Mots-clés
reverse engineering
rootkits security x86 x64 virtualization reverse e
virtual machine
virtualization
vmx
hypervisor
intel
windows vista
uipi
h2hc
graphs
loops
logic
taint analysis
boolean
x86
Tout plus
Présentations
(5)J’aime
(9)HKG15-211: Advanced Toolchain Usage Part 4
Linaro
•
il y a 9 ans
How to Root 10 Million Phones with One Exploit
Jiahong Fang
•
il y a 8 ans
CODE BLUE 2014 : Joy of a bug hunter by Masato Kinugawa
CODE BLUE
•
il y a 8 ans
Symbolic Execution And KLEE
Shauvik Roy Choudhary, Ph.D.
•
il y a 14 ans
Optimizing for developer happiness
Chad Dickerson
•
il y a 12 ans
Model-Driven Development of Semantic Mashup Applications with the Open-Source InfoGrid Internet Graph Database
InfoGrid.org
•
il y a 14 ans
HBase and Hadoop at Adobe
Cosmin Lehene
•
il y a 13 ans
Trees In The Database - Advanced data structures
Lorenzo Alberton
•
il y a 14 ans
Mots-clés
reverse engineering
rootkits security x86 x64 virtualization reverse e
virtual machine
virtualization
vmx
hypervisor
intel
windows vista
uipi
h2hc
graphs
loops
logic
taint analysis
boolean
x86
Tout plus