![[ICO]](/icons/blank.gif) | Name | Last modified | Size | Description |
|
![[PARENTDIR]](/icons/back.gif) | Parent Directory | | - | |
![[ ]](/icons/layout.gif) | 05-DNSSEC-root-sign.pdf | 2017-03-09 19:46 | 1.7M | |
![[ ]](/icons/layout.gif) | 1Password for Teams White Paper.pdf | 2017-04-24 11:04 | 472K | |
![[ ]](/icons/layout.gif) | A New Model of Program Dependences for Reverse Engineering.pdf | 2012-06-25 16:49 | 170K | |
![[ ]](/icons/layout.gif) | A Semantics-Based Approach to Malware Detection.pdf | 2012-07-06 14:45 | 344K | |
![[ ]](/icons/layout.gif) | A Smart Fuzzer for x86 Executables.pdf | 2012-01-21 05:11 | 273K | |
![[ ]](/icons/layout.gif) | A Survey of Program Slicing Techniques.pdf | 2012-01-21 20:12 | 377K | |
![[ ]](/icons/layout.gif) | A framework for automated architecture-independent gadget search.pdf | 2010-07-14 06:36 | 242K | |
![[ ]](/icons/layout.gif) | A game-theoretic analysis of cooperation in anonymity networks.pdf | 2012-01-07 18:39 | 1.1M | |
![[ ]](/icons/layout.gif) | A model for quantifying information leakage.pdf | 2013-10-20 14:49 | 290K | |
![[ ]](/icons/layout.gif) | Analysis and Defense of Vulnerabilities in Binary Code.pdf | 2012-06-28 18:53 | 856K | |
![[ ]](/icons/layout.gif) | Anti-DDoS: Threat detection with kafka and storm - 2015.pdf | 2015-04-19 14:01 | 4.9M | |
![[ ]](/icons/layout.gif) | Antikernel: A decentralized secure hardware-software operating system architecture - Andrew Zonenberg - 2016.pdf | 2016-06-01 12:44 | 269K | |
![[ ]](/icons/layout.gif) | A survey of remote automotive attack surfaces.pdf | 2014-08-12 11:57 | 5.6M | |
![[ ]](/icons/layout.gif) | AutoPaG: Towards Automated Software Patch Generation with Source Code Root Cause Identification and Repair.pdf | 2011-08-18 10:54 | 352K | |
![[ ]](/icons/layout.gif) | Automated Synthesis of Symbolic Instruction Encodings from IO Samples.pdf | 2012-07-07 15:17 | 229K | |
![[ ]](/icons/layout.gif) | Automated Whitebox Fuzz Testing.pdf | 2012-01-23 14:45 | 637K | |
![[ ]](/icons/layout.gif) | Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities.pdf | 2012-06-28 18:52 | 927K | |
![[ ]](/icons/layout.gif) | Automatic Partial Loop Summarization in Dynamic Test Generation.pdf | 2012-07-07 15:17 | 232K | |
![[ ]](/icons/layout.gif) | Automatic Patch-Based Exploit Generation is Possible - Techniques and Implications.pdf | 2012-07-08 19:57 | 215K | |
![[ ]](/icons/layout.gif) | Automatic Protocol Format Reverse Engineering Through Context-Aware Monitored Execution.pdf | 2011-08-18 10:54 | 642K | |
![[ ]](/icons/layout.gif) | Automatic Reverse Engineering of Data Structures from Binary Execution.pdf | 2011-08-18 10:57 | 367K | |
![[ ]](/icons/layout.gif) | BREACH - SSL, gone in 30 seconds.pdf | 2013-07-27 16:05 | 1.0M | |
![[ ]](/icons/layout.gif) | Baseband attacks: Remote exploitation of memory corruptions in cellular protocol stacks.pdf | 2014-10-16 20:01 | 411K | |
![[ ]](/icons/layout.gif) | Beware your hands reveal your secrets.pdf | 2015-10-29 14:25 | 1.4M | |
![[ ]](/icons/layout.gif) | Bin-Carver: Automatic Recovery of Binary Executable Files.pdf | 2012-08-06 21:15 | 1.0M | |
