- DocumentWolf Zimmermann- On the Correctness of Transformations in Compiler Back-Endsuploaded byWhite909
- DocumentProgramming with GNU Softwareuploaded byWhite909
- DocumentMark Burgess and Ron Hale-Evans- The GNU C Programming Tutorialuploaded byWhite909
- DocumentGNU Linear Programming Kituploaded byWhite909
- DocumentEssentials of Adobe Flashuploaded byWhite909
- DocumentSimon Josefsson- GNU Generic Security Service Libraryuploaded byWhite909
- DocumentRay Toal- Ajax Programminguploaded byWhite909
- DocumentJan Gerrit Göbel- Advanced Honeynet Based Intrusion Detectionuploaded byWhite909
- DocumentGuofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee- BotHunteruploaded byWhite909
- DocumentManoj B. Athreya- Subverting Linux On-The-Fly Using Harware Virtualization Technologyuploaded byWhite909
- DocumentKernel-Land Rootkitsuploaded byWhite909
- DocumentAlexander Kornbrust- Oracle Rootkits 2.0uploaded byWhite909
- DocumentAlexander Kornbrust- Oracle Rootkits –eine neue Gefahr für Datenbanken?uploaded byWhite909
- DocumentAndreas Bunten- UNIX and Linux based Kernel Rootkitsuploaded byWhite909
- DocumentJem Berkes- Topics in Network Securityuploaded byWhite909
- DocumentHallvar Helleseth- Wi-Fi Securityuploaded byWhite909
- DocumentPietro Cenciarelli- Computational applications of calculi based on monadsuploaded byWhite909
- DocumentGraham Williams- Debian GNU/Linuxuploaded byWhite909
- DocumentSherry B. Murphy- Deceiving Adversary Network Scanning Efforts Using Host-Based Deceptionuploaded byWhite909
- DocumentReverend Bill Blunden- The Rootkit Arsenaluploaded byWhite909
- DocumentChris Ries- Inside Windows Rootkitsuploaded byWhite909
- DocumentDouglas P. Medley- Virtualization Technology Applied to Rootkit Defenseuploaded byWhite909
- DocumentJohn Heasman- Firmware Rootkitsuploaded byWhite909
- DocumentWangYao- Rootkit on Linux x86uploaded byWhite909
- DocumentSamuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch- SubVirtuploaded byWhite909
- DocumentChaoting Xuan, John Copeland, Raheem Beyah- Shepherding Loadable Kernel Modules through On-demand Emulationuploaded byWhite909
- DocumentJoanna Rutkowska and Alexander Tereshkin- IsGameOver() Anyone?uploaded byWhite909
- DocumentJoanna Rutkowska- Security Challenges in Virtualized Environmentsuploaded byWhite909
- DocumentGreg Morrisett- The Engineering Challenges of Trustworthy Computinguploaded byWhite909
- DocumentGautam Altekar and Ion Stoica- Output-Deterministic Replay for Multicore Debugginguploaded byWhite909
- DocumentProceedings of the Workshop on Binary Instrumentation and Applications 2009uploaded byWhite909
- DocumentZhiqiang Lin, Xiangyu Zhang, Dongyan Xu- Reuse-Oriented Camouflaging Attackuploaded byWhite909
- DocumentAlexander Sotirov and Mark Dowd- Bypassing Browser Memory Protectionsuploaded byWhite909
- DocumentCollin Mulliner- Fuzzing the Phone in your Phoneuploaded byWhite909
- DocumentRyan Roemer,Erik Buchanan,Hovav Shacham and Stefan Savage- Return-Oriented Programminguploaded byWhite909
- DocumentF-Secure Linux Securityuploaded byWhite909
- DocumentDoug Tidwell- Tutorialuploaded byWhite909