Exploit

Results: 786



#Item
391Combinatorics / Graph / Community structure / Connectivity / Graph theory / Networks / Mathematics

is run on the network of communities and is fed with some seed communities. Since we use NS in our evaluation, we propose a slight improvement to NS propagation algorithm to exploit the weights in the graph of communitie

Add to Reading List

Source URL: mypage.iu.edu

Language: English - Date: 2014-10-25 22:33:36
392Computer network security / Metasploit Project / Software testing / Exploit / Network security / Software / Computer security / Cyberwarfare

Advances in Exploit Technology hdm & spoonm CanSecWest, 2005 Part I

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-07 19:38:55
393Computer network security / Mac OS X / Shellcode / Software testing / Mac OS X Snow Leopard / Firewall / Mac OS X Leopard / Sandbox / Exploit / System software / Computer security / Software

Hacking Macs for Fun and Profit Dino A. Dai Zovi Offensive Security Researcher http://trailofbits.com http://theta44.org

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2009-03-25 18:45:02
394Software bugs / Debuggers / Buffer overflow / Electronic filter / Filter / Vulnerability / Valgrind / Instruction set / Computing / Computer programming / Cyberwarfare

Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software James Newsome Carnegie Mellon University

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:29
395Software quality / Cyberwarfare / Vulnerability / Buffer overflow / Fuzz testing / Stack / Heap overflow / Exploit / Memory safety / Software bugs / Software testing / Computer security

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
396Exec Shield / Linux / NX bit / Process / Address space layout randomization / PaX / Exec / X86 / Pointer / Computing / Computer architecture / System software

Exec-shield 환경 내의 exploit 작성 방법

Add to Reading List

Source URL: powerofcommunity.net

Language: English - Date: 2008-11-04 08:59:42
397Gaming / Terminology / Software / Cybercrime / MPack / Exploit

THE EVOLUTION OF BLACKHOLE Chris Astacio Websense What Is An Exploit Kit

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2013-03-19 05:05:27
398Computing / Hacking / Software testing / Hacker / Malware / Denial-of-service attack / Vulnerability / Exploit / OWASP / Computer security / Cyberwarfare / Computer network security

Webapp Security Fengshui (HKEx-Triggered Edition) 網站漏洞風水(港交所加強版) {Alan  Ho,  Anthony  Lai},  VXRL   VXRL

Add to Reading List

Source URL: archive.isoc.hk

Language: English - Date: 2011-09-08 09:46:04
399Computer network security / Metasploit Project / Software testing / Exploit / Session / Internet Relay Chat / X Window System / Proxy server / Port / Software / Computing / System software

Network Attack Collaboration Sharing the Shell RAPHAEL MUDGE Raphael Mudge is a Washington, DC, based

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2015-04-22 11:18:01
UPDATE