![[ ]](/icons/layout.gif) | Binary Rewriting without Relocation Information.pdf | 2012-06-25 21:43 | 189K | |
![[ ]](/icons/layout.gif) | Bitmessage - a peer-to-peer message authentication and delivery system.pdf | 2013-07-30 17:37 | 194K | |
![[ ]](/icons/layout.gif) | Bootkit Threats - In Depth Reverse Engineering and Defense.pdf | 2012-07-08 16:25 | 3.9M | |
![[ ]](/icons/layout.gif) | Breakthrough silicon scanning discovers backdoor in military chip.pdf | 2012-09-13 08:41 | 648K | |
![[ ]](/icons/layout.gif) | Can a program reverse-engineer itself?.pdf | 2011-09-12 23:56 | 306K | |
![[ ]](/icons/layout.gif) | Chaff bugs: Deterring attackers by making software buggier - 2018.pdf | 2018-08-02 17:22 | 1.3M | |
![[ ]](/icons/layout.gif) | Characterizing Kernel Malware Behavior with Kernel Data Access Patterns.pdf | 2011-04-04 10:50 | 272K | |
![[ ]](/icons/layout.gif) | Chip and PIN is broken.pdf | 2010-02-11 15:37 | 1.8M | |
![[ ]](/icons/layout.gif) | Chopping - A Generalization of Slicing.pdf | 2012-06-25 17:03 | 108K | |
![[ ]](/icons/layout.gif) | CloudFilter: practical control of sensitive data propagation to the cloud.pdf | 2013-03-10 10:40 | 213K | |
![[ ]](/icons/layout.gif) | Cloudopsy: an Autopsy of Data Flows in the Cloud.pdf | 2013-03-20 10:57 | 446K | |
![[ ]](/icons/layout.gif) | Code-Reuse Attacks - New Frontiers and Defenses [bletsch].pdf | 2012-06-25 20:24 | 784K | |
![[ ]](/icons/layout.gif) | Comparison Between Two Practical Mix Designs - 2004.pdf | 2013-05-25 23:45 | 4.3M | |
![[ ]](/icons/layout.gif) | Crawling BitTorrent DHTs for Fun and Profit.pdf | 2013-10-04 16:54 | 338K | |
![[ ]](/icons/layout.gif) | Creating Vulnerability Signatures Using Weakest Preconditions.pdf | 2011-12-15 12:44 | 224K | |
![[ ]](/icons/layout.gif) | Cryptanalysis of the Random Number Generator of the Windows Operating System.pdf | 2012-05-04 02:44 | 289K | |
![[ ]](/icons/layout.gif) | DART - Directed Automated Random Testing.pdf | 2012-01-21 00:37 | 158K | |
![[ ]](/icons/layout.gif) | DEF CON 25 voting village report.pdf | 2017-10-10 08:50 | 1.3M | |
![[ ]](/icons/layout.gif) | DNSNMC okTurtles - DNSNMC replaces Certificate Authorities with Namecoin and fixes HTTPS security.pdf | 2013-12-21 12:03 | 325K | |
![[ ]](/icons/layout.gif) | De-anonymizing alt.anonymous.messages - defcon - slides.pdf | 2013-08-03 11:42 | 6.2M | |
![[ ]](/icons/layout.gif) | Dealing with next-generation malware.pdf | 2012-06-25 22:15 | 1.3M | |
![[ ]](/icons/layout.gif) | Debugging Tech Guide Dev.pdf | 2012-07-07 15:22 | 490K | |
![[ ]](/icons/layout.gif) | Decentralized certificate authorities - 2017.pdf | 2017-10-10 18:23 | 730K | |
![[ ]](/icons/layout.gif) | Decentralized public key infrastructure - a white paper from Rebooting the Web of Trust.pdf | 2016-08-02 09:28 | 658K | |
![[TXT]](/icons/text.gif) | Degree_of_anonymity.wikipedia.html | 2013-04-21 18:43 | 41K | |
![[ ]](/icons/layout.gif) | Deriving Input Syntactic Structure From Execution.pdf | 2012-07-07 15:18 | 546K | |
![[ ]](/icons/layout.gif) | Developing Applications With Objective Caml.pdf | 2012-06-25 02:14 | 2.7M | |
