Ptrace

Results: 34



#Item
1TACHYON :  Tandem Execution for Efficient Live Patch Testing Matthew Maurer

TACHYON : Tandem Execution for Efficient Live Patch Testing Matthew Maurer

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
2Mit

Mit "strace" zum Linux- und BASH-Versteher Harald KönigAugsburger Linux-Infotag 2016 Bosch Sensortec 1

Add to Reading List

Source URL: www.speicherleck.de

Language: English - Date: 2016-04-17 05:57:00
3TxBox: Building Secure, Efficient Sandboxes with System Transactions Suman Jana The University of Texas at Austin   Donald E. Porter

TxBox: Building Secure, Efficient Sandboxes with System Transactions Suman Jana The University of Texas at Austin Donald E. Porter

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2011-03-07 14:32:49
4View access control as a matrix  Specifying policy • Manually filling out matrix would be tedious • Use tools such as groups or role-based access control:

View access control as a matrix Specifying policy • Manually filling out matrix would be tedious • Use tools such as groups or role-based access control:

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-04 18:26:58
5Administrivia • Guest lecture Thursday - Amit Singh (Google): Real-world Operating Systems - Please attend lecture if at all possible  • Last project due Thursday

Administrivia • Guest lecture Thursday - Amit Singh (Google): Real-world Operating Systems - Please attend lecture if at all possible • Last project due Thursday

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2010-03-09 18:57:32
6Common Payment Systems – Who takes what slice of the pie and why? Lucky Green <>  What to Expect from this Talk

Common Payment Systems – Who takes what slice of the pie and why? Lucky Green <> What to Expect from this Talk

Add to Reading List

Source URL: ptrace.fefe.de

Language: English - Date: 2015-05-29 17:54:11
7Yet Another Android Rootkit /protecting/system/is/not/enough/ Tsukasa OI – Research Engineer Fourteenforty Research Institute, Inc.

Yet Another Android Rootkit /protecting/system/is/not/enough/ Tsukasa OI – Research Engineer Fourteenforty Research Institute, Inc.

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:41
8Tracing for Hardware, Driver and Binary Reverse Engineering in Linux Mathieu Desnoyers École Polytechnique de Montréal  Michel R. Dagenais

Tracing for Hardware, Driver and Binary Reverse Engineering in Linux Mathieu Desnoyers École Polytechnique de Montréal Michel R. Dagenais

Add to Reading List

Source URL: lttng.org

Language: English - Date: 2008-03-17 15:45:59
9Linux ASLR Curiosities Tavis Ormandy Julien Tinnes Google Security Team  ASLR

Linux ASLR Curiosities Tavis Ormandy Julien Tinnes Google Security Team ASLR

Add to Reading List

Source URL: www.cr0.org

Language: English - Date: 2009-04-22 19:17:58
10CDE: Using System Call Interposition to Automatically Create Portable Software Packages Philip J. Guo and Dawson Engler Stanford University April 5, 2011 (This technical report is an extended version of our 2011 USENIX A

CDE: Using System Call Interposition to Automatically Create Portable Software Packages Philip J. Guo and Dawson Engler Stanford University April 5, 2011 (This technical report is an extended version of our 2011 USENIX A

Add to Reading List

Source URL: pgbovine.net

Language: English - Date: 2014-01-03 23:24:44