Active
Recent
Comments
Search
Login
Login
microsoft.com: 105 stories from 51 submitters
20
EverParse: Hardening critical attack surfaces with formally proven message parsers
ml
security
microsoft.com
via
lojikil
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
ILX: Extending the .NET Common IL for Functional Language Interoperability (2001)
pdf
compilers
dotnet
haskell
plt
microsoft.com
via
calvin
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
HAFNIUM targeting Exchange Servers with 0-day exploits
security
windows
microsoft.com
via
lorddimwit
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
9
What is a File? (2013)
☶
pdf
osdev
microsoft.com
via
chrislloyd
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
A Case Study of Logging and Telemetry at Microsoft (2016)
pdf
practices
microsoft.com
via
hwayne
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
What tracking an attacker email infrastructure tells us about persistent cybercriminal operations
security
microsoft.com
via
lattera
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
20
Enriching Excel with higher-order functional programming
programming
microsoft.com
via
agent281
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
8
Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers
security
microsoft.com
via
mseri
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
14
Meet the Microsoft Pluton processor – The security chip designed for the future of Windows PCs
hardware
security
windows
microsoft.com
via
dgv
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
9 comments
9
8
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment
c
compsci
microsoft.com
via
mooreds
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
6
Imperative functional programming (1992)
pdf
haskell
historical
plt
microsoft.com
via
Hail_Spacecake
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
17
The Implementation of Functional Programming Languages (1987)
pdf
compsci
historical
plt
microsoft.com
via
calvin
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
3
Introducing Kernel Data Protection, a new platform security technology for preventing data corruption
security
windows
microsoft.com
via
fro
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
9
FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines
security
microsoft.com
via
mooreds
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Practical type inference for arbitrary-rank types (2007)
pdf
haskell
plt
microsoft.com
via
calvin
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Lcc.NET: Targeting the .NET Common Intermediate Language from Standard C
☶
pdf
c
compilers
dotnet
microsoft.com
via
calvin
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Verifiable Secret-Ballot Elections (1996)
pdf
cryptography
microsoft.com
via
calvin
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
12
Gray Failure: The Achilles’ Heel of Cloud-Scale Systems
pdf
distributed
scaling
microsoft.com
via
craigstuntz
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
14
Data-Parallel Finite State Machines (2016)
☶
pdf
c++
performance
microsoft.com
via
nickpsecurity
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Static TypeScript: An Implementation of a Static Compiler for the TypeScript Language
plt
microsoft.com
via
eatonphil
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Are Lock-Free Concurrent Algorithms Practically Wait-Free? (2014)
☶
pdf
formalmethods
programming
security
microsoft.com
via
nickpsecurity
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
16
Mimalloc: Free List Sharding in Action
osdev
microsoft.com
via
peschkaj
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
2
Secrets of the Glasgow Haskell Compiler inliner (1999)
pdf
compilers
haskell
microsoft.com
via
Picnoir
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
50
A fork() in the road
2
osdev
microsoft.com
via
GeoffWozniak
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
69 comments
69
2
Generating Finite State Machines from Abstract State Machines (2002)
☶
pdf
compsci
formalmethods
programming
testing
microsoft.com
via
nickpsecurity
6 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
<< Page 1
|
Page 3 >>