<--- Back to Details
First PageDocument Content
Hacking / Software testing / Vulnerability / Exploit / Address space layout randomization / Microsoft Silverlight / Arbitrary code execution / Zero-day attack / Cross-site scripting / Computer security / Cyberwarfare / Software
Date: 2014-03-11 18:58:41
Hacking
Software testing
Vulnerability
Exploit
Address space layout randomization
Microsoft Silverlight
Arbitrary code execution
Zero-day attack
Cross-site scripting
Computer security
Cyberwarfare
Software

Security Advisory SA2013-

Add to Reading List

Source URL: doa.alaska.gov

Download Document from Source Website

File Size: 84,82 KB

Share Document on Facebook

Similar Documents

Computing / Cyberwarfare / Software / Cybercrime / Botnets / Denial-of-service attacks / Linux malware / Cryptographic software / Secure Shell / Xor DDoS / OpenSSH / File Transfer Protocol

Down The Rabbit Hole: How Hackers Exploit Weak SSH Credentials To Build DDoS Botnets Christophe Tafani-Dereeper @christophetd

DocID: 1xVGF - View Document

Abuse / Human behavior / Behavior / Crime / Domestic violence / Intimate partner violence / Restraining order / Spyware / Cyberbullying / Stalking

“A Stalker’s Paradise”: How Intimate Partner Abusers Exploit Technology Diana Freed† Jackeline Palmer‡ Diana MinchalaΨ Karen LevyΦ Thomas Ristenpart† Nicola Dell† † Cornell Tech

DocID: 1xUW8 - View Document

Cybercrime / Cyberwarfare / Software / Blackhole exploit kit / Exploit kit / Transport Layer Security / MPack / Malware / Exploit / CRIME

EVOLUTION OF EXPLOIT KITS Exploring Past Trends and Current Improvements Joseph C. Chen

DocID: 1xUec - View Document

Cryptocurrencies / Ethereum / Blockchains / Computing / Alternative currencies / Concurrent computing / Distributed computing / Cross-platform software / Bug bounty program / Smart contract / Software bug / Bounty

Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts Lorenz Breidenbach, Cornell Tech, IC3, ETH Zurich; Philip Daian, Cornell Tech, IC3; Florian Tramer, Stanford; Ari Juels, Cornell Tech

DocID: 1xTOf - View Document

PDF Document

DocID: 1xEY1 - View Document