Exploit

Results: 786



#Item
211

Bridging the Social-Technical Gap in Location-Aware Computing Fabien Girardin 1) Abstract Building ubiquitous applications that exploit location requires integrating underlying infrastructure for linking sensors with hig

Add to Reading List

Source URL: www.girardin.org

Language: English - Date: 2007-03-09 08:49:24
    212

    PDF Document

    Add to Reading List

    Source URL: www.exploit-db.com

    Language: English - Date: 2011-12-14 09:56:08
      213

      Enhancement of Authentication Protocols through Biometric Authentication on Mobile Devices Goal Develop secure and efficient authentication mechanisms that exploit the use of

      Add to Reading List

      Source URL: www.hig.no

      Language: English - Date: 2013-02-05 05:01:28
        214

        An Automated Framework for Decomposing Memory Transactions to Exploit Partial Rollback Roberto Palmieri Virginia Tech

        Add to Reading List

        Source URL: www.hyflow.org

        Language: English - Date: 2015-02-16 14:46:30
          215

          How to exploit the SIP Digest Leak vulnerability (By using VOIPPACK) By: Sandro Gauci () Date: 26 March 2009 Last updated: 01 April 2009

          Add to Reading List

          Source URL: resources.enablesecurity.com

          Language: English - Date: 2011-11-05 11:58:10
            216Security / Legal professions / Regional Information Sharing Systems / United States Postal Inspection Service / Organized crime / Police / Surveillance / National security / Law

            What is NICLE Identity-related crime continues to increase. Those who commit identity crimes may exploit jurisdictional weaknesses to avoid or reduce prosecution. Further, multiple law enforcement entities may be unaware

            Add to Reading List

            Source URL: www.theiacp.org

            Language: English - Date: 2014-02-04 08:47:42
            217Hacking / Software testing / Failure / Vulnerability / Setuid / File system / Exploit / File descriptor / Social vulnerability / Computer security / Unix / Cyberwarfare

            Checking for Race Conditions in File Accesses Matt Bishop and Michael Dilger CSESeptember 1995 Checking for Race Conditions in File Accesses

            Add to Reading List

            Source URL: seclab.cs.ucdavis.edu

            Language: English - Date: 2004-06-21 18:55:49
            218Computing / Software testing / Hacking / Vulnerability / Penetration test / Exploit / Threat model / Cross-site request forgery / SQL injection / Computer security / Cyberwarfare / Computer network security

            Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

            Add to Reading List

            Source URL: www.spacios.eu

            Language: English - Date: 2014-10-17 10:36:52
            219Security / Hacking / Software testing / National security / Vulnerability / Exploit / Attack / Threat / Zero-day attack / Computer network security / Cyberwarfare / Computer security

              Christian  Gehl   Co-­‐Founder    &  CEO     www.trifense.com  

            Add to Reading List

            Source URL: www.europa.brandenburg.de

            Language: English - Date: 2012-06-20 09:00:08
            220Shellcode / Malware / Software bugs / Hooking / Polymorphic code / Windows API / Code injection / Exploit / Application programming interface / Cyberwarfare / Computer security / Computing

            Automatic Hooking for Forensic Analysis of Document-based Code Injection Attacks Techniques and Empirical Analyses Kevin Z. Snow Fabian Monrose

            Add to Reading List

            Source URL: wwwx.cs.unc.edu

            Language: English - Date: 2014-09-05 15:38:44
            UPDATE