Exploit

Results: 786



#Item
291Hacking / Software testing / Vulnerability / Exploit / Address space layout randomization / Zero / Computer security / Cyberwarfare / Failure

Taming wild copies From hopeless crash to working exploit Taming wild copies From hopeless crash to working

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2015-03-27 04:19:46
292Decision theory / Secretary problem / Statistical hypothesis testing / Statistics / Psychometrics / Design of experiments

Learning near-optimal search in a minimal explore/exploit task Ke Sang (), Peter M. Todd (pmtodd), Robert L. Goldstone (rgoldsto) Cognitive Science Program and Department of Psychological and Brain Scie

Add to Reading List

Source URL: cognitrn.psych.indiana.edu

Language: English - Date: 2013-11-19 12:04:28
293Central processing unit / Instruction set / Address space layout randomization / Subroutine / Software bugs / Computer programming / Computing / Software engineering

Instruction Set Filters and Other Exploit Defenses Changing the architecture to make exploitation harder. Taylor Hornby Michael Locasto

Add to Reading List

Source URL: defuse.ca

Language: English - Date: 2013-10-29 20:03:22
294Software testing / Hacking / Vulnerability / Zero-day attack / Patch / Social vulnerability / Common Vulnerabilities and Exposures / Exploit / Responsible disclosure / Computer security / Cyberwarfare / Computer network security

0-Day Patch Exposing Vendors (In)security Performance Stefan Frei, Bernhard Tellenbach, and Bernhard Plattner Computer Engineering and Networks Laboratory (TIK) Swiss Federal Institute of Technology, ETH Zurich {stefan.f

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:28
295Cyberwarfare / Software testing / Hacking / Crime prevention / National security / Exploit / Vulnerability / Malware / Threat / Computer security / Computer network security / Computing

OPINION Why Offensive Security Needs Engineering Textbooks Or, How to Avoid a Replay of “Crypto Wars” in Security Research

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-09-11 05:58:33
296Cyberwarfare / Hacking / Vulnerability / Malware / Social vulnerability / Software bug / Twitter / Exploit / Software testing / World Wide Web / Computer security

Washington DC – FebA 0-day’s life “Offense as Defense” Panel Discussion – Offensive Markets for Vulnerability Research – Pros and Cons

Add to Reading List

Source URL: revuln.com

Language: English - Date: 2013-04-04 19:34:02
297Engines / Hatchbacks / Electric vehicles / Electric vehicle conversion / Hybrid vehicle drivetrain / Chevrolet Volt / Hybrid electric vehicle / Ford Motor Company / Volkswagen / Transport / Green vehicles / Private transport

QuantumWorks/L3Rs First Commercial Product- High Performance Exotic Sports Car Hybrid Electric Vehicle – “L3-Nemesis Supercar” Market Research QuantumWorks/L3R (QWC/L3R) mission is to exploit an emerging and untapp

Add to Reading List

Source URL: quantumworks.com

Language: English - Date: 2008-01-16 13:30:44
298Computer virus / Cluster analysis / Hierarchical clustering / Statistics / Antivirus software / Malware

Kizzle: A Signature Compiler for Exploit Kits MSR-TRBen Stock Benjamin Livshits and Benjamin Zorn

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2015-02-13 19:37:17
299Pwn2Own / Google Chrome / Safari / Firefox / Exploit / Internet Explorer / Software / Web browsers / News aggregators

Big browsers fall in Pwn2Own exploit competition

Add to Reading List

Source URL: techxplore.com

Language: English - Date: 2015-05-28 18:52:03
300Computing / Application security / Heap overflow / Qualys / Vulnerability / Metasploit Project / Shellcode / Exploit / Wireless security / Computer network security / Cyberwarfare / Computer security

HITBSECCONF2009 - DUBAI CONFERENCE KIT Event Overview Venue: Sheraton Dubai Creek

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:55:03
UPDATE