Tags: paper*

61 bookmark(s) - Sort by: Date ↓ / Title /

  1. Bypassing Browser Memory Protections. Setting back browser security by 10 years. Alexander Sotirov, Mark Dowd.
    Tags: , by Andreas Turtschan (2008-08-10)
  2. The experience of the Lawrence Berkeley Laboratory in tracking an intruder suggests that any operating system is insecure when obvious security rules are ignored. How a site should respond to an intrusion, whether it is possible to trace an intruder trying to evade detection, what can be learned from tracking an intruder, what methods the intruder used, and the responsiveness of the law-enforcement community are also discussed.
  3. pixar's research papers on graphics.
    Tags: , , , , by Andreas Turtschan (2008-05-27)
  4. about the class dispatcher, among others
  5. still valid, except that the dispatcher algorithm was replaced by C3 in Python 2.3
  6. session papers of the first usenix workshop on large-scale exploits and emergent threats.
  7. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. David Brumley, Pongsin Poosankam, Dawn Song, and Jiang Zheng.
    Tags: , , , by Andreas Turtschan and 1 other (2008-04-24)
  8. The Evolution of the Unix Time-sharing System. Dennis M. Ritchie.
    Tags: , , by Andreas Turtschan and 1 other (2008-04-22)
  9. DTrace: The Reverse Engineer’s Unexpected Swiss Army Knife. Tiller Beauchamp, David Weston.

Top of the page

First / Previous / Next / Last / Page 2 of 7 Bookmarks: tagged with "paper"

About - Propulsed by SemanticScuttle