Tags
reverse engineering
rootkits security x86 x64 virtualization reverse e
virtual machine
virtualization
vmx
hypervisor
intel
windows vista
uipi
h2hc
graphs
loops
logic
taint analysis
boolean
x86
Mehr anzeigen
Präsentationen
(5)Gefällt mir
(9)HKG15-211: Advanced Toolchain Usage Part 4
Linaro
•
Vor 9 Jahren
How to Root 10 Million Phones with One Exploit
Jiahong Fang
•
Vor 8 Jahren
CODE BLUE 2014 : Joy of a bug hunter by Masato Kinugawa
CODE BLUE
•
Vor 8 Jahren
Symbolic Execution And KLEE
Shauvik Roy Choudhary, Ph.D.
•
Vor 14 Jahren
Optimizing for developer happiness
Chad Dickerson
•
Vor 12 Jahren
Model-Driven Development of Semantic Mashup Applications with the Open-Source InfoGrid Internet Graph Database
InfoGrid.org
•
Vor 14 Jahren
HBase and Hadoop at Adobe
Cosmin Lehene
•
Vor 13 Jahren
Trees In The Database - Advanced data structures
Lorenzo Alberton
•
Vor 14 Jahren
Tags
reverse engineering
rootkits security x86 x64 virtualization reverse e
virtual machine
virtualization
vmx
hypervisor
intel
windows vista
uipi
h2hc
graphs
loops
logic
taint analysis
boolean
x86
Mehr anzeigen