Marcadores
reverse engineering
rootkits security x86 x64 virtualization reverse e
virtual machine
virtualization
vmx
hypervisor
intel
windows vista
uipi
h2hc
graphs
loops
logic
taint analysis
boolean
x86
Ver mais
Apresentações
(5)Gostaram
(9)HKG15-211: Advanced Toolchain Usage Part 4
Linaro
•
Há 9 anos
How to Root 10 Million Phones with One Exploit
Jiahong Fang
•
Há 8 anos
CODE BLUE 2014 : Joy of a bug hunter by Masato Kinugawa
CODE BLUE
•
Há 8 anos
Symbolic Execution And KLEE
Shauvik Roy Choudhary, Ph.D.
•
Há 14 anos
Optimizing for developer happiness
Chad Dickerson
•
Há 12 anos
HBase and Hadoop at Adobe
Cosmin Lehene
•
Há 13 anos
Trees In The Database - Advanced data structures
Lorenzo Alberton
•
Há 14 anos
Marcadores
reverse engineering
rootkits security x86 x64 virtualization reverse e
virtual machine
virtualization
vmx
hypervisor
intel
windows vista
uipi
h2hc
graphs
loops
logic
taint analysis
boolean
x86
Ver mais