Tags: exploit*

5 bookmark(s) - Sort by: Date ↓ / Title /

  1. security weaknesses that the joint Sickos/CTHN team and others found on the r0ket
  2. patroklos argyroudis.
  3. lol
    Tags: , , , , , by Benjamin Schweizer (2009-09-08)
  4. session papers of the first usenix workshop on large-scale exploits and emergent threats.
  5. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. David Brumley, Pongsin Poosankam, Dawn Song, and Jiang Zheng.
    Tags: , , , by Andreas Turtschan and 1 other (2008-04-24)

Top of the page

First / Previous / Next / Last / Page 1 of 1 Bookmarks: tagged with "exploit"

About - Propulsed by SemanticScuttle