- DocumentoWolf Zimmermann- On the Correctness of Transformations in Compiler Back-Endsenviado porWhite909
- DocumentoProgramming with GNU Softwareenviado porWhite909
- DocumentoMark Burgess and Ron Hale-Evans- The GNU C Programming Tutorialenviado porWhite909
- DocumentoGNU Linear Programming Kitenviado porWhite909
- DocumentoEssentials of Adobe Flashenviado porWhite909
- DocumentoSimon Josefsson- GNU Generic Security Service Libraryenviado porWhite909
- DocumentoRay Toal- Ajax Programmingenviado porWhite909
- DocumentoJan Gerrit Göbel- Advanced Honeynet Based Intrusion Detectionenviado porWhite909
- DocumentoGuofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee- BotHunterenviado porWhite909
- DocumentoManoj B. Athreya- Subverting Linux On-The-Fly Using Harware Virtualization Technologyenviado porWhite909
- DocumentoKernel-Land Rootkitsenviado porWhite909
- DocumentoAlexander Kornbrust- Oracle Rootkits 2.0enviado porWhite909
- DocumentoAlexander Kornbrust- Oracle Rootkits –eine neue Gefahr für Datenbanken?enviado porWhite909
- DocumentoAndreas Bunten- UNIX and Linux based Kernel Rootkitsenviado porWhite909
- DocumentoJem Berkes- Topics in Network Securityenviado porWhite909
- DocumentoHallvar Helleseth- Wi-Fi Securityenviado porWhite909
- DocumentoPietro Cenciarelli- Computational applications of calculi based on monadsenviado porWhite909
- DocumentoGraham Williams- Debian GNU/Linuxenviado porWhite909
- DocumentoSherry B. Murphy- Deceiving Adversary Network Scanning Efforts Using Host-Based Deceptionenviado porWhite909
- DocumentoReverend Bill Blunden- The Rootkit Arsenalenviado porWhite909
- DocumentoChris Ries- Inside Windows Rootkitsenviado porWhite909
- DocumentoDouglas P. Medley- Virtualization Technology Applied to Rootkit Defenseenviado porWhite909
- DocumentoJohn Heasman- Firmware Rootkitsenviado porWhite909
- DocumentoWangYao- Rootkit on Linux x86enviado porWhite909
- DocumentoSamuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch- SubVirtenviado porWhite909
- DocumentoChaoting Xuan, John Copeland, Raheem Beyah- Shepherding Loadable Kernel Modules through On-demand Emulationenviado porWhite909
- DocumentoJoanna Rutkowska and Alexander Tereshkin- IsGameOver() Anyone?enviado porWhite909
- DocumentoJoanna Rutkowska- Security Challenges in Virtualized Environmentsenviado porWhite909
- DocumentoGreg Morrisett- The Engineering Challenges of Trustworthy Computingenviado porWhite909
- DocumentoGautam Altekar and Ion Stoica- Output-Deterministic Replay for Multicore Debuggingenviado porWhite909
- DocumentoProceedings of the Workshop on Binary Instrumentation and Applications 2009enviado porWhite909
- DocumentoZhiqiang Lin, Xiangyu Zhang, Dongyan Xu- Reuse-Oriented Camouflaging Attackenviado porWhite909
- DocumentoAlexander Sotirov and Mark Dowd- Bypassing Browser Memory Protectionsenviado porWhite909
- DocumentoCollin Mulliner- Fuzzing the Phone in your Phoneenviado porWhite909
- DocumentoRyan Roemer,Erik Buchanan,Hovav Shacham and Stefan Savage- Return-Oriented Programmingenviado porWhite909
- DocumentoF-Secure Linux Securityenviado porWhite909
- DocumentoDoug Tidwell- Tutorialenviado porWhite909