×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
michael-scovetta documents
Technology
Modern Kernel Pool Exploitation: Attacks and Techniques
Technology
Systematic Detection of Capability Leaks in Stock Android Smartphones
Technology
Android Attacks
Technology
Consumer Password Worst Practices
Technology
The Listening: Email Client Backdoor
Technology
Stackjacking
Technology
Windows Services Hacking
Technology
DEFCON 18- These Aren't the Permissions You're Looking For
Technology
Enterprise Password Worst Practices
Technology
A collection of examples of 64 bit errors in real programs
Technology
Scaling Cyberwarfare (Roelker)
Technology
Moving Anti-Malware Research Forward (Fraser)
Technology
National Cyber Range (Ranka)
Technology
Scalable Cyber Deception (Ragsdale)
Technology
Secure Computer Systems (Shrobe)
Technology
Introducing the Ceylon Project
Technology
Strategic Surprise
Technology
Exploitation and State Machines
Entertainment & Humor
Don't Give Credit: Hacking Arcade Machines
Technology
Smooth CoffeeScript
Technology
HTML5 Web Security
Next >