Active
Recent
Comments
Search
Login
Login
cs.vu.nl: 19 stories from 8 submitters
4
The Little Manual of API Design (2008)
pdf
programming
cs.vu.nl
via
dbremner
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations
pdf
security
cs.vu.nl
via
fro
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
kMVX: Detecting Kernel Information Leaks with Multi-variant Execution
pdf
security
cs.vu.nl
via
fro
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Dedup Est Machina: Memory Deduplication as an Advanced Exploitation Vector
pdf
security
cs.vu.nl
via
lattera
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
6
A Brief Introduction to Distributed Systems (2016)
pdf
distributed
programming
cs.vu.nl
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
A NEaT Design for Reliable and Scalable Network Stacks (2016)
☶
pdf
networking
security
cs.vu.nl
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
Mutable Checkpoint-Restart: Automating, Live Updates for Generic Server Programs (2014)
☶
pdf
c
linux
cs.vu.nl
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
PipesFS: Fast Linux I/O in the Unix Tradition (2008)
☶
pdf
linux
performance
unix
cs.vu.nl
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Throwhammer: Rowhammer Attacks over the Network and Defenses
pdf
security
cs.vu.nl
via
fro
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Position-independent Code Reuse
pdf
security
cs.vu.nl
via
fro
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
Safe Kernel Programming in the OKE (2002)
☶
pdf
programming
security
cs.vu.nl
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
80
An Open Letter to Intel
hardware
person
cs.vu.nl
via
av
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
70 comments
70
8
Stop Bashing COBOL: COBOL as a Research Theme
pdf
slides
compsci
programming
cs.vu.nl
via
nickpsecurity
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
2
CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks
pdf
security
cs.vu.nl
via
fro
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
20
ASLR on the Line: Practical Cache Attacks on the MMU
pdf
security
cs.vu.nl
via
nyx
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
2
Flip Feng Shui: Hammering a Needle in the Software Stack
pdf
security
virtualization
cs.vu.nl
via
pushcx
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Writing kernels that boot with Qemu and Grub - a tutorial
linux
cs.vu.nl
via
av
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Construction of a Highly Dependable Operating System
pdf
devops
unix
cs.vu.nl
via
pushcx
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
17
Retirement of Prof. Andy Tanenbaum
compsci
linux
math
person
science
cs.vu.nl
via
cnst
9 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4