Pointer machine

Results: 70



#Item
21Perl versiondocumentation - perlmroapi  NAME perlmroapi - Perl method resolution plugin interface  DESCRIPTION

Perl versiondocumentation - perlmroapi NAME perlmroapi - Perl method resolution plugin interface DESCRIPTION

Add to Reading List

Source URL: perldoc.perl.org

Language: English - Date: 2014-10-03 14:59:10
22Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server. David Litchfield () 8th September 2003

Defeating the Stack Based Buffer Overflow Prevention Mechanism of Microsoft Windows 2003 Server. David Litchfield () 8th September 2003

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
23Automatic Extraction of Secrets from Malware Ziming Zhao, Gail-Joon Ahn and Hongxin Hu Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Tempe, AZ 85281, USA {zmzhao, gahn, hxhu}@

Automatic Extraction of Secrets from Malware Ziming Zhao, Gail-Joon Ahn and Hongxin Hu Laboratory of Security Engineering for Future Computing (SEFCOM) Arizona State University, Tempe, AZ 85281, USA {zmzhao, gahn, hxhu}@

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2011-09-01 00:19:23
24Updating the Forth Virtual Machine  EuroForth 2008 Updating the Forth Virtual Machine Stephen Pelc

Updating the Forth Virtual Machine EuroForth 2008 Updating the Forth Virtual Machine Stephen Pelc

Add to Reading List

Source URL: www.complang.tuwien.ac.at

Language: English - Date: 2008-09-05 09:54:16
25The Jalapen˜o virtual machine by B. Alpern C. R. Attanasio J. J. Barton M. G. Burke

The Jalapen˜o virtual machine by B. Alpern C. R. Attanasio J. J. Barton M. G. Burke

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2007-04-01 19:34:57
26Colorado Software Summit: October 24 – 29, 2004  © Copyright 2004, Simon Roberts Security Foundations of Java Simon Roberts

Colorado Software Summit: October 24 – 29, 2004 © Copyright 2004, Simon Roberts Security Foundations of Java Simon Roberts

Add to Reading List

Source URL: www.softwaresummit.com

Language: English - Date: 2008-01-03 04:05:15
27Using Memory Errors to Attack a Virtual Machine Sudhakar Govindavajhala ∗ Andrew W. Appel Princeton University {sudhakar,appel}@cs.princeton.edu Abstract

Using Memory Errors to Attack a Virtual Machine Sudhakar Govindavajhala ∗ Andrew W. Appel Princeton University {sudhakar,appel}@cs.princeton.edu Abstract

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2003-03-06 09:41:50
28Optimistic Stack-Allocation in Java-Like Languages Erik Corry <ecorry @ esmertec.com> June[removed]  Performance in Java

Optimistic Stack-Allocation in Java-Like Languages Erik Corry June[removed] Performance in Java

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2010-10-09 14:30:18
29ON PURPOSE AN ENQUIRY INTO THE POSSIBLE ROLES OF THE COMPUTER IN ART HAROLD COHEN

ON PURPOSE AN ENQUIRY INTO THE POSSIBLE ROLES OF THE COMPUTER IN ART HAROLD COHEN

Add to Reading List

Source URL: www.aaronshome.com

Language: English - Date: 2014-09-12 15:26:30
30Secure 64 SourceT OS Security Evaluation Report Matasano Security, LLC November 20, 2007

Secure 64 SourceT OS Security Evaluation Report Matasano Security, LLC November 20, 2007

Add to Reading List

Source URL: www.secure64.com

Language: English - Date: 2009-10-09 13:10:06