![[ ]](/icons/layout.gif) | Dynamic Taint Analysis and Forward Symbolic Execution.pdf | 2012-03-10 02:32 | 283K | |
![[ ]](/icons/layout.gif) | Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software.pdf | 2012-01-21 19:08 | 196K | |
![[ ]](/icons/layout.gif) | Dynamic Test Generation for Large Binary Programs.pdf | 2012-06-28 18:53 | 1.3M | |
![[ ]](/icons/layout.gif) | Dytan - A Generic Dynamic Taint Analysis Framework.pdf | 2012-01-24 18:59 | 348K | |
![[ ]](/icons/layout.gif) | EXE - A System for Automatically Generating Inputs of Death Using Symbolic Execution.pdf | 2012-01-21 20:00 | 193K | |
![[ ]](/icons/layout.gif) | Efficient LDPC code based secret sharing schemes and private data storage in cloud without encryption.pdf | 2013-03-01 13:17 | 330K | |
![[ ]](/icons/layout.gif) | EigenSpeed: Secure peer-to-peer bandwidth evaluation.pdf | 2009-03-25 10:10 | 421K | |
![[ ]](/icons/layout.gif) | Enabling Sophisticated Analyses of x86 Binaries with RevGen.pdf | 2012-07-06 02:59 | 112K | |
![[ ]](/icons/layout.gif) | Entropy Loss and Output Predictability in the Libgcrypt PRNG - CVE-2016-6313 - 2016.pdf | 2016-08-18 03:04 | 157K | |
![[ ]](/icons/layout.gif) | Experiences with Model Inference Assisted Fuzzing.pdf | 2012-01-17 16:09 | 141K | |
![[ ]](/icons/layout.gif) | ExperimenTor: A testbed for safe and realistic Tor experimentation.pdf | 2011-07-08 10:42 | 478K | |
![[ ]](/icons/layout.gif) | Exploiting bittorrent vulnerabilities to launch reflective DDoS attacks.pdf | 2015-08-18 14:48 | 119K | |
![[ ]](/icons/layout.gif) | Factoring RSA keys from certified smart cards - Coppersmith in the wild.pdf | 2013-09-15 23:15 | 360K | |
![[ ]](/icons/layout.gif) | Fingerprinting Tor's hidden service log files using a timing channel.pdf | 2013-12-15 17:33 | 362K | |
![[ ]](/icons/layout.gif) | Flayer - Exposing Application Internals.pdf | 2012-01-21 00:27 | 81K | |
![[ ]](/icons/layout.gif) | Flipping bits in memory without accessing them: an experimental study of DRAM disturbance errors.pdf | 2014-06-24 14:54 | 828K | |
![[ ]](/icons/layout.gif) | Following the White Rabbit - Software attacks against Intel VT-d technology.pdf | 2011-05-31 12:44 | 688K | |
![[ ]](/icons/layout.gif) | Formalizing the LLVM intermediate representation for verified program transformations (with Coq) - 2012.pdf | 2012-01-05 08:49 | 415K | |
![[ ]](/icons/layout.gif) | Framework for instruction-level tracing and analysis of program executions.pdf | 2007-06-26 08:33 | 223K | |
![[ ]](/icons/layout.gif) | Framing signals - a return to portable shellcode.pdf | 2014-03-24 07:31 | 302K | |
![[ ]](/icons/layout.gif) | Full-Disclosure.pdf | 2013-12-09 07:03 | 2.5M | |
![[ ]](/icons/layout.gif) | G-Free: defeating return-oriented programming through gadget-less binaries.pdf | 2010-09-29 12:43 | 263K | |
![[ ]](/icons/layout.gif) | Generating Test Data with Enhanced Context Free Grammars.pdf | 2012-07-08 17:46 | 213K | |
![[ ]](/icons/layout.gif) | Grammar-Based Specification and Parsing of Binary File Formats.pdf | 2012-07-08 17:46 | 236K | |
