Vulnerability

Results: 14773



#Item
791

Terms, Methodology, Preparation, Obstacles, and Pitfalls Vulnerability Assessment Course All materials are licensed under a Creative

Add to Reading List

Source URL: www.opensecuritytraining.info

Language: English - Date: 2013-11-03 14:53:41
    792

    Automated vulnerability analysis of zero sized heap allocations April 2010 Julien Vanegue () Microsoft Security Engineering Center (MSEC)

    Add to Reading List

    Source URL: 2010.hackitoergosum.org

    Language: English - Date: 2010-04-23 08:06:57
      793Graph theory / Mathematics / Discrete mathematics / Combinatorial optimization / Routing algorithms / Search algorithms / Multigraph / Flow network / Graph / A* search algorithm

      Network Vulnerability: A Designer-Disruptor Game∗ Hans Haller† FebruaryAbstract

      Add to Reading List

      Source URL: www.econ.vt.edu

      Language: English - Date: 2016-02-04 09:26:29
      794Computer network security / Computer security / Crime prevention / Cryptography / Cyberwarfare / National security / Vulnerability

      Greenbone Security Manager x-ray your network The Oering

      Add to Reading List

      Source URL: www.greenbone.net

      Language: English - Date: 2016-06-16 08:24:26
      795Debuggers / Cyberwarfare / Software engineering / Computing / WinDbg / Interactive Disassembler / Ida / Reverse engineering / Vulnerability / Zero-day / VMware

      Zero-day vulnerability discovery, analysis, triage, and exploitation. Advanced exploitation topics, including Windows mitigation bypasses (up to

      Add to Reading List

      Source URL: www.exodusintel.com

      Language: English - Date: 2014-12-11 12:30:42
      796Computer network security / Hacking / Software testing / Computer security / Vulnerability / Cross-site scripting / SQL injection / Program analysis / Web application security / Penetration test / Application security / Software bug

      Questions Developers Ask While Diagnosing Potential Security Vulnerabilities with Static Analysis Justin Smith, Brittany Johnson, and Emerson Murphy-Hill Bill Chu and Heather Richter Lipford

      Add to Reading List

      Source URL: www4.ncsu.edu

      Language: English - Date: 2015-07-31 17:48:16
      797Computing / Computer security / Cyberwarfare / Computer network security / Secure communication / Hacking / Software testing / Vulnerability / Resource fork / Firewall / Resource / Electronic filter

      Jigsaw: Protecting Resource Access by Inferring Programmer Expectations Hayawardh Vijayakumar and Xinyang Ge, The Pennsylvania State University; Mathias Payer, University of California, Berkeley; Trent Jaeger, The Pennsy

      Add to Reading List

      Source URL: hexhive.github.io

      Language: English - Date: 2016-06-13 11:08:40
      798

      Combining Static and Dynamic Analyses for Vulnerability Detection: Illustration on Heartbleed⋆ Bal´azs Kiss1 , Nikolai Kosmatov2 , Dillon Pariente3 , and Armand Puccetti2 1 2

      Add to Reading List

      Source URL: www.stance-project.eu

      Language: English - Date: 2016-05-19 05:19:26
        799Economy / Economics / Welfare economics / Labour economics / Income distribution / Employment compensation / Labour relations / Poverty in the United States / Poverty / Unemployment / Economic inequality / Working poor

        Labor Vulnerability and the Evolution of the Working Poor in Mexico Eduardo Rodríguez-Oreggia (EGAP, Tecnológico de Monterrey) Bruno López-Videla (EGAP, Tecnológico de Monterrey) Daniel Prudencio (EGAP, Tecnológico

        Add to Reading List

        Source URL: www.iariw.org

        Language: English - Date: 2013-09-04 16:43:27
        800

        Database Assessment Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. ■ http://creativecommons.org/licenses/by-sa/3.0/

        Add to Reading List

        Source URL: www.opensecuritytraining.info

        Language: English - Date: 2013-11-03 14:54:09
          UPDATE