Security Analysis

Results: 6956



#Item
81

MTR150440 MITR E TECHNI CAL R EPORT Android Security Analysis Final Report

Add to Reading List

Source URL: www.mitre.org

- Date: 2016-04-28 16:27:39
    82

    Lookout Mobile Security Technical Tear Down Threat Name DroidDream, Payload One & Two Sample used in the analysis Payload One

    Add to Reading List

    Source URL: fzuxl440zfc1tytbg1auaack-wpengine.netdna-ssl.com

    - Date: 2016-10-10 13:12:12
      83

      Towards a Pattern Language for Security Risk Analysis of Web Applications Yan Li, SINTEF ICT and University of Oslo Ragnhild Kobro Runde, University of Oslo Ketil Stølen, SINTEF ICT and University of Oslo

      Add to Reading List

      Source URL: www.hillside.net

        84

        Analysis of NORX: Investigating Differential and Rotational Properties Jean-Philippe Aumasson1 , Philipp Jovanovic2 , and Samuel Neves3 1 Kudelski Security, Switzerland

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2014-10-02 11:08:52
          85

          To Make a Robot Secure: An Experimental Analysis of Cyber Security Threats Against Teleoperated Surgical Robotics∗ Tamara Bonaci† , Jeffrey Herron † , Tariq Yusuf‡ , Junjie Yan† , Tadayoshi Kohno‡ , Howard Ja

          Add to Reading List

          Source URL: brl.ee.washington.edu

          - Date: 2015-05-14 18:28:36
            86

            INTERNATIONAL POLICY ANALYSIS Europe’s Security Governance and Transatlantic Relations The West, Russia and Europe’s Security Order

            Add to Reading List

            Source URL: library.fes.de

            - Date: 2016-11-10 05:23:52
              87

              NetApp MultiStore: An Independent Security Analysis Prepared By: Thomas Ptacek and Eric Monti, Matasano Security

              Add to Reading List

              Source URL: community.netapp.com

              - Date: 2014-09-24 14:37:57
                88

                A Formal Security Analysis of the Signal Messaging Protocol Version 1.1, October 2016† Katriel Cohn-Gordon1 , Cas Cremers1 , Benjamin Dowling2 , Luke Garratt1 , and Douglas Stebila3 1

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2016-11-01 11:47:38
                  89

                  Software Review and Security Analysis of Scytl Remote Voting Software Michael Clarkson Brian Hay

                  Add to Reading List

                  Source URL: doe.dos.state.fl.us

                  - Date: 2008-09-24 15:22:04
                    90

                    GOODWARE DRUGS FOR MALWARE: ON-THE-FLY MALWARE ANALYSIS AND CONTAINMENT DAMIANO BOLZONI CHRISTIAAN SCHADE TWENTE SECURITY LAB

                    Add to Reading List

                    Source URL: media.blackhat.com

                    - Date: 2012-04-07 14:52:47
                      UPDATE