![[ ]](/icons/layout.gif) | Grammar-based Whitebox Fuzzing.pdf | 2012-03-10 19:08 | 171K | |
![[ ]](/icons/layout.gif) | HORNET: High-speed onion routing at the network layer.pdf | 2015-07-21 18:13 | 466K | |
![[ ]](/icons/layout.gif) | Hacking the Xbox - bunnie.pdf | 2013-03-06 21:16 | 18M | |
![[ ]](/icons/layout.gif) | Helios: Web-based open-audit voting.pdf | 2008-07-14 15:15 | 1.2M | |
![[ ]](/icons/layout.gif) | IDA PLUG-IN WRITING IN C and C++.pdf | 2011-10-05 18:26 | 507K | |
![[ ]](/icons/layout.gif) | IDA_Pro_Shortcuts.pdf | 2009-06-16 13:20 | 71K | |
![[ ]](/icons/layout.gif) | IntScope - Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.pdf | 2011-12-15 12:41 | 198K | |
![[ ]](/icons/layout.gif) | IntScope: Automatically Detecting Integer Overflow Vulnerability In X86 Binary Using Symbolic Execution.pdf | 2011-08-18 10:56 | 198K | |
![[ ]](/icons/layout.gif) | Introduction to OCaml.pdf | 2012-06-25 03:29 | 2.2M | |
![[ ]](/icons/layout.gif) | Jakstab - a static analysis platform for binaries.pdf | 2010-10-27 07:00 | 47K | |
![[ ]](/icons/layout.gif) | Jump-Oriented Programming - A New Class of Code-Reuse Attack.pdf | 2012-06-25 20:13 | 333K | |
![[ ]](/icons/layout.gif) | Jump-oriented programming: a new class of code-reuse attack.pdf | 2012-03-21 08:19 | 333K | |
![[ ]](/icons/layout.gif) | LIRA: Lightweight Incentivized Routing for Anonymity.pdf | 2014-03-21 15:26 | 1.1M | |
![[ ]](/icons/layout.gif) | LZfuzz - a fast compression-based fuzzer for poorly documentd protocols.pdf | 2012-07-02 02:13 | 395K | |
![[ ]](/icons/layout.gif) | Launching Return-Oriented Programming Attacks against Randomized Relocatable Executables.pdf | 2012-12-04 00:13 | 272K | |
![[ ]](/icons/compressed.gif) | LibsafeXP.tar.gz | 2011-08-18 10:58 | 27K | |
![[ ]](/icons/layout.gif) | LibsafeXP: A Practical and Transparent Tool for Run-time Buffer Overflow Preventions.pdf | 2011-08-18 10:55 | 616K | |
![[ ]](/icons/layout.gif) | LoongChecker: Practical summary-based semi-simulation to detect vulnerability in binary code.pdf | 2011-11-23 04:07 | 262K | |
![[ ]](/icons/layout.gif) | Making sure crypto stays insecure - Daniel J. Bernstein - slides.pdf | 2014-10-18 07:03 | 409K | |
![[ ]](/icons/layout.gif) | Measuring and mitigating AS-level adversaries with Tor.pdf | 2015-05-21 17:12 | 2.5M | |
![[ ]](/icons/layout.gif) | Metsploit Unleashed.pdf | 2011-06-09 13:22 | 4.6M | |
![[ ]](/icons/layout.gif) | Microgadgets: size does matter in turing-complete return-oriented programming.pdf | 2013-03-30 13:25 | 285K | |
![[ ]](/icons/layout.gif) | Minimizing disclosure of private information in credential-based interactions: A graph-based approach.pdf | 2013-02-27 05:44 | 625K | |
![[ ]](/icons/layout.gif) | Mining your P's and Q's: Detection of widespread weak keys in network devices.pdf | 2012-07-11 12:38 | 489K | |
![[ ]](/icons/layout.gif) | Neuroscience meets cryptography: Designing crypto primitives secure against rubber hose attacks.pdf | 2012-06-19 08:56 | 519K | |
![[ ]](/icons/layout.gif) | No place to hide: contactless probing of secret data on FPGAs - 2016.pdf | 2016-06-06 03:07 | 2.0M | |
