没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论
收起资源包目录
Computer Security Reading List.7z (93个子文件)
Computer Security Reading List
FlowDroid Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps.pdf 353KB
A Security Evaluation of DNSSEC with NSEC3.pdf 399KB
Stack based buffer overflow ExploitationTutorial.pdf 641KB
Buffer Overflows Attacks and Defenses for the Vulnerability of the Decade.pdf 72KB
From
CSE509 Spring 2006. System Security.url 82B
CS161 Syllabus.url 85B
CS155 Course Syllabus.url 73B
ECS 235A. Computer Security. Fall 2012.url 74B
A DoS-limiting Network Architecture.pdf 330KB
Security in Ordinary Operating Systems.pdf 162KB
On the Effectiveness of Address-Space Randomization.pdf 147KB
Hacking Blind.pdf 471KB
Exposing Private Information by Timing Web Applications.pdf 181KB
Traps and Pitfalls Practical Problems in System Call Interposition Based.pdf 125KB
When Virtual is Harder than Real Security Challenges in Virtual Machine Based Computing Environments.pdf 93KB
Understanding Android Sec.pdf 194KB
BGP Security in Partial Deployment.pdf 1.17MB
Use after free exploit example.pdf 1.3MB
Effective Bug Discovery.pdf 1.1MB
A Look Back at Security Problems in the TCPIP Protocol Suite.pdf 274KB
Intercepting Mobile Communications The Insecurity of 802.11.pdf 99KB
Beyond Stack Smashing Recent Advances in Exploiting Buffer Overruns.pdf 371KB
Bypassing Browser Memory Protections.pdf 684KB
The Protection of Information in Computer Systems.pdf 1.16MB
Smashing The Stack For Fun And Profit .pdf 109KB
A Heap of Risk - The H Security- News and Features.url 94B
Practical Network Support for IP Traceback.pdf 124KB
Advanced SQL Injection In SQL Server Applications.pdf 291KB
Exploiting Format String Vulnerabilities.pdf 229KB
Characterizing the Remote Control Behavior of Bots.pdf 176KB
Origin Cookies Session Integrity for Web Applications.pdf 132KB
Android Permissions Demystified.pdf 349KB
KLEE Unassisted and Automatic Generation of High-Coverage.pdf 179KB
ForceHTTPS Protecting High-Security Web Sites from Network Attacks.pdf 244KB
Click Trajectories End-to-End Analysis of the Spam Value Chain.pdf 2.26MB
The Basics of Web Workers.pdf 318KB
Telling Humans and Computers Apart Automatically.pdf 105KB
Interview with Stefan Savage On the Spam Payment Trail.pdf 152KB
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software.pdf 196KB
Play safely in sandboxed IFrames.pdf 179KB
CCured Type-Safe Retrofitting of Legacy Code.pdf 261KB
Control-Flow Integrity.pdf 274KB
Experimenting with TCPA TCG Hardware.pdf 347KB
StackGuard Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks.pdf 94KB
Cross Site Scripting Explained.pdf 193KB
A Large-Scale Study of Mobile Web App Security.pdf 322KB
Distributed Firewalls.pdf 212KB
TaintDroid An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.pdf 836KB
Combining cryptography with biometrics effectively.pdf 227KB
Return oriented programming.pdf 398KB
Secure Session Management With Cookies for Web Applications.pdf 366KB
Reflections on Trusting Trust.pdf 220KB
Access Control (v0.1).pdf 118KB
How to hijack the Global Offset Table with pointers for root shells.pdf 62KB
EXE Automatically Generating Inputs of Death.pdf 1MB
Remote Timing Attacks are Practical.pdf 144KB
Optical Time-Domain Eavesdropping Risks of CRT Displays.pdf 399KB
64 Bits Linux Stack Based Buffer Overflow.pdf 355KB
Efficient and Transparent ROP Mitigation.pdf 131KB
Robust Defenses for Cross-Site Request Forgery.pdf 2.95MB
PointGuard Protecting Pointers From Buffer Overflow Vulnerabilities.pdf 92KB
The Case for Prefetching and Prevalidating TLS Server Certificates.pdf 385KB
How To Write a Setuid Program.pdf 37KB
Efficient Software-Based Fault Isolation.pdf 1.42MB
Privtrans Automatically Partitioning Programs for Privilege Separation.pdf 121KB
Details of a recent large-scale DDoS event.pdf 315KB
Inferring Internet Denial-of-Service Activity.pdf 205KB
Cross-Site Request Forgeries Exploitation and Prevention.pdf 168KB
Keyboard Acoustic Emanations.pdf 633KB
Inside the Slammer Worm.pdf 415KB
Preventing Privilege Escalation.pdf 240KB
Why Information Security is Hard – An Economic Perspective.pdf 99KB
Ostia A Delegating Architecture for Secure System Call Interposition.pdf 129KB
Using CORS.pdf 352KB
Terra A Virtual Machine-Based Platform for Trusted Computing.pdf 137KB
The Security Architecture of the Chromium Browser.pdf 1.11MB
Insertion, Evasion, and Denial of Service Eluding Network Intrusion Detection.pdf 436KB
Measuring Pay-per-Install The Commoditization of Malware Distribution.pdf 1.32MB
BREACH attack.pdf 1.04MB
Once upon a free().pdf 83KB
Setuid Demystified.pdf 163KB
James Mickens on PW.pdf 1.6MB
An Illustrated Guide to the Kaminsky DNS Vulnerability.pdf 693KB
The Confused Deputy.pdf 213KB
Towards Short-Lived Certificates.pdf 299KB
Security Analysis of a Cryptographically-Enabled RFID Device.pdf 523KB
A Note on the Confinement Problem.pdf 21KB
Overflowing the stack.pdf 924KB
Basic Integer Overflows.pdf 75KB
Using Client Puzzles to Protect TLS.pdf 83KB
Securing Frame Communication in Browsers.pdf 3.5MB
Designing an Authentication System a Dialogue in Four Scenes.pdf 306KB
An Introduction to Content Security Policy.pdf 202KB
共 93 条
- 1
资源评论
绝不原创的飞龙
- 粉丝: 1w+
- 资源: 1091
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功