- DocumentoWolf Zimmermann- On the Correctness of Transformations in Compiler Back-Endscargado porWhite909
- DocumentoProgramming with GNU Softwarecargado porWhite909
- DocumentoMark Burgess and Ron Hale-Evans- The GNU C Programming Tutorialcargado porWhite909
- DocumentoGNU Linear Programming Kitcargado porWhite909
- DocumentoEssentials of Adobe Flashcargado porWhite909
- DocumentoSimon Josefsson- GNU Generic Security Service Librarycargado porWhite909
- DocumentoRay Toal- Ajax Programmingcargado porWhite909
- DocumentoJan Gerrit Göbel- Advanced Honeynet Based Intrusion Detectioncargado porWhite909
- DocumentoGuofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee- BotHuntercargado porWhite909
- DocumentoManoj B. Athreya- Subverting Linux On-The-Fly Using Harware Virtualization Technologycargado porWhite909
- DocumentoKernel-Land Rootkitscargado porWhite909
- DocumentoAlexander Kornbrust- Oracle Rootkits 2.0cargado porWhite909
- DocumentoAlexander Kornbrust- Oracle Rootkits –eine neue Gefahr für Datenbanken?cargado porWhite909
- DocumentoAndreas Bunten- UNIX and Linux based Kernel Rootkitscargado porWhite909
- DocumentoJem Berkes- Topics in Network Securitycargado porWhite909
- DocumentoHallvar Helleseth- Wi-Fi Securitycargado porWhite909
- DocumentoPietro Cenciarelli- Computational applications of calculi based on monadscargado porWhite909
- DocumentoGraham Williams- Debian GNU/Linuxcargado porWhite909
- DocumentoSherry B. Murphy- Deceiving Adversary Network Scanning Efforts Using Host-Based Deceptioncargado porWhite909
- DocumentoReverend Bill Blunden- The Rootkit Arsenalcargado porWhite909
- DocumentoChris Ries- Inside Windows Rootkitscargado porWhite909
- DocumentoDouglas P. Medley- Virtualization Technology Applied to Rootkit Defensecargado porWhite909
- DocumentoJohn Heasman- Firmware Rootkitscargado porWhite909
- DocumentoWangYao- Rootkit on Linux x86cargado porWhite909
- DocumentoSamuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch- SubVirtcargado porWhite909
- DocumentoChaoting Xuan, John Copeland, Raheem Beyah- Shepherding Loadable Kernel Modules through On-demand Emulationcargado porWhite909
- DocumentoJoanna Rutkowska and Alexander Tereshkin- IsGameOver() Anyone?cargado porWhite909
- DocumentoJoanna Rutkowska- Security Challenges in Virtualized Environmentscargado porWhite909
- DocumentoGreg Morrisett- The Engineering Challenges of Trustworthy Computingcargado porWhite909
- DocumentoGautam Altekar and Ion Stoica- Output-Deterministic Replay for Multicore Debuggingcargado porWhite909
- DocumentoProceedings of the Workshop on Binary Instrumentation and Applications 2009cargado porWhite909
- DocumentoZhiqiang Lin, Xiangyu Zhang, Dongyan Xu- Reuse-Oriented Camouflaging Attackcargado porWhite909
- DocumentoAlexander Sotirov and Mark Dowd- Bypassing Browser Memory Protectionscargado porWhite909
- DocumentoCollin Mulliner- Fuzzing the Phone in your Phonecargado porWhite909
- DocumentoRyan Roemer,Erik Buchanan,Hovav Shacham and Stefan Savage- Return-Oriented Programmingcargado porWhite909
- DocumentoF-Secure Linux Securitycargado porWhite909
- DocumentoDoug Tidwell- Tutorialcargado porWhite909