|
|
| | G-Free: Defeat Return-Oriented Programming Through Gadget-Less Binaries (2010) [pdf] (iseclab.org) | |
11 points by luu on Nov 19, 2015 | past
|
| | Anubis – Analysis for Unknown Binaries (iseclab.org) | |
18 points by colinprince on May 11, 2015 | past
|
| | Barcode-in-barcode attacks [pdf] (iseclab.org) | |
53 points by sp332 on Dec 18, 2014 | past | 4 comments
|
| | Cross-Platform Malware: Write Once, Infect Everywhere (iseclab.org) | |
2 points by adulau on Nov 10, 2013 | past
|
| | Anubis: Analyzing Unknown Binaries (iseclab.org) | |
2 points by experiment0 on Nov 28, 2012 | past
|
| | HTTP Parameter Pollution [pdf] (iseclab.org) | |
1 point by dominis on May 27, 2011 | past
|
| | A Botmaster’s Perspective of Coordinating Large-Scale Spam Campaigns (iseclab.org) | |
1 point by infinity on March 15, 2011 | past
|
| | PiOS: Detecting Privacy Leaks in iOS Applications [pdf] (iseclab.org) | |
1 point by xtho on Feb 2, 2011 | past | 1 comment
|
| | A Practical Attack to De-Anonymize Social Network Users (iseclab.org) | |
1 point by stakent on Feb 3, 2010 | past
|
| | Code Used in Google Attack Now Public (iseclab.org) | |
2 points by mindplunge on Jan 16, 2010 | past | 1 comment
|
|
![](s.gif)
Join us for AI Startup School this June 16-17 in San Francisco!
Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact
|