security
Home
Recent
Comments
Search
Login
Stories
tagged
as
security
– Netsec, appsec, and infosec
7
Into the Borg – SSRF inside Google production network
distributed
networking
security
opnsec.com
via
ivank
1 month ago
|
cached
|
no comments
0
1
Deterministically Deterring Timing Attacks in Deterland (2016)
☶
pdf
security
virtualization
pdfs.semanticscholar.org
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
7
Reversing JS Malware From marveloptics.com
javascript
reversing
security
blog.jse.li
via
calvin
1 month ago
|
cached
|
no comments
0
49
The worst truism in information security
security
alexgaynor.net
authored by
alex_gaynor
1 month ago
|
cached
|
13 comments
13
6
The Evolution of Security at Riot Games
security
engineering.riotgames.com
via
r2gf
1 month ago
|
cached
|
no comments
0
11
Introducing the ASan Nightly Project
browsers
release
security
blog.mozilla.org
via
alex_gaynor
1 month ago
|
cached
|
3 comments
3
7
Emacs & TLS
emacs
privacy
security
lwn.net
via
aminb
1 month ago
|
cached
|
3 comments
3
3
Who watches the watcher? Detecting hypervisor introspection from unprivileged guests
pdf
security
virtualization
dfrws.org
via
lattera
1 month ago
|
cached
|
no comments
0
18
Things that use Ed25519
crypto
security
ianix.com
via
mikalv
1 month ago
|
cached
|
10 comments
10
1
Software-based Gate-level Information Flow Security for IoT Systems (2017)
☶
pdf
hardware
programming
security
rakeshk.crhc.illinois.edu
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
2
Secure an ASP.NET Core Web Api using Cookies
api
dotnet
security
web
blinkingcaret.com
authored by
rdfi
1 month ago
|
cached
|
no comments
0
7
The SIM Hijackers
security
motherboard.vice.com
via
koudi
1 month ago
|
cached
|
1 comment
1
19
Riot's Approach to Anti-Cheat
games
security
engineering.riotgames.com
via
calvin
1 month ago
|
cached
|
no comments
0
59
Auditing popular crates: how a one-line unsafe has nearly ruined everything
programming
rust
security
reddit.com
via
whbboyd
1 month ago
|
cached
|
2 comments
2
28
Are SKS keyservers safe? Do we need them?
crypto
security
medium.com
authored by
yakamo
1 month ago
|
cached
|
7 comments
7
8
Øzone: Efficient Execution with Zero Timing Leakage for Modern Microarchitectures (2017)
☶
pdf
hardware
security
arxiv.org
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
6
PS4 5.05 BPF Double Free Kernel Exploit Writeup
freebsd
security
github.com
via
lattera
1 month ago
|
cached
|
no comments
0
4
Spectre V1 defense in GCC
compilers
security
lwn.net
via
calvin
1 month ago
|
cached
|
no comments
0
1
Feedback Control Can Make Data Structure Layout Randomization More Cost-Effective under Zero-day Attacks
pdf
security
link.springer.com
via
fro
1 month ago
|
cached
|
no comments
0
2
A kernel stack protection model against attacks from kernel execution units
pdf
security
reader.elsevier.com
via
fro
1 month ago
|
cached
|
no comments
0
2
Mitigating Privilege Escalation
pdf
security
media.proquest.com
via
fro
1 month ago
|
cached
|
1 comment
1
3
A Leak-Resilient Dual Stack Scheme for Backward-Edge Control-Flow Integrity
pdf
security
arxiv.org
via
fro
1 month ago
|
cached
|
no comments
0
5
Preliminary Call-For-Testing: Cross-DSO CFI
freebsd
security
hardenedbsd.org
authored by
lattera
1 month ago
|
cached
|
no comments
0
3
Building Safer UGV's with Run-time, Safety Invariants (2009)
pdf
slides
programming
security
users.ece.cmu.edu
via
nickpsecurity
1 month ago
|
cached
|
3 comments
3
15
You don't need that Bastion host
security
medium.com
via
ngrilly
1 month ago
|
cached
|
9 comments
9
<< Page 6
|
Page 8 >>