X86

Results: 2025



#Item
1Full version of an extended abstract published in Proceedings of ACM CCS 2007, ACM Press, The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) Hovav Shacham∗ hovav@cs.

Full version of an extended abstract published in Proceedings of ACM CCS 2007, ACM Press, The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86) Hovav Shacham∗ hovav@cs.

Add to Reading List

Source URL: hovav.net

Language: English - Date: 2018-06-10 15:29:33
2Intro x86 Part 2: More Examples and Analysis Xeno Kovah – xkovah at gmail  1

Intro x86 Part 2: More Examples and Analysis Xeno Kovah – xkovah at gmail 1

Add to Reading List

Source URL: opensecuritytraining.info

Language: English - Date: 2015-12-12 15:49:39
    3

    Firmware Updating Install USB driver: GD_VirtualComDriverrar,choose X86 for 32bit system, X64 for 64bit system. Install QXCodePro_Update_dpinst_Setup_1.02.exe Hold pressing PTT key and alarm key, at the sa

    Add to Reading List

    Source URL: www.connectsystems.com

    - Date: 2018-08-08 14:44:43
      4Will appear in the 2009 IEEE Symposium on Security and Privacy  Native Client: A Sandbox for Portable, Untrusted x86 Native Code Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki

      Will appear in the 2009 IEEE Symposium on Security and Privacy Native Client: A Sandbox for Portable, Untrusted x86 Native Code Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley Chen, Robert Muth, Tavis Ormandy, Shiki

      Add to Reading List

      Source URL: css.csail.mit.edu

      Language: English - Date: 2016-01-29 11:49:40
        5Muen An x86/64 Separation Kernel for High Assurance Reto Buerki Adrian-Ken Rueegsegger

        Muen An x86/64 Separation Kernel for High Assurance Reto Buerki Adrian-Ken Rueegsegger

        Add to Reading List

        Source URL: www.ada-switzerland.ch

        Language: English - Date: 2017-10-08 15:04:38
          6Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors Patrick Longa, and Catherine Gebotys Department of Electrical and Computer Engineering, University of Waterloo, Canada, {pl

          Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors Patrick Longa, and Catherine Gebotys Department of Electrical and Computer Engineering, University of Waterloo, Canada, {pl

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2010-06-09 13:30:54
            7State of the Port to x86_64 April 2017 April 3 , 2017  Update Topics

            State of the Port to x86_64 April 2017 April 3 , 2017 Update Topics

            Add to Reading List

            Source URL: www.vmssoftware.com

            Language: English - Date: 2018-01-16 05:58:14
              8State of the Port to x86 March 2016 March 11, 2016  State of the Port to x86

              State of the Port to x86 March 2016 March 11, 2016 State of the Port to x86

              Add to Reading List

              Source URL: www.vmssoftware.com

              Language: English - Date: 2018-01-16 06:12:04
                9Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors Bart Coppens∗ , Ingrid Verbauwhede‡ , Koen De Bosschere∗ , and Bjorn De Sutter∗† ∗ Electronics and Information Systems Depa

                Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors Bart Coppens∗ , Ingrid Verbauwhede‡ , Koen De Bosschere∗ , and Bjorn De Sutter∗† ∗ Electronics and Information Systems Depa

                Add to Reading List

                Source URL: users.elis.ugent.be

                Language: English - Date: 2009-07-23 13:04:51