Parent directory/ | - | - |
2nd USENIX Workshop on Offensive Technologies (WOOT 2008)_files/ | - | 2020 Mar 31 05:14 |
WOOT 2009 Workshop Sessions_files/ | - | 2020 Mar 31 05:14 |
2nd USENIX Workshop on Offensive Technologies (WOOT 2008).htm | 8.0 KiB | 2020 Mar 30 20:35 |
Engineering Heap Overflow Exploits with JavaScript - Mark Daniel, Jake Honoroff, Charlie Miller.pdf | 66.2 KiB | 2020 Mar 30 20:36 |
Experiences with Model Inference Assisted Fuzzing - Joachim Viide, Aki Helin, Marko Laakso, Pekka Pietikainen, Mika Seppanen, Kimmo Halunen, Rauli Puupera, Juha Roning.pdf | 141.0 KiB | 2020 Mar 30 20:36 |
Exploitable Redirects on the Web Identification, Prevalence, and Defense - Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta.pdf | 70.3 KiB | 2020 Mar 30 20:38 |
Insecure Context Switching Inoculating Regular Expressions for Survivability - Will Drewry, Tavis Ormandy.pdf | 98.7 KiB | 2020 Mar 30 20:37 |
Modeling the Trust Boundaries Created by Securable Objects - Matt Miller.pdf | 213.6 KiB | 2020 Mar 30 20:38 |
Reverse Engineering Python Applications - Aaron Portnoy, Ali-Rizvi Santiago.pdf | 205.0 KiB | 2020 Mar 30 20:38 |
There Is No Free Phish An Analysis of Free and Live Phishing Kits - Marco Cova, Christopher Kruegel, Giovanni Vigna.pdf | 134.1 KiB | 2020 Mar 30 20:37 |
Towards Systematic Evaluation of the Evadability of Bot Botnet Detection Methods - Elizabeth Stinson, John C. Mitchell.pdf | 314.4 KiB | 2020 Mar 30 20:37 |
WOOT 2008 Report.pdf | 101.9 KiB | 2020 Mar 30 20:36 |
WOOT 2009 Workshop Sessions.htm | 12.0 KiB | 2020 Mar 30 20:45 |