pdf
Home
Recent
Comments
Search
Login
Stories
tagged
as
pdf
– Link to a PDF document
3
A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity
pdf
security
arxiv.org
via
fro
1 month ago
|
cached
|
no comments
0
3
Building Safer UGV's with Run-time, Safety Invariants (2009)
pdf
slides
programming
security
users.ece.cmu.edu
via
nickpsecurity
1 month ago
|
cached
|
3 comments
3
6
PipesFS: Fast Linux I/O in the Unix Tradition (2008)
☶
pdf
linux
performance
unix
cs.vu.nl
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
4
PerfFuzz: Automatically Generating Pathological Inputs
☶
pdf
testing
carolemieux.com
via
ceh
1 month ago
|
cached
|
no comments
0
4
Compiler Fuzzing through Deep Learning
☶
pdf
testing
homepages.inf.ed.ac.uk
via
ceh
1 month ago
|
cached
|
no comments
0
2
Spiffy: Enabling File-System Aware Storage Applications
☶
pdf
c
compsci
programming
usenix.org
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
8
Nagini: A Static Verifier for Python
☶
pdf
formalmethods
python
pm.inf.ethz.ch
via
ceh
1 month ago
|
cached
|
2 comments
2
6
Formal reasoning about the security of AWS
pdf
formalmethods
cs.ucl.ac.uk
via
ceh
1 month ago
|
cached
|
no comments
0
15
Engineering a Safer World
☶
pdf
book
practices
testing
mitpress.mit.edu
via
hwayne
1 month ago
|
cached
|
2 comments
2
5
An Industrial Application of Mutation Testing: Lessons, Challenges, and Research Directions
☶
pdf
testing
people.cs.umass.edu
via
ceh
1 month ago
|
cached
|
no comments
0
3
Battle of the Schedulers: FreeBSD ULE vs. Linux CFS
pdf
freebsd
linux
usenix.org
via
vermaden
1 month ago
|
cached
|
1 comment
1
1
Why and How Java Developers Break APIs
pdf
java
science
arxiv.org
via
pushcx
1 month ago
|
cached
|
no comments
0
1
One-Shot Imitation from Observing Humans via Domain-Adaptive Meta-Learning
☶
pdf
ai
arxiv.org
via
Shamar
1 month ago
|
cached
|
no comments
0
5
Small Computer System Supports Large-Scale Multi-User APL (1977)
pdf
apl
historical
hpl.hp.com
via
calvin
1 month ago
|
cached
|
no comments
0
2
Reverse Engineering WebAssembly
pdf
assembly
reversing
web
pnfsoftware.com
via
calvin
1 month ago
|
cached
|
no comments
0
1
Principled and Practical Web Application Security (2015)
☶
pdf
formalmethods
javascript
security
web
cseweb.ucsd.edu
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
6
Speculative Buffer Overflows: Attacks and Defenses
pdf
security
people.csail.mit.edu
via
lattera
1 month ago
|
cached
|
no comments
0
4
Formal Verification of Coalescing Graph-Coloring Register Allocation (2010)
☶
pdf
compilers
formalmethods
cs.princeton.edu
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
4
Hardware Transactional Persistent Memory
☶
pdf
hardware
performance
arxiv.org
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
2
Thermanator : Thermal Residue-Based Post Factum Attacks On Keyboard Password Entry
☶
pdf
privacy
science
security
arxiv.org
via
bio_end_io_t
1 month ago
|
cached
|
no comments
0
1
Inside ASCII (1978)
pdf
compsci
historical
trnsz.com
via
trn
1 month ago
|
cached
|
no comments
0
6
Towards an Optical FPGA - Programmable Silicon Photonic Circuits
☶
pdf
hardware
arxiv.org
via
nickpsecurity
1 month ago
|
cached
|
1 comment
1
22
The Book of Types: Type-Level Programming in Haskell
☶
pdf
book
haskell
reasonablypolymorphic.com
via
pushcx
1 month ago
|
cached
|
1 comment
1
28
Embracing the Kobayashi Maru: Why You Should Teach Your Students to Cheat
pdf
practices
security
rumint.org
via
fcbsd
1 month ago
|
cached
|
13 comments
13
13
PEG-based transformer provides front-, middle and back-end stages in a simple compiler
☶
pdf
assembly
compilers
lisp
vpri.org
via
nickpsecurity
1 month ago
|
cached
|
1 comment
1
<< Page 5
|
Page 7 >>