Personal Information
Info
@若渴, Geek, Freelancer
Tags
bopc
dop
doa
red team
dotnet
.net
netspectre
spectre
cache-side channel attack
adversary evaluation tools
nyuzi
ghrd
gsrd
fpga
sockit
side channel attacks
malware av
mining pools
double-spending attacks
transaction malleability
attacks targeting mining
eclipse attacks
consensus
bitcoin
window shellcode
formal verfication
concurrenecy
code reuse attacks
gpgpu
cuda
information-security
information security
Mehr anzeigen
Präsentationen
(20)Gefällt mir
(13)INSIDE ARM-X - Countermeasure 2019
Saumil Shah
•
Vor 4 Jahren
Hello world 的一生
Wen Liao
•
Vor 4 Jahren
Protect Your Payloads: Modern Keying Techniques
Leo Loobeek
•
Vor 5 Jahren
[ModernWeb2018] Web3.0 區塊鏈 DApp + 智能合約開發:你必要挑戰的坑坑洞洞
Taien Wang
•
Vor 5 Jahren
Spectre(v1%2 fv2%2fv4) v.s. meltdown(v3)
Gavin Guo
•
Vor 5 Jahren
Arm device tree and linux device drivers
Houcheng Lin
•
Vor 9 Jahren
20180120 hacking the art of learning
Yi-Lang Tsai
•
Vor 6 Jahren
Veil-Ordnance
VeilFramework
•
Vor 9 Jahren
Defcon - Veil-Pillage
VeilFramework
•
Vor 9 Jahren
Yet another introduction to Linux RCU
Viller Hsiao
•
Vor 8 Jahren
OOP in C - Inherit (Chinese Version)
Kai-Feng Chou
•
Vor 14 Jahren
GNU ld的linker script簡介
Wen Liao
•
Vor 9 Jahren
How A Compiler Works: GNU Toolchain
National Cheng Kung University
•
Vor 9 Jahren
Personal Information
Info
@若渴, Geek, Freelancer
Tags
bopc
dop
doa
red team
dotnet
.net
netspectre
spectre
cache-side channel attack
adversary evaluation tools
nyuzi
ghrd
gsrd
fpga
sockit
side channel attacks
malware av
mining pools
double-spending attacks
transaction malleability
attacks targeting mining
eclipse attacks
consensus
bitcoin
window shellcode
formal verfication
concurrenecy
code reuse attacks
gpgpu
cuda
information-security
information security
Mehr anzeigen