![[ ]](/icons/layout.gif) | OS-Sommelier: Memory-Only Operating System Fingerprinting in the Cloud.pdf | 2012-10-07 14:39 | 443K | |
![[ ]](/icons/layout.gif) | On the Applicability of Time-Driven Cache Attacks on Mobile Devices.pdf | 2013-03-26 07:37 | 754K | |
![[ ]](/icons/layout.gif) | On the Expressiveness of Return-into-libc Attacks.pdf | 2011-06-21 20:44 | 289K | |
![[ ]](/icons/layout.gif) | Opportunities and limits of remote timing attacks - 2009.pdf | 2009-06-18 09:23 | 674K | |
![[ ]](/icons/layout.gif) | Packed, Printable, and Polymorphic Return-Oriented Programming.pdf | 2012-06-25 21:58 | 466K | |
![[ ]](/icons/layout.gif) | Polyglot - Automatic Extraction of Protocol Message Format using Dynamic Binary Analysis.pdf | 2012-03-10 13:10 | 184K | |
![[ ]](/icons/layout.gif) | Power and timing side channels for PUFs and their efficient exploitation.pdf | 2013-12-20 03:36 | 342K | |
![[ ]](/icons/layout.gif) | Practical DRAM physically unclonable functions in commodity devices - 2016.pdf | 2016-03-11 07:25 | 1.3M | |
![[ ]](/icons/layout.gif) | Practical threshold signatures.pdf | 2001-03-06 07:33 | 210K | |
![[ ]](/icons/layout.gif) | Precise static analysis of binaries by extracting relational information - REIL.pdf | 2011-10-07 05:45 | 204K | |
![[ ]](/icons/layout.gif) | Pricing anonymity - 2018.pdf | 2017-12-23 01:20 | 318K | |
![[ ]](/icons/layout.gif) | Privacy-preserving genome-wide association study is practical - 2017.pdf | 2017-11-20 02:01 | 483K | |
![[ ]](/icons/layout.gif) | Privilege escalation attacks on android.pdf | 2010-12-16 12:25 | 260K | |
![[ ]](/icons/layout.gif) | Profiling a Million User DHT.pdf | 2013-12-22 11:39 | 1.3M | |
![[ ]](/icons/layout.gif) | Program synthesis in reverse engineering - Rolf Rolles.pdf | 2014-11-19 00:30 | 826K | |
![[ ]](/icons/layout.gif) | Proof-of-censorship: Enabling centralized censorship-resistant content providers - 2018.pdf | 2017-12-23 01:19 | 318K | |
![[ ]](/icons/layout.gif) | Prospex - Protocol Specification Extraction.pdf | 2011-12-15 12:45 | 247K | |
![[ ]](/icons/layout.gif) | Python arsenal for RE.pdf | 2012-03-19 20:49 | 1.1M | |
![[ ]](/icons/layout.gif) | Q - Exploit Hardening Made Easy.pdf | 2012-07-08 19:58 | 686K | |
![[ ]](/icons/layout.gif) | REIL - A platform-independent intermediate representation of disassembled code for static code analysis.pdf | 2012-01-24 18:38 | 102K | |
![[ ]](/icons/layout.gif) | ROPdefender: A detection tool to defend against return-oriented programming attacks.pdf | 2011-06-13 05:46 | 387K | |
![[ ]](/icons/layout.gif) | RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis.pdf | 2013-12-18 04:17 | 7.7M | |
![[ ]](/icons/layout.gif) | RWset - Attacking Path Explosion in Constraint-Based Test Generation.pdf | 2012-01-21 18:23 | 237K | |
![[ ]](/icons/layout.gif) | Real-World Sybil Attacks in BitTorrent Mainline DHT.pdf | 2012-07-27 02:58 | 393K | |
![[ ]](/icons/layout.gif) | Reconfigurable random bit storage using polymer-dispersed liquid crystal.pdf | 2014-03-11 17:54 | 1.2M | |
