Tags: security* + paper*

17 bookmark(s) - Sort by: Date ↑ / Title /

  1. using cpu system management mode to circumvent operating system security functions. loïc duflot, daniel etiemble, olivier grumelard.
  2. Reprinted from: CACM 27/8, pp. 761-763 » .
  3. "breaking 104 bit wep in less than 60 seconds", erik tews, ralf-philipp weinmann and andrei pyshkin.
    Tags: , , , , by Andreas Turtschan and 1 other (2007-04-09)
  4. "the unbearable lightness of pin cracking", omer berkman and odelia moshe ostrovsky.
    Tags: , , , by Andreas Turtschan and 1 other (2007-04-06)
  5. There's a new staff and a new release of the legendary phrack e-zine. (how could I miss this?)
  6. robert n. m. watson.
    Tags: , , , by Andreas Turtschan (2007-08-11)
  7. Dorrendorf, Gutterman and Pinkas have reverse engineered the random number generator code from Windows. According to their paper, it is easy (O(1)) to compute a previous random number and possible (O(2^23) to predict the next one. (via The Inquirer)
  8. Thirty Years Later: Lessons from the Multics Security Evaluation. Paul A. Karger, Roger R. Schell.
    Tags: , , by Andreas Turtschan (2007-11-16)
  9. Analysis of the Linux Random Number Generator. Zvi Gutterman, Benny Pinkas, Tzachy Reinman.
    Tags: , , , , by Andreas Turtschan (2007-11-16)

Top of the page

First / Previous / Next / Last / Page 1 of 2 Bookmarks: tagged with "security+paper"

About - Propulsed by SemanticScuttle