pdf
Home
Recent
Comments
Search
Login
Stories
tagged
as
pdf
– Link to a PDF document
2
Object Flow Integrity (2017)
☶
pdf
programming
security
acmccs.github.io
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
2
Domino Tilings
pdf
math
code-spot.co.za
via
pushcx
1 month ago
|
cached
|
no comments
0
2
Single Event Upset at Ground Level (1996)
☶
pdf
hardware
web.archive.org
via
pushcx
1 month ago
|
cached
|
1 comment
1
2
Inaudible Voice Commands: The Long-Range Attack and Defense
pdf
security
web.engr.illinois.edu
via
dbremner
1 month ago
|
cached
|
no comments
0
5
Your Server as a Function (2013)
☶
pdf
distributed
plt
scala
monkey.org
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
5
Gravitational Lensing by Spinning Black Holes in Astrophysics, and in the Movie Interstellar (2015)
☶
pdf
graphics
science
arxiv.org
via
mjn
1 month ago
|
cached
|
no comments
0
1
Dancing with Giants: Wimpy Kernels for On-demand Isolated I/O (2014)
☶
pdf
security
virtualization
cylab.cmu.edu
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
3
The Remote Monad
pdf
compsci
haskell
ittc.ku.edu
via
julienXX
1 month ago
|
cached
|
no comments
0
10
Modular Verification of Programs with Effects and Effect Handlers in Coq
☶
pdf
formalmethods
hardware
security
hal.inria.fr
authored by
lthms
1 month ago
|
cached
|
no comments
0
1
Deterministically Deterring Timing Attacks in Deterland (2016)
☶
pdf
security
virtualization
pdfs.semanticscholar.org
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
1
Blockchain for the Internet of Things: a Systematic Literature Review (2016)
☶
pdf
compsci
cryptocurrencies
hardware
nexa.polito.it
via
Shamar
1 month ago
|
cached
|
no comments
0
2
A General-Purpose Macro Processor as a Poor Man's Compiler-Compiler (1976)
☶
pdf
compilers
historical
computer.org
via
nickpsecurity
1 month ago
|
cached
|
1 comment
1
3
Who watches the watcher? Detecting hypervisor introspection from unprivileged guests
pdf
security
virtualization
dfrws.org
via
lattera
1 month ago
|
cached
|
no comments
0
5
How Verified (or Tested) is My Code? Falsification-Driven Verification and Testing
pdf
formalmethods
testing
agroce.github.io
via
pushcx
1 month ago
|
cached
|
no comments
0
1
Software-based Gate-level Information Flow Security for IoT Systems (2017)
☶
pdf
hardware
programming
security
rakeshk.crhc.illinois.edu
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
2
An Implementation of A Hygienic Syntactic Macro System for JavaScript: A Preliminary Report (2010)
☶
pdf
compilers
javascript
lisp
is.titech.ac.jp
via
nickpsecurity
1 month ago
|
cached
|
4 comments
4
1
The Monad Manifesto (2002)
☶
pdf
historical
windows
jsnover.com
via
quad
1 month ago
|
cached
|
no comments
0
3
Formal Verification of Firmware-Based System-on-Chip Modules (2016)
☶
pdf
formalmethods
hardware
programming
odbms.org
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
8
Øzone: Efficient Execution with Zero Timing Leakage for Modern Microarchitectures (2017)
☶
pdf
hardware
security
arxiv.org
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
5
Is Difficulty Overrated? Choice, Novelty and Suspense in Educational Games
pdf
education
games
researchgate.net
via
asthasr
1 month ago
|
cached
|
2 comments
2
1
Feedback Control Can Make Data Structure Layout Randomization More Cost-Effective under Zero-day Attacks
pdf
security
link.springer.com
via
fro
1 month ago
|
cached
|
no comments
0
2
A kernel stack protection model against attacks from kernel execution units
pdf
security
reader.elsevier.com
via
fro
1 month ago
|
cached
|
no comments
0
2
Mitigating Privilege Escalation
pdf
security
media.proquest.com
via
fro
1 month ago
|
cached
|
1 comment
1
3
A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity
pdf
security
arxiv.org
via
fro
1 month ago
|
cached
|
no comments
0
3
Building Safer UGV's with Run-time, Safety Invariants (2009)
pdf
slides
programming
security
users.ece.cmu.edu
via
nickpsecurity
1 month ago
|
cached
|
3 comments
3
<< Page 4
|
Page 6 >>