CPUID

Results: 135



#Item
11Malicious Code Injection via /dev/mem Anthony Lineberry <> March 27, 2009 Abstract In this paper we will discuss methods for using the character device, /dev/mem, as an entry point for injectin

Malicious Code Injection via /dev/mem Anthony Lineberry <> March 27, 2009 Abstract In this paper we will discuss methods for using the character device, /dev/mem, as an entry point for injectin

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:29
12Geomatica 10 Stand Alone Installation Procedure TUTORIAL Thank you for purchasing PCI Geomatica 10! This tutorial aims to step through a simple stand alone installation for Geomatica 10. In addition to a general overview

Geomatica 10 Stand Alone Installation Procedure TUTORIAL Thank you for purchasing PCI Geomatica 10! This tutorial aims to step through a simple stand alone installation for Geomatica 10. In addition to a general overview

Add to Reading List

Source URL: www.pcigeomatics.com

Language: English - Date: 2015-04-28 10:39:28
13F LUSH +R ELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack Yuval Yarom Katrina Falkner The University of Adelaide

F LUSH +R ELOAD: a High Resolution, Low Noise, L3 Cache Side-Channel Attack Yuval Yarom Katrina Falkner The University of Adelaide

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-07-04 21:30:09
14Accessing North Bridge and South Bridge registers on the Vortex86 Summary Application Note AP0102 (v1)

Accessing North Bridge and South Bridge registers on the Vortex86 Summary Application Note AP0102 (v1)

Add to Reading List

Source URL: www.dsl-ltd.co.uk

Language: English - Date: 2015-04-11 03:15:40
15

PDF Document

Add to Reading List

Source URL: down.52pojie.cn

Language: English - Date: 2011-11-10 09:51:04
16An introduction to Fortran Daniel Price School of Mathematical Sciences Monash University Honours Computing Course Feb 2010

An introduction to Fortran Daniel Price School of Mathematical Sciences Monash University Honours Computing Course Feb 2010

Add to Reading List

Source URL: users.monash.edu.au

Language: English - Date: 2010-02-21 16:26:46
17FXplorer: Exploration of Computed Software Behavior A New Approach to Understanding and Verification Luanne Burns Timothy Daly Software Engineering Institute Carnegie Mellon University

FXplorer: Exploration of Computed Software Behavior A New Approach to Understanding and Verification Luanne Burns Timothy Daly Software Engineering Institute Carnegie Mellon University

Add to Reading List

Source URL: daly.axiom-developer.org

Language: English - Date: 2010-03-15 18:26:20
18Data-Driven Equivalence Checking Rahul Sharma Eric Schkufza  Berkeley Churchill

Data-Driven Equivalence Checking Rahul Sharma Eric Schkufza Berkeley Churchill

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2013-08-14 01:47:23
19Automatic Generation of Peephole Superoptimizers Sorav Bansal and Alex Aiken Computer Systems Lab Stanford University {sbansal, aiken}@cs.stanford.edu

Automatic Generation of Peephole Superoptimizers Sorav Bansal and Alex Aiken Computer Systems Lab Stanford University {sbansal, aiken}@cs.stanford.edu

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2006-08-01 01:50:46
20March 2012 White Paper: “Police trojan” study Marcin “Icewall” Noga

March 2012 White Paper: “Police trojan” study Marcin “Icewall” Noga

Add to Reading List

Source URL: hispasec.com

Language: English - Date: 2013-11-07 06:14:53