![[ ]](/icons/layout.gif) | Renovo - A Hidden Code Extractor for Packed Executables.pdf | 2012-07-06 14:44 | 124K | |
![[ ]](/icons/layout.gif) | Retrofitting Security in COTS Software with Binary Rewriting.pdf | 2012-06-25 21:43 | 138K | |
![[ ]](/icons/layout.gif) | Return-Oriented Programming without Returns.pdf | 2012-06-25 20:15 | 569K | |
![[ ]](/icons/layout.gif) | Return-oriented programming without returns on ARM.pdf | 2010-12-13 01:50 | 427K | |
![[ ]](/icons/layout.gif) | Reverse Engineering Intel DRAM Addressing and Exploitation.pdf | 2015-11-30 17:17 | 222K | |
![[ ]](/icons/layout.gif) | Reversing Stealthy Dopant-Level Circuits.pdf | 2014-09-28 18:02 | 6.5M | |
![[ ]](/icons/layout.gif) | Riffle: an efficient communication system with strong anonymity.pdf | 2015-11-09 23:20 | 4.4M | |
![[ ]](/icons/layout.gif) | Riposte: An anonymous messaging system handling millions of users.pdf | 2015-06-30 01:11 | 600K | |
![[ ]](/icons/layout.gif) | Robust and efficient elimination of cache and timing side channels - Dan Boneh - 2015.pdf | 2015-08-31 20:55 | 529K | |
![[ ]](/icons/layout.gif) | Securing Untrusted Code via Compiler-Agnostic Binary Rewriting.pdf | 2012-09-27 23:53 | 378K | |
![[ ]](/icons/layout.gif) | SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.pdf | 2011-08-18 10:58 | 463K | |
![[ ]](/icons/layout.gif) | Smashing the Gadgets - Hindering Return-Oriented Programming Using In-Place Code Randomization.pdf | 2012-06-29 02:15 | 850K | |
![[ ]](/icons/layout.gif) | Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection.pdf | 2012-05-21 22:36 | 882K | |
![[ ]](/icons/layout.gif) | SplitScreen - Enabling Efficient, Distributed Malware Detection.pdf | 2012-07-08 19:56 | 521K | |
![[ ]](/icons/layout.gif) | Stealthy dopant-level hardware trojans.pdf | 2014-09-28 18:00 | 433K | |
![[ ]](/icons/layout.gif) | String Oriented Programming.pdf | 2012-06-25 21:48 | 210K | |
![[ ]](/icons/layout.gif) | SybilGuard: Defending against sybil attacks via social networks.pdf | 2006-09-24 16:23 | 454K | |
![[ ]](/icons/layout.gif) | Symbolic Execution Algorithms for Test Generation.pdf | 2012-03-09 22:08 | 760K | |
![[ ]](/icons/layout.gif) | Symbolic Execution for Software Testing in Practice - Preliminary Assessment.pdf | 2012-01-21 18:17 | 165K | |
![[ ]](/icons/layout.gif) | Synthesis of masking countermeasures against side channel attacks.pdf | 2014-07-18 16:36 | 175K | |
![[ ]](/icons/layout.gif) | TIE - Principled Reverse Engineering of Types in Binary Programs.pdf | 2012-07-07 15:15 | 1.5M | |
![[ ]](/icons/layout.gif) | The CLASP Application Security Process.pdf | 2012-07-02 02:15 | 1.4M | |
![[ ]](/icons/layout.gif) | The Pynchon Gate: A secure method of pseudonymous mail retrieval - Len Sassaman - Bram Cohen - Nick Mathewson.pdf | 2005-10-04 11:01 | 253K | |
![[ ]](/icons/layout.gif) | The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.pdf | 2014-07-19 23:22 | 548K | |
![[ ]](/icons/layout.gif) | The_Mystery_of_Duqu_2_0_a_sophisticated_cyberespionage_actor_returns.pdf | 2015-06-10 02:00 | 5.4M | |
![[ ]](/icons/layout.gif) | Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.pdf | 2012-07-08 19:41 | 293K | |
