM 27/8, pp. 761-763 » .
  4. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. David Brumley, Pongsin Poosankam, Dawn Song, and Jiang Zheng.
    Tags: , , , by Andreas Turtschan and 1 other (2008-04-24)
  5. Applied Crypto Hardening
  6. Bypassing Browser Memory Protections. Setting back browser security by 10 years. Alexander Sotirov, Mark Dowd.
    Tags: , by Andreas Turtschan (2008-08-10)
  7. 0-Day Patch Exposing Vendors (In)security Performance. Stefan Frei, Bernhard Tellenbach, and Bernhard Plattner.
    Tags: , by Andreas Turtschan (2008-03-28)
  8. using cpu system management mode to circumvent operating system security functions. loïc duflot, daniel etiemble, olivier grumelard.
  9. Tags: , , , , , , by Andreas Turtschan (2012-04-25)

Top of the page

First / Previous / Next / Last / Page 1 of 6 Bookmarks: Tags: security

About - Propulsed by SemanticScuttle