Archive for the 'paper' Category
Stop Fixing All The Things – Our BSidesLV Talk | The Risk I/O Blog
Saturday, August 10th, 2013Recent parer shows that it make sense to focus only on vulns that have ready exploits in metasploit and exploitdb
Stop Fixing All The Things – Our BSidesLV Talk | The Risk I/O Blog
Saturday, August 10th, 2013Recent parer shows that it make sense to focus only on vulns that have ready exploits in metasploit and exploitdb
The Legitimate Vulnerability Market – Inside the Secretive World of 0-day Exploit Sales [.pdf]
Sunday, July 14th, 2013Old (2007 ) paper by Charlie Miller about trading of 0-day exploits
The Legitimate Vulnerability Market – Inside the Secretive World of 0-day Exploit Sales [.pdf]
Sunday, July 14th, 2013Old (2007 ) paper by Charlie Miller about trading of 0-day exploits
Language-theoretic Security
Sunday, April 14th, 2013The Language-theoretic approach (LANGSEC) regards the Internet insecurity epidemic as a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks. LANGSEC posits that the only path to tru…
Language-theoretic Security
Sunday, April 14th, 2013The Language-theoretic approach (LANGSEC) regards the Internet insecurity epidemic as a consequence of ad hoc programming of input handling at all layers of network stacks, and in other kinds of software stacks. LANGSEC posits that the only path to tru…
Europa: Efficient User Mode Packet Forwarding in Network Virtualization – Liao.pdf
Sunday, November 25th, 2012Paper that describes fast user-mode routing ( ~90% speed of kernel mode) in Linux
Europa: Efficient User Mode Packet Forwarding in Network Virtualization – Liao.pdf
Sunday, November 25th, 2012Paper that describes fast user-mode routing ( ~90% speed of kernel mode) in Linux
Europa: Efficient User Mode Packet Forwarding in Network Virtualization – Liao.pdf
Sunday, November 25th, 2012Paper that describes fast user-mode routing ( ~90% speed of kernel mode) in Linux