![[TXT]](/icons/text.gif) | Tor hidden-service passive de-cloaking.html | 2013-12-15 17:34 | 35K | |
![[ ]](/icons/layout.gif) | Towards Provably Secure Software Attestation.pdf | 2013-02-20 03:01 | 673K | |
![[ ]](/icons/a.gif) | Towards an information theoretic metric for anonymity - 2004.ps | 2013-05-25 23:44 | 220K | |
![[ ]](/icons/compressed.gif) | Towards measuring anonymity - 2002.ps.gz | 2003-09-08 22:01 | 77K | |
![[ ]](/icons/layout.gif) | Towards reliable storage of 56-bit secrets in human memory (using spaced repetition).pdf | 2014-10-18 15:47 | 417K | |
![[ ]](/icons/layout.gif) | Traffic analysis and trade-offs in anonymity providing systems.pdf | 2003-11-23 19:37 | 54K | |
![[ ]](/icons/layout.gif) | Trawling for Tor Hidden Services - Detection, Measurement, Deanonymization.pdf | 2013-04-05 16:56 | 470K | |
![[ ]](/icons/layout.gif) | Twice the bits, twice the trouble: Vulnerabilities introduced by migrating to 64-bit platforms - 2016.pdf | 2016-08-10 10:55 | 372K | |
![[ ]](/icons/layout.gif) | USBee: Air-gap covert-channel via electromagnetic emission from USB - 2016.pdf | 2016-08-29 10:52 | 1.0M | |
![[ ]](/icons/layout.gif) | Undangle - Early Detection of Dangling Pointers in Use-After-Free.pdf | 2012-07-07 21:16 | 522K | |
![[ ]](/icons/layout.gif) | Untagging tor: A formal treatment of onion encryption - 2018.pdf | 2018-02-08 13:28 | 516K | |
![[ ]](/icons/layout.gif) | Users Get Routed - Traffic Correlation on Tor by Realistic Adversaries.pdf | 2013-09-05 08:49 | 1.8M | |
![[ ]](/icons/layout.gif) | Using sphinx to improve onion routing circuit construction - 2009.pdf | 2009-12-19 11:07 | 186K | |
![[ ]](/icons/layout.gif) | Whanau: A sybil-proof distributed hash table.pdf | 2010-03-18 10:36 | 875K | |
![[ ]](/icons/layout.gif) | You can type, but you can't hide: a stealthy GPU-based keylogger.pdf | 2013-04-09 02:11 | 345K | |
![[ ]](/icons/layout.gif) | ZIP attacks with reduced known plaintext.pdf | 2006-03-09 13:25 | 315K | |
![[DIR]](/icons/folder.gif) | advances-in-cryptology/ | 2014-10-22 21:19 | - | |
![[DIR]](/icons/folder.gif) | android/ | 2013-03-30 20:39 | - | |
![[DIR]](/icons/folder.gif) | ardrone/ | 2013-03-30 14:19 | - | |
![[ ]](/icons/layout.gif) | aws-security-whitepaper.pdf | 2013-03-01 11:48 | 1.2M | |
![[ ]](/icons/layout.gif) | caribnog-dnssec-design-module1-12jun12-en.pdf | 2017-03-09 19:46 | 1.9M | |
![[DIR]](/icons/folder.gif) | covert.io/ | 2014-07-21 11:52 | - | |
![[DIR]](/icons/folder.gif) | cryptography/ | 2018-07-15 11:56 | - | |
![[TXT]](/icons/text.gif) | fuzzy-fingerprints.html | 2006-10-29 12:33 | 42K | |
![[TXT]](/icons/text.gif) | get.txt | 2014-04-11 13:59 | 194 | |
![[DIR]](/icons/folder.gif) | infomarkets/ | 2014-03-13 20:43 | - | |
![[ ]](/icons/layout.gif) | mayhem-oakland-12.pdf | 2012-06-27 07:50 | 415K | |
![[DIR]](/icons/folder.gif) | pynchon/ | 2014-11-27 17:54 | - | |
![[DIR]](/icons/folder.gif) | stuxnet/ | 2010-11-07 09:13 | - | |
![[TXT]](/icons/text.gif) | url.txt | 2018-02-25 10:41 | 8.1K | |
![[ ]](/icons/layout.gif) | usenix11.pdf | 2011-08-23 10:44 | 